Building Security: Strategies & Costs / Edition 1

Hardcover (Print)
Buy New
Buy New from
Used and New from Other Sellers
Used and New from Other Sellers
from $35.95
Usually ships in 1-2 business days
(Save 62%)
Other sellers (Hardcover)
  • All (10) from $35.95   
  • New (6) from $44.98   
  • Used (4) from $35.95   


Theft, assault, corporate espionage, unauthorized systems access, terrorism, hurricanes and tornadoes, sabotage, vandalism, fire, explosions, and other threats… All are considerations as building owners, facility managers, and design and construction professionals seek ways to meet security needs.

This comprehensive resource will help you evaluate your facility’s security needs –  and design and budget for the materials and devices needed to fulfill them. The text and cost data will help you to:

  • Identify threats, probability of occurrence, and the potential losses – to determine and address your real vulnerabilities.
  • Perform a detailed risk assessment of an existing facility, and prioritize and budget for security enhancement.
  • Evaluate and price security systems and construction solutions, so you can make cost-effective choices.
  • Design security into new construction or remodeling projects – and integrate it with other building systems.
  • Put effective crisis management and emergency response teams and plans in place.



  • Over 130 pages of sample Means Cost Data for installation of security systems and materials.
  • Review of more than 50 security devices and construction solutions – how they work, and how they compare.
  • Interactive Risk Assessment Matrix, downloadable from a dedicated website, which helps you determine your real vulnerability, and where your security dollars should be invested.
Read More Show Less

Product Details

  • ISBN-13: 9780876296981
  • Publisher: Wiley
  • Publication date: 5/28/2003
  • Series: RSMeans Series , #48
  • Edition description: First Edition
  • Edition number: 1
  • Pages: 390
  • Product dimensions: 8.85 (w) x 11.30 (h) x 1.30 (d)

Table of Contents


About the Author and Contributors.


Part One: Risk Assessment and Security Planning.

Chapter One: People and Property.



Communications Security.

Conflicts Between Security and Safety.


Chapter Two: Identifying Security Threats.

What Can Happen.

Threats to Personnel Safety.

Theft of Property.

Vandalism and Sabotage.


Chapter Three: Assessing the Risks.

Assigning the Assessment and Response Team.

Periodic Review of Documentation.

Assembling a Risk Assessment Group.

Deciding Where to Focus Security Measures.

Assessing the Facility.

Assessment of Specific Risks.

Probability of Occurrence.

Assessing Facilities by Type.


Chapter Four: Crisis Management.

Making Crisis Management Plans.

Who Prepares the Plan?

What Are the Critical Objectives?

Teams and Teaming.

Chapter Five: Security through Planning, Design, and Operations.

The Urban Setting.

Three Approaches to Physical Protection.

Public Space Versus Private Space.

Creating and Updating a Security-Conscious Building Plan.

Single-User Versus Multi-User Facilities.

A Word of Caution.

Storage of Volatile Materials.

Protecting Utilities.

Ingress Concerns.

Establishing a New Physical Security Plan.

Budgeting and Startup.

The Security Station.

Points of Egress and Refuge.

Fire Suppression and Alarm.

Interior Planning and Design.

Other Interior Spaces.


Chapter Six: Chemical, Biological, and Radiological Agents.

Biological Agents.

Chemical Agents.



Chapter Seven: Responses to Emergency Events.

Emergency Response Teams and Plans.


Alert Systems.

Shelter from Severe Weather.

Weather Forecasting Sources.

Emergency Equipment.

Health, Safety, and Security.

Fresh Air and Lighting.


Chapter Eight: Security Devices and Systems.

Controlling Access.

Review of Security Devices and Systems.

Emergency Communications.

A Word About Privacy and Security.


Chapter Nine: Integration of Security and Related Systems.

Information Technology Security.


Proprietary or On-Site Systems.

Off-Site Monitored Systems.

Components of Security Monitoring Stations.

Integration and Enterprise Security and Safety.

What Components Should Be Integrated?

Integrated Components.

Deciding Which Systems to Integrate, and When.


Part Two: Security Cost Data.

Introduction to the Cost Data.

Quick Start.

How to Use the Cost Data: The Details.

How to Use the Unit Price Pages.

Unit Price Section.

How to Use the Assemblies Cost Tables.

Assemblies Section.


Location Factors.

Part Three: Appendix, Resources, Glossary, and Index.






Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)