Physical Security Assessment Handbook, 2nd Edition: An Insider’s Guide to Securing a Business Front Cover

Physical Security Assessment Handbook, 2nd Edition: An Insider’s Guide to Securing a Business

  • Length: 330 pages
  • Edition: 2
  • Publisher:
  • Publication Date: 2024-07-24
  • ISBN-10: 1032790806
  • ISBN-13: 9781032790800

Physical Security Assessment Handbook: An Insider’s Guide to Securing a Business, Second Edition has been fully updated to help you identify threats to your organization and be able to mitigate such threats. The techniques in this comprehensive book outline a step-by-step approach to:

  • Identify threats to your assets
  • Assess physical security vulnerabilities
  • Design systems and processes that mitigate the threats
  • Set a budget for your project and present it to company managers
  • Acquire the products through competitive bidding
  • Implement the recommended solutions

Each chapter walks you through a step in the assessment process, providing valuable insight and guidance. There are illustrations and checklists that help simplify the process and ensure that the right course is taken to secure your company. This book provides seasoned advice on the competitive bidding process as well as legal issues involved in facility security. After reading it, you will know how to assess your security needs, specify the right products, and oversee and manage the project and installation. It concludes with project implementation, and the necessary follow-up after installation, to verify the proper use of the new security solutions.

Physical Security Assessment Handbook, Second Edition provides a structure for best practices in both specifying system components as well as managing the acquisition and implementation process. It represents the culmination of the author’s 44 years of experience in the design, installation, and project management of security system solutions. This is a valuable resource for security managers, security consultants, and even experienced industry professionals to best approach and organize security assessment projects.

To access the link, solve the captcha.