Integrated security systems design: concepts, specifications, and implementation
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier Butterworth-Heinemann
c2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing enterprise-class security in government and corporate installations worldwide. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, thereby saving a company both time and money. Integrated Security Systems Design is arranged to go from the strategic to the technical to the tactical. The strategic section covers the why of design, the technical section explains how its done, and the tactical section provides the cultural knowledge that leads to project success. Norman also offers guidance in avoiding pitfalls out of which lawsuits have arisen. Many of the subjects covered, such as how to make a security system invisible on an Information Technology System network, include material not available in any other book. * Centralize monitoring of security, of business processes and of adherence to policy * Learn the what-not-to-do's of security design from an experienced practitioner * Maximize your organization's safety while reducing liability and operating costs SECTION ONE INTRODUCTION TO INTEGRATED SECURITY SYSTEMS -- 1 Introduction and Organization of the Book -- 2 Integrated Security System Design Benefits and Philosophy -- 3 History of Electronic Security -- SECTION TWO SECURITY SYSTEM DESIGN -- 4 Security System Design Elements -- 5 Electronics Elements (High Level Discussion) -- 6 Electronics Elements (Detailed Discussion) -- 7 Physical Security Elements -- 8 The Security Design Process -- 9 Preliminary Steps in the Design Process -- 10 Getting Down to the Actual Design -- SECTION THREE -- SPECIAL DESIGN SECTIONS -- 11 Information Technology Systems Infrastructure -- 12 Radio Frequency Systems -- 13 Interfacing to Legacy Systems and Emerging Technologies -- 14 Interfacing to Related Systems -- 15 Delaying Technologies and Response Technologies -- 16 Alarm Detection and Emerging Video Technologies -- 17 Design Standards Development -- 18 System Finalization and Commissioning Steps -- 19 System Implementation Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xii, 458 p.) |
ISBN: | 0080471447 0750679093 9780080471440 9780750679091 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043044718 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151123s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080471447 |c electronic bk. |9 0-08-047144-7 | ||
020 | |a 0750679093 |9 0-7506-7909-3 | ||
020 | |a 9780080471440 |c electronic bk. |9 978-0-08-047144-0 | ||
020 | |a 9780750679091 |9 978-0-7506-7909-1 | ||
035 | |a (OCoLC)162593739 | ||
035 | |a (DE-599)BVBBV043044718 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Norman, Thomas L. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Integrated security systems design |b concepts, specifications, and implementation |c Thomas Norman |
264 | 1 | |a Amsterdam |b Elsevier Butterworth-Heinemann |c c2007 | |
300 | |a 1 Online-Ressource (xii, 458 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing enterprise-class security in government and corporate installations worldwide. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, thereby saving a company both time and money. Integrated Security Systems Design is arranged to go from the strategic to the technical to the tactical. The strategic section covers the why of design, the technical section explains how its done, and the tactical section provides the cultural knowledge that leads to project success. Norman also offers guidance in avoiding pitfalls out of which lawsuits have arisen. Many of the subjects covered, such as how to make a security system invisible on an Information Technology System network, include material not available in any other book. * Centralize monitoring of security, of business processes and of adherence to policy * Learn the what-not-to-do's of security design from an experienced practitioner * Maximize your organization's safety while reducing liability and operating costs | ||
500 | |a SECTION ONE INTRODUCTION TO INTEGRATED SECURITY SYSTEMS -- 1 Introduction and Organization of the Book -- 2 Integrated Security System Design Benefits and Philosophy -- 3 History of Electronic Security -- SECTION TWO SECURITY SYSTEM DESIGN -- 4 Security System Design Elements -- 5 Electronics Elements (High Level Discussion) -- 6 Electronics Elements (Detailed Discussion) -- 7 Physical Security Elements -- 8 The Security Design Process -- 9 Preliminary Steps in the Design Process -- 10 Getting Down to the Actual Design -- SECTION THREE -- SPECIAL DESIGN SECTIONS -- 11 Information Technology Systems Infrastructure -- 12 Radio Frequency Systems -- 13 Interfacing to Legacy Systems and Emerging Technologies -- 14 Interfacing to Related Systems -- 15 Delaying Technologies and Response Technologies -- 16 Alarm Detection and Emerging Video Technologies -- 17 Design Standards Development -- 18 System Finalization and Commissioning Steps -- 19 System Implementation | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computers / Access control |2 fast | |
650 | 7 | |a Information storage and retrieval systems / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Information storage and retrieval systems |x Security measures | |
650 | 4 | |a Computers |x Access control | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187425 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028469255 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187425 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187425 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175410802458624 |
---|---|
any_adam_object | |
author | Norman, Thomas L. |
author_facet | Norman, Thomas L. |
author_role | aut |
author_sort | Norman, Thomas L. |
author_variant | t l n tl tln |
building | Verbundindex |
bvnumber | BV043044718 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)162593739 (DE-599)BVBBV043044718 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04496nmm a2200493zc 4500</leader><controlfield tag="001">BV043044718</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151123s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080471447</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-047144-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0750679093</subfield><subfield code="9">0-7506-7909-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080471440</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-047144-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780750679091</subfield><subfield code="9">978-0-7506-7909-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162593739</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043044718</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Norman, Thomas L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Integrated security systems design</subfield><subfield code="b">concepts, specifications, and implementation</subfield><subfield code="c">Thomas Norman</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier Butterworth-Heinemann</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 458 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing enterprise-class security in government and corporate installations worldwide. