Integrated Security Systems Design
eBook - ePub

Integrated Security Systems Design

A Complete Reference for Building Enterprise-Wide Digital Security Systems

Thomas L. Norman

  1. 400 pagine
  2. English
  3. ePUB (disponibile sull'app)
  4. Disponibile su iOS e Android
eBook - ePub

Integrated Security Systems Design

A Complete Reference for Building Enterprise-Wide Digital Security Systems

Thomas L. Norman

Dettagli del libro
Anteprima del libro
Indice dei contenuti
Citazioni

Informazioni sul libro

Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program's overall effectiveness while avoiding pitfalls and potential lawsuits.

  • Guides the reader through the strategic, technical, and tactical aspects of the design process for a complete understanding of integrated digital security system design.
  • Covers the fundamentals as well as special design considerations such as radio frequency systems and interfacing with legacy systems or emerging technologies.
  • Demonstrates how to maximize safety while reducing liability and operating costs.

Domande frequenti

Come faccio ad annullare l'abbonamento?
È semplicissimo: basta accedere alla sezione Account nelle Impostazioni e cliccare su "Annulla abbonamento". Dopo la cancellazione, l'abbonamento rimarrà attivo per il periodo rimanente già pagato. Per maggiori informazioni, clicca qui
È possibile scaricare libri? Se sì, come?
Al momento è possibile scaricare tramite l'app tutti i nostri libri ePub mobile-friendly. Anche la maggior parte dei nostri PDF è scaricabile e stiamo lavorando per rendere disponibile quanto prima il download di tutti gli altri file. Per maggiori informazioni, clicca qui
Che differenza c'è tra i piani?
Entrambi i piani ti danno accesso illimitato alla libreria e a tutte le funzionalità di Perlego. Le uniche differenze sono il prezzo e il periodo di abbonamento: con il piano annuale risparmierai circa il 30% rispetto a 12 rate con quello mensile.
Cos'è Perlego?
Perlego è un servizio di abbonamento a testi accademici, che ti permette di accedere a un'intera libreria online a un prezzo inferiore rispetto a quello che pagheresti per acquistare un singolo libro al mese. Con oltre 1 milione di testi suddivisi in più di 1.000 categorie, troverai sicuramente ciò che fa per te! Per maggiori informazioni, clicca qui.
Perlego supporta la sintesi vocale?
Cerca l'icona Sintesi vocale nel prossimo libro che leggerai per verificare se è possibile riprodurre l'audio. Questo strumento permette di leggere il testo a voce alta, evidenziandolo man mano che la lettura procede. Puoi aumentare o diminuire la velocità della sintesi vocale, oppure sospendere la riproduzione. Per maggiori informazioni, clicca qui.
Integrated Security Systems Design è disponibile online in formato PDF/ePub?
Sì, puoi accedere a Integrated Security Systems Design di Thomas L. Norman in formato PDF e/o ePub, così come ad altri libri molto apprezzati nelle sezioni relative a Computer Science e Cyber Security. Scopri oltre 1 milione di libri disponibili nel nostro catalogo.

Informazioni

Anno
2014
ISBN
9780128001936
Edizione
2
Section II
Security System Design
4

Security System Design Elements

Abstract

Chapter 4 includes a brief description of security system design tools and the processes, which are elaborated on in Chapters 59.
This chapter contains information on the tools of security system design, the place of electronics in the overall security system process, how to establish electronic security program objectives, types of design efforts, and project drivers.
The tools of security system design include drawings, specifications, interdiscipline coordination, product selection, project management, and client management.
Drawings should show the relationship of the devices to their physical environment, the relationship of devices to the conduit system and power, the relationship of devices to each other, and the relationship of devices to the user. Drawings should be designed to serve the bid estimator, the installer, the project manager, the maintenance technician, and the engineer who will later expand the system.
Specifications describe what the system is, what products are acceptable, and how it should be installed. The specifications detail the requirements for interdiscipline coordination and project management.
The design process should begin with the establishment of a security program based on a comprehensive risk assessment. No part of a system should be designed without knowing what role it serves in the security policy.
Keywords
AutoCAD
Bid estimator
Client management
Conduit system
Integrator
Project Management Institute
Project Management Professional

Introduction

When it comes to integrated security systems designs, I do not recommend napkins as a design medium. This is especially true for enterprise security systems. These systems are highly integrated into their environments and often highly integrated into other systems. Knowledge is required. Skill is needed. Integrators who work from the “seat-of-the-pants” often leave the project with their pants on fire. Enterprise security systems design involves a set of tools and a process. The following is a brief description of the tools and the process, which will be elaborated on in Chapters 59.
This chapter contains information on the tools of security system design, the place of electronics in the overall security system process, how to establish electronic security program objectives, types of design efforts, and project drivers.

