- Shopping Bag ( 0 items )
Theft, assault, corporate espionage, unauthorized systems access, terrorism, hurricanes and tornadoes, sabotage, vandalism, fire, explosions, and other threats… All are considerations as building owners, facility managers, and design and construction professionals seek ways to meet security needs.
This comprehensive resource will help you evaluate your facility’s security needs – and design and budget for the materials and devices needed to fulfill them. The text and cost data will help you to:
About the Author and Contributors.
Part One: Risk Assessment and Security Planning.
Chapter One: People and Property.
Conflicts Between Security and Safety.
Chapter Two: Identifying Security Threats.
What Can Happen.
Threats to Personnel Safety.
Theft of Property.
Vandalism and Sabotage.
Chapter Three: Assessing the Risks.
Assigning the Assessment and Response Team.
Periodic Review of Documentation.
Assembling a Risk Assessment Group.
Deciding Where to Focus Security Measures.
Assessing the Facility.
Assessment of Specific Risks.
Probability of Occurrence.
Assessing Facilities by Type.
Chapter Four: Crisis Management.
Making Crisis Management Plans.
Who Prepares the Plan?
What Are the Critical Objectives?
Teams and Teaming.
Chapter Five: Security through Planning, Design, and Operations.
The Urban Setting.
Three Approaches to Physical Protection.
Public Space Versus Private Space.
Creating and Updating a Security-Conscious Building Plan.
Single-User Versus Multi-User Facilities.
A Word of Caution.
Storage of Volatile Materials.
Establishing a New Physical Security Plan.
Budgeting and Startup.
The Security Station.
Points of Egress and Refuge.
Fire Suppression and Alarm.
Interior Planning and Design.
Other Interior Spaces.
Chapter Six: Chemical, Biological, and Radiological Agents.
Chapter Seven: Responses to Emergency Events.
Emergency Response Teams and Plans.
Shelter from Severe Weather.
Weather Forecasting Sources.
Health, Safety, and Security.
Fresh Air and Lighting.
Chapter Eight: Security Devices and Systems.
Review of Security Devices and Systems.
A Word About Privacy and Security.
Chapter Nine: Integration of Security and Related Systems.
Information Technology Security.
Proprietary or On-Site Systems.
Off-Site Monitored Systems.
Components of Security Monitoring Stations.
Integration and Enterprise Security and Safety.
What Components Should Be Integrated?
Deciding Which Systems to Integrate, and When.
Part Two: Security Cost Data.
Introduction to the Cost Data.
How to Use the Cost Data: The Details.
How to Use the Unit Price Pages.
Unit Price Section.
How to Use the Assemblies Cost Tables.
Part Three: Appendix, Resources, Glossary, and Index.