The Complete Guide to Physical Security

The Complete Guide to Physical Security

By: Daniel J. Benny (author), Paul R. Baker (author)Hardback

More than 4 weeks availability


To adequately protect an organization, physical security must go beyond the "gates, guns, and guards" mentality that characterizes most security programs. Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals. The Complete Guide to Physical Security discusses the assets of a facility-people, building, and location-and the various means to protect them. It emphasizes the marriage of technology and physical hardware to help those tasked with protecting these assets to operate successfully in the ever-changing world of security. The book covers specific physical security technologies, such as intrusion detection, access control, and video surveillance systems-including networked video. It addresses the reasoning behind installations, how to work with contractors, and how to develop a central station for monitoring. It also discusses government regulations for building secured facilities and SCIFs (Sensitive Compartmented Information Facilities). Case examples demonstrate the alignment of security program management techniques with not only the core physical security elements and technologies but also operational security practices. The authors of this book have nearly 50 years combined experience in the security industry-including the physical security and security management arenas. Their insights provide the foundation for security professionals to develop a comprehensive approach to achieving physical security requirements while also establishing leadership roles that help further the overall mission of their organization.

Create a review

About Author

Dr. Paul R. Baker began his security career in the U.S. Marine Corps as a military policeman. Upon discharge, he joined the Maryland State Police and worked in all phases of law enforcement, spending the majority of his career in the intelligence and narcotics areas. Upon retirement in 2001, he began the security management phase of his journey, working for the MITRE Corporation, Institute for Defense Analysis, Capital One Bank, and, finally, with the RAND Corporation. Dr. Baker is board certified in security management as a certified protection professional (CPP) by ASIS (American Society for Industrial Security) International. He is an adjunct professor for University of Maryland University College in the homeland security field and an adjunct professor for Southwestern College in its security management curriculum. He is a contributor to the CRC Press books Official (ISC)2(R) Guide to the CISSP(R) CBK(R), Second Edition and Official (ISC)2 Guide to the ISSAP CBK. Dr. Daniel J. Benny is the security discipline chair at Embry-Riddle Aeronautical University. He served as a U.S. Navy intelligence officer and DOD Federal Police Chief and holds a Ph.D. in Criminal Justice from Capella University. He is board-certified in security management as a certified protection professional (CPP) and board-certified as a professional certified investigator (PCI)-both by ASIS International; certified fraud examiner (CFE) by the Association of Certified Fraud Examiners; certified confidentiality officer (CCO) by the Business Espionage Controls and Countermeasures Association; certified member (CM) airport certified employee-security (ACE); and airport security coordinator by the American Association of Airport Executives. Dr. Benny is the author of the CRC Press books General Aviation Security: Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports; Cultural Property Security: Protecting Museums, Historic Sites, Archives, and Libraries; and the forthcoming book, Industrial Espionage: Developing a Counterespionage Program Security. He has authored over 300 articles on security administration, intelligence, aviation security, private investigation, and cultural property security topics.


Physical Security Planning Setting the Stage Site Planning Reviewing the Physical Design Vulnerability Assessments The Security Survey Vulnerability Assessment Developing a Vulnerability Assessment Understanding the Threats Making Adjustments Security Design and Planning Security Planning and Evaluation Security Design Concepts Security Technologies EASI Model Adversary Sequence Diagram Working with Architects Working with Contractors Construction Review Security Construction Projects New Construction Initial Point of Access Roadway Design Parking Loading Docks Signage Retrofitting Protection in Depth Protection-in-Depth Concepts Protection Plans Evacuation Drills Incident Response Penetration Tests Access Control Violation Monitoring Perimeter Protection Crime Prevention through Environmental Design (CPTED) Protecting with CPTED Concepts Barriers Lighting Access Control Access Control Anti-Passback Access Control Head End Turnstiles and Mantraps Physical Protection Systems Doors Windows Interior Intrusion Detection Systems Perimeter Intrusion Detection Systems CCTV and IP Video The Essential Guide to Video Surveillance Video Surveillance Use Cases Video Surveillance System Classifications Image Capture Video Sources-Cameras Lenses Lighting HDTV Recording Systems Video Management Systems Video Control, Analysis, and Video Content Analysis Systems Using a Step-by-Step Approach to System Selection and Deployment Upgrade Path Manpower and Video Surveillance Privacy and Legal Considerations-Video Surveillance Checklist The Future of Video Surveillance Keys, Locks, and Safes Keys, Locks, and Safes Developing a Master Locking System Safes Vaults Containers Biometrics What Is Biometrics? Multibiometric Systems Deploying Biometrics Privacy Biometric Metrics Attacks on Biometric Systems and Their Remedies Security Guard Force Establishing a Security Guard Force Mission and Duties of the Security Guard Force Profile of the Facility to Be Protected Proprietary Security Guard Force Contract Security Guard Force Hybrid Force Security Guard Uniforms Security Guard Identification Security Guard as an Authority Figure Security Guard Protective Equipment Security Guard Training Professional Security Certifications Personnel Issues Central Station Design Developing an Operation Design Requirements Secondary Amenities for an Operations Control Center Alarm Assessment Government Security SCIF Location Design Sound Masking TEMPEST Shielding Filtering Access Security Alarm Requirements Open Storage Closed Storage Dealing with Contractors Appendix A: Fixed Facility Checklist Financial Institutions and Banks Vaults Safes ATMs Night Depositories Teller Cash Recyclers Dye Packs Barriers Ambush Features Video Systems Holdup Alarms Bank Guards Data Center Protection Data Centers Fire Protection Fire Detection/Alerting Fire Suppression Total System Cost Determining Total System Cost System Design Cost System Installation Cost System Operational Cost IT-Related Cost Maintenance Cost Replacement Cost Cost-Benefit Analysis Cost of Loss Cost of Prevention Return on Investment Cost Factors Security Master Plan Security Master Plan Strategy Engaging the Stakeholders What Should Your Security Philosophies Be? Technology Migration Strategy Equipment Replacement Schedules Security Foresight Strategic Foresight Foresight Techniques Security Leadership What Is Leadership? Purpose of Leadership Effective Leadership Why Security Leaders Are Important Understanding the Basics Are Leaders Born or Made? Good Leadership Bad Leadership Going from Bad to Good Forging the Future New Definitions for Leaders in the Twenty-First Century Index

Product Details

  • publication date: 10/12/2012
  • ISBN13: 9781420099638
  • Format: Hardback
  • Number Of Pages: 360
  • ID: 9781420099638
  • weight: 793
  • ISBN10: 1420099639

Delivery Information

  • Saver Delivery: Yes
  • 1st Class Delivery: Yes
  • Courier Delivery: Yes
  • Store Delivery: Yes

Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly