Design and Evaluation of Physical Security Systems, 2e, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.
* New chapter on transportation systems
* Extensively updated chapter on threat definition
* Major changes to response chapter
Design and Evaluation of Physical Security Systems, 2e, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.
* New chapter on transportation systems
* Extensively updated chapter on threat definition
* Major changes to response chapter
Authoritative and thorough update of the book referred to as the "bible" of Physical Security!
Part One
1. Design and Evaluation of Physical Protection Systems
2. Facility Characterization
3. Threat Definition
4. Target Identification
Part Two
5. Physical Protection System Design
6. Exterior Intrusion Sensors
7. Interior Intrusion Sensors
8. Alarm Assessment
9. Alarm Communication and Display
10. Entry Control
11. Access Delay
12. Response
Part Three
13. Analysis and Evaluation
14. EASI Computer Model for Analysis
15. Risk Assessment
16. Transportation System application
Appendix
A. Threat tables
B. EASI Model
Ms. Garcia is a Senior Member of the Technical Staff at Sandia National Labs. She has over 20 years experience in Science and Engineering research, development, application, teaching, and project management experience of security systems and technology. She has been a certified Protection Professional since 1997.
"Personally, I consider the first edition of this book to be a classic. For anyone who really knows security, this book is the bible. It is just the way it has to be done."--Dennis Giever, PhD, Dept. of Criminology, University of Pennsylvania
![]() |
Ask a Question About this Product More... |
![]() |