Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Dedication Foreword Preface Chapter 1. Encompassing Effective CPTED Solutions in 2017 and Beyond: Concepts and Strategies
Introduction Environment Space Target Hardening CPTED Assessments Questions to be Answered During an Assessment CPTED Survey for Colleges and Universities: 30 Vulnerabilities Based on CPTED Assessments CPTED Recommendations Psychological Properties of Colors CPTED Landscape Security Recommendation Conclusion
Chapter 2. Introduction to Vulnerability Assessment
Risk Management and Vulnerability Assessment Risk Assessment and the Vulnerability Assessment Process Statistics and Quantitative Analysis Vulnerability Assessment Process Overview Planning the Vulnerability Assessment Protection Objectives Data Collection—Detection Data Collection—Delay Data Collection—Response Analysis Reporting and Using the Vulnerability Assessment Systems Engineering and Vulnerability Assessment System Requirements System Design and Analysis System Installation and Test System Replacement Summary
Chapter 3. Influence of Physical Design
Introduction Defensible Space Crime Prevention Through Environmental Design Conclusion
Chapter 4. Approaches to Physical Security
Levels of Physical Security The Value of Planning Physical Barriers Security Surveillance System (CCTV) The Security or Master Plan and Countermeasures Convincing Oneself That a Proposal Is Justified Designing Security and Layout of Site Summary
Chapter 5. Security Lighting
Introduction Illumination Types of Lamps Twenty-Five Things You Need to Know About Lighting Energy Management Lighting Checklist Lighting Definitions
Chapter 6. Electronics Elements: A Detailed Discussion
Introduction Alarm/Access Control Systems Server (and Business Continuity Server) Workstations Advanced Elements CCTV and Digital Video Systems How Digital Video Differs From Analog Wireless Digital Video Satellite Wireless Architectures Video Analytics Lenses and Lighting Security Communications Analog Versus Digital Command/Control and Communication Consoles Workstation and Console Specifics Guard Console Functions Communication Systems Summary Questions and Answers
Chapter 7. Use of Locks in Physical Crime Prevention
Lock Terminology and Components Key-Operated Mechanisms Combination Locks Lock Bodies Door Lock Types Strikes Attacks and Countermeasures Locks and the Systems Approach to Security Appendix 7A: Key Control New Standard Set for Exit Devices, Locks, and Alarms Electrified Panic Hardware Appendix 7B: Key Control and Lock Security Checklist
Chapter 8. Internal Threats and Countermeasures
Introduction Internal Theft Management Countermeasures Physical Security Countermeasures Security Officers
Chapter 9. External Threats and Countermeasures
Introduction Methods of Unauthorized Entry Countermeasures
Chapter 10. Biometrics in the Criminal Justice System and Society Today
Introduction History of Biometrics and Fingerprinting in the United States Biometrics Usage Today The Federal Bureau of Investigation’s Biometric Center of Excellence Biometric Modalities and Technology International Biometrics: India’s Private Usage of Biometrics on Society Future Advancements of Biometrics
Chapter 11. Access Control Systems and Identification Badges
Access Control Systems and Protocols Identification Badging System
Chapter 12. Chain-Link Fence Standards
Recommendations Security Planning Material Specifications Design Features and Considerations Typical Design Example
Chapter 13. Doors, Door Frames, and Signage
Introduction Residential Buildings Exterior Number Sizing The Function of a Door Terminology Standards for Doors
Chapter 14. Glass and Windows
Introduction Types of Glass Glass and Security Window Film
Chapter 15. The Legalization of Marijuana and the Security Industry
Marijuana—the Pros and Cons Should Marijuana be Legal for Medicinal and/or Recreational Purposes? The Short-Term Effects of Marijuana The Long-Term Effects of Marijuana Is Marijuana Addictive? Security for Marijuana Farms and Dispensaries
Chapter 16. Designing Security and Working With Architects
Leadership in Energy and Environmental Design Crime Prevention Through Environmental Design Planning and Design Review Physical Security Systems
Chapter 17. Standards, Regulations, and Guidelines Compliance and Your Security Program, Including Global Resources
Introduction Standards Regulations Guidelines Managing Compliance Resources
Chapter 18. Information Technology Systems Infrastructure
Introduction Basics of Transport Control Protocol/Internet Protocol and Signal Communications Transport Control Protocol/User Datagram Protocol/Real-Time Protocol User Datagram Protocol Networking Devices Network Infrastructure Devices Servers Network Architecture Network Configurations Creating Network Efficiencies Digital Video Digital Resolution Frame Rates Display Issues Managing Data Systems Throughput System Architecture Interfacing to Other Enterprise Information Technology Systems Summary
Chapter 19. Security Officers and Equipment Monitoring
Introduction Command Center Best Locations for Closed-Caption Television Introduction to Access Control and Biometrics Designated Restricted Areas Summary
Chapter 20. Video Technology Overview
Overview Video System Camera Function Scene Illumination Scene Characteristics Lenses Cameras Transmission Switchers Quads and Multiplexers Monitors Recorders Hard-Copy Video Printers Ancillary Equipment Summary Glossary for CCTV
Chapter 21. Understanding Layers of Protection Analysis
Introduction Conclusion
Chapter 22. Fire Development and Behavior
Introduction Stages of Fire How Fire Spreads Four Ways to Put Out a Fire Classifying Fire UL Standard 217, 268 and NFPA 72 Water Supply for Sprinklers and Tanks Appendix: A Fire Safety Inspection Administrative and Planning Phase General Physical Inspection Phase Extinguisher Inspection Phase Stand Pipe, Fire Hose, and Control Valve Inspection Phase Sprinkler System Inspection Phase Hazardous Materials Inspection Phase Alarm System Inspection Phase
Chapter 23. Alarms Intrusion Detection Systems
Introduction False Alarms Components of Alarm Systems Application Alarm Equipment Overhaul Additional Resources Conclusion Appendix 23A: Smoke Detectors Appendix 23B: Alarm Certificate Services Glossary of Terms Certificate Types Standards Appendix 23C: Fire Classifications Use of Fire Extinguishers
Appendix 1. Glossary of Terms Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion