Theft, assault, corporate espionage, unauthorized systems access, terrorism, hurricanes and tornadoes, sabotage, vandalism, fire, explosions, and other threats… All are considerations as building owners, facility managers, and design and construction professionals seek ways to meet security needs.
This comprehensive resource will help you evaluate your facility’s security needs – and design and budget for the materials and devices needed to fulfill them. The text and cost data will help you to:
- Identify threats, probability of occurrence, and the potential losses – to determine and address your real vulnerabilities.
- Perform a detailed risk assessment of an existing facility, and prioritize and budget for security enhancement.
- Evaluate and price security systems and construction solutions, so you can make cost-effective choices.
- Design security into new construction or remodeling projects – and integrate it with other building systems.
- Put effective crisis management and emergency response teams and plans in place.
- Over 130 pages of sample Means Cost Data for installation of security systems and materials.
- Review of more than 50 security devices and construction solutions – how they work, and how they compare.
- Interactive Risk Assessment Matrix, downloadable from a dedicated website, which helps you determine your real vulnerability, and where your security dollars should be invested.
|Series:||RSMeans Series , #48|
|Edition description:||First Edition|
|Product dimensions:||8.85(w) x 11.30(h) x 1.30(d)|
Table of Contents
About the Author and Contributors.
Part One: Risk Assessment and Security Planning.
Chapter One: People and Property.
Conflicts Between Security and Safety.
Chapter Two: Identifying Security Threats.
What Can Happen.
Threats to Personnel Safety.
Theft of Property.
Vandalism and Sabotage.
Chapter Three: Assessing the Risks.
Assigning the Assessment and Response Team.
Periodic Review of Documentation.
Assembling a Risk Assessment Group.
Deciding Where to Focus Security Measures.
Assessing the Facility.
Assessment of Specific Risks.
Probability of Occurrence.
Assessing Facilities by Type.
Chapter Four: Crisis Management.
Making Crisis Management Plans.
Who Prepares the Plan?
What Are the Critical Objectives?
Teams and Teaming.
Chapter Five: Security through Planning, Design, and Operations.
The Urban Setting.
Three Approaches to Physical Protection.
Public Space Versus Private Space.
Creating and Updating a Security-Conscious Building Plan.
Single-User Versus Multi-User Facilities.
A Word of Caution.
Storage of Volatile Materials.
Establishing a New Physical Security Plan.
Budgeting and Startup.
The Security Station.
Points of Egress and Refuge.
Fire Suppression and Alarm.
Interior Planning and Design.
Other Interior Spaces.
Chapter Six: Chemical, Biological, and Radiological Agents.
Chapter Seven: Responses to Emergency Events.
Emergency Response Teams and Plans.
Shelter from Severe Weather.
Weather Forecasting Sources.
Health, Safety, and Security.
Fresh Air and Lighting.
Chapter Eight: Security Devices and Systems.
Review of Security Devices and Systems.
A Word About Privacy and Security.
Chapter Nine: Integration of Security and Related Systems.
Information Technology Security.
Proprietary or On-Site Systems.
Off-Site Monitored Systems.
Components of Security Monitoring Stations.
Integration and Enterprise Security and Safety.
What Components Should Be Integrated?
Deciding Which Systems to Integrate, and When.
Part Two: Security Cost Data.
Introduction to the Cost Data.
How to Use the Cost Data: The Details.
How to Use the Unit Price Pages.
Unit Price Section.
How to Use the Assemblies Cost Tables.
Part Three: Appendix, Resources, Glossary, and Index.