- ホーム
- > 洋書
Full Description
Vulnerability Assessment of Physical Protection Systems guides the reader through the topic of physical security with a unique, detailed and scientific approach. The book describes the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. It draws heavily on the principles introduced in the author's best-selling Design and Evaluation of Physical Protection Systems and allows readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources.
The text covers the full spectrum of a VA, including negotiating tasks with the customer; project management and planning of the VA; team membership; and step-by-step details for performing the VA, data collection and analysis. It also provides important notes on how to use the VA to suggest design improvements and generate multiple design options. The text ends with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools are introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact.
This book will be of interest to physical security professionals, security managers, security students and professionals, and government officials.
Contents
Chapter 1: Introduction to Vulnerability AssessmentChapter 2: Physical Protection Systems Principles and ConceptsChapter 3: Getting StartedChapter 4: VA Process Inputs — Establish Protection ObjectivesChapter 5: Data Collection — Intrusion Detection SubsystemChapter 6: Data Collection—Alarm Assessment SubsystemChapter 7: Data Collection—Entry Control SubsystemChapter 8: Data Collection—Alarm Communication and Display SubsystemChapter 9: Data Collection—Delay Subsystem Chapter 10: Data Collection--Response Subsystem Chapter 11: Analysis Chapter 12: Reporting and Using ResultsAppendix A—Project Management Forms and TemplatesAppendix B—Initial Briefing TemplateAppendix C—Threat/Facility WorksheetsAppendix D—Data Collection SheetsAppendix E—Alarm Communication and Display Subsystem CriteriaAppendix F—Representative DelaysAppendix G—Results Briefing Template
-
- 電子書籍
- 幼馴染のS級パーティーから追放された聖…
-
- 電子書籍
- ワクワクを仕事に変える 「小さな商い」…
-
- 電子書籍
- 我が子の気持ちがわからない 中流・富裕…
-
- 電子書籍
- ファンタジウム(5)
-
- 電子書籍
- 奈良まちはじまり朝ごはん3 スターツ出…