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, thereby saving a company both time and money. Integrated Security Systems Design is arranged to go from the strategic to the technical to the tactical. The strategic section covers the why of design, the technical section explains how its done, and the tactical section provides the cultural knowledge that leads to project success. Norman also offers guidance in avoiding pitfalls out of which lawsuits have arisen. Many of the subjects covered, such as how to make a security system invisible on an Information Technology System network, include material not available in any other book. * Centralize monitoring of security, of business processes and of adherence to policy * Learn the what-not-to-do's of security design from an experienced practitioner * Maximize your organization's safety while reducing liability and operating costs</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">SECTION ONE INTRODUCTION TO INTEGRATED SECURITY SYSTEMS -- 1 Introduction and Organization of the Book -- 2 Integrated Security System Design Benefits and Philosophy -- 3 History of Electronic Security -- SECTION TWO SECURITY SYSTEM DESIGN -- 4 Security System Design Elements -- 5 Electronics Elements (High Level Discussion) -- 6 Electronics Elements (Detailed Discussion) -- 7 Physical Security Elements -- 8 The Security Design Process -- 9 Preliminary Steps in the Design Process -- 10 Getting Down to the Actual Design -- SECTION THREE -- SPECIAL DESIGN SECTIONS -- 11 Information Technology Systems Infrastructure -- 12 Radio Frequency Systems -- 13 Interfacing to Legacy Systems and Emerging Technologies -- 14 Interfacing to Related Systems -- 15 Delaying Technologies and Response Technologies -- 16 Alarm Detection and Emerging Video Technologies -- 17 Design Standards Development -- 18 System Finalization and Commissioning Steps -- 19 System Implementation</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information storage and retrieval systems / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187425</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028469255</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187425</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187425</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043044718 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:51Z |
institution | BVB |
isbn | 0080471447 0750679093 9780080471440 9780750679091 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028469255 |
oclc_num | 162593739 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xii, 458 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Elsevier Butterworth-Heinemann |
record_format | marc |
spelling | Norman, Thomas L. Verfasser aut Integrated security systems design concepts, specifications, and implementation Thomas Norman Amsterdam Elsevier Butterworth-Heinemann c2007 1 Online-Ressource (xii, 458 p.) txt rdacontent c rdamedia cr rdacarrier Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing enterprise-class security in government and corporate installations worldwide. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, thereby saving a company both time and money. Integrated Security Systems Design is arranged to go from the strategic to the technical to the tactical. The strategic section covers the why of design, the technical section explains how its done, and the tactical section provides the cultural knowledge that leads to project success. Norman also offers guidance in avoiding pitfalls out of which lawsuits have arisen. Many of the subjects covered, such as how to make a security system invisible on an Information Technology System network, include material not available in any other book. * Centralize monitoring of security, of business processes and of adherence to policy * Learn the what-not-to-do's of security design from an experienced practitioner * Maximize your organization's safety while reducing liability and operating costs SECTION ONE INTRODUCTION TO INTEGRATED SECURITY SYSTEMS -- 1 Introduction and Organization of the Book -- 2 Integrated Security System Design Benefits and Philosophy -- 3 History of Electronic Security -- SECTION TWO SECURITY SYSTEM DESIGN -- 4 Security System Design Elements -- 5 Electronics Elements (High Level Discussion) -- 6 Electronics Elements (Detailed Discussion) -- 7 Physical Security Elements -- 8 The Security Design Process -- 9 Preliminary Steps in the Design Process -- 10 Getting Down to the Actual Design -- SECTION THREE -- SPECIAL DESIGN SECTIONS -- 11 Information Technology Systems Infrastructure -- 12 Radio Frequency Systems -- 13 Interfacing to Legacy Systems and Emerging Technologies -- 14 Interfacing to Related Systems -- 15 Delaying Technologies and Response Technologies -- 16 Alarm Detection and Emerging Video Technologies -- 17 Design Standards Development -- 18 System Finalization and Commissioning Steps -- 19 System Implementation Includes bibliographical references and index COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computers / Access control fast Information storage and retrieval systems / Security measures fast Computer networks Security measures Information storage and retrieval systems Security measures Computers Access control http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187425 Aggregator Volltext |
spellingShingle | Norman, Thomas L. Integrated security systems design concepts, specifications, and implementation COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computers / Access control fast Information storage and retrieval systems / Security measures fast Computer networks Security measures Information storage and retrieval systems Security measures Computers Access control |
title | Integrated security systems design concepts, specifications, and implementation |
title_auth | Integrated security systems design concepts, specifications, and implementation |
title_exact_search | Integrated security systems design concepts, specifications, and implementation |
title_full | Integrated security systems design concepts, specifications, and implementation Thomas Norman |
title_fullStr | Integrated security systems design concepts, specifications, and implementation Thomas Norman |
title_full_unstemmed | Integrated security systems design concepts, specifications, and implementation Thomas Norman |
title_short | Integrated security systems design |
title_sort | integrated security systems design concepts specifications and implementation |
title_sub | concepts, specifications, and implementation |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computers / Access control fast Information storage and retrieval systems / Security measures fast Computer networks Security measures Information storage and retrieval systems Security measures Computers Access control |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computers / Access control Information storage and retrieval systems / Security measures Computer networks Security measures Information storage and retrieval systems Security measures Computers Access control |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187425 |
work_keys_str_mv | AT normanthomasl integratedsecuritysystemsdesignconceptsspecificationsandimplementation |