The Tools

The tools of design include drawings, specifications, interdiscipline coordination, product selection, project management, and client management.

Drawings

Drawings are the heart of the design. Drawings are discussed in detail in Chapter 10, but it is important to understand their strategic role in the process, which is described here. Drawings should show the following:
The relationship of devices to their physical environment (plans, elevations, and physical details)
The relationship of devices to the conduit system and to power (plans and risers)
The relationship of devices to each other (single line diagrams)
The relationship of devices to the user (programming schedules)
Drawings must serve five distinct types of users:
The bid estimator: The bid estimator must determine what materials are needed. Helpful drawing tools include device schedules (spreadsheets listing devices and their attributes) and plans showing device locations and conduit lengths, sizes, and wire fills. Other drawings useful to the bid estimator include single line diagrams, riser diagrams, and system interfacing diagrams.
The installer: The installer needs drawings that show both the big picture and the smallest details. Therefore, it is helpful if the drawings are formatted in a hierarchical fashion. Single lines show the big picture. Plans show device locations and their relationship to the building and conduit system. Physical details and interface details show the smaller details.
The project manager: The project manager needs to manage the progress of the installation, including coordinating the ordering and arrival of parts and supplies and coordinating manpower to the project at the correct time, in the correct place, and in coordination with other trades to get all devices mounted and all connections made. He or she will primarily rely on schedules for provisioning logistics, plans to measure installation progress, and single-line diagrams to gauge how close the system is to start-up.
The maintenance technician: After the system is installed, it is the maintenance tech’s turf. He or she will need single-line diagrams to determine how the system interconnects, plans to determine where devices are located and how they connect in the physical space, and risers and power schedules to know where to go from floor to floor and the source of power for each device. The integrator should be required to provide maintenance manuals that have all these drawings. I also recommend that the integrator be required to place a pocket on the inside door of each electronics assembly with an envelope containing the system single-line diagram, riser, and plans appropriate to service the equipment in that rack. Also, he or she should be required to install a field intercom station at each service location to communicate with the console to facilitate communications with another technician or console operator.
The next engineer expanding the system: Many systems undergo expansion on an irregular basis. You may not be the next engineer, but someone will be. He or she will need all of your drawings in order to understand how to expand the system. The client should receive all your drawings in AutoCAD® form and specifications in Adobe PDF form.

Specifications

Specifications are discussed in detail in Chapter 10, but it is important to understand their strategic role in the process, which is described here.
If drawings are the heart of the design, specifications are the head. Specifications generally take precedent in legal disputes. Drawings are just there to illustrate the standards and practices written into the specifications. If you are very long in your career, you will see some pretty bad specs. We used to joke in our office about someday seeing a set of specifications that simply says “Make it work real good.” Some come pretty close to that. We have seen security system specifications that are only five pages long. There is a lot of room there for serious mistakes by a well-meaning contractor. Many security system contracting problems are the result of incomplete or wrong specifications.
With possibly very few exceptions, most integrators I have met sincerely want to do well for their clients. It is the designer’s job to provide the integrator with enough information to do well. To the extent that drawings and specifications are incomplete, inaccurate, or misleading, the contractor can make unintended errors that will be costly and aggravating to the installer, the integrator for whom he or she works, and most certainly the system’s owner.
Specifications should include a description of what the project entails; descriptions of the whole integrated system and each subsystem; a description of the services the contractor will provide; and a list of acceptable products and acceptable installation, testing, acceptance, training, and warranty practices. Different specification formats prevail in different areas of the world, and occasionally these may change as building code authorities evolve in their preferences. This will all be covered in detail in Chapter 10.

Product Selection

Specifying the correct products for the job can result in a wonderful system that can easily exceed the owner’s expectations. The wrong products can leave the owner upset with the installer, the manufacturer, and the designer. Here is where the designer has to have free reign to do what is in the best interest of the client. To the extent that the designer is placed under pressure to specify one brand or another due to market forces, I assure you that the owner will suffer. If the owner suffers, everyone suffers. The operator suffers, the maintenance tech suffers, the integrator who has to listen to an unhappy client suffers, the manufacturer suffers, and the industry suffers. Countless manufacturers and integrators have lost repeat work (and lost client referrals) due to expediencies in ...

Indice dei contenuti

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. About the Author
  6. Dedication
  7. Preface
  8. Section I: Introduction to Integrated Security Systems
  9. Section II: Security System Design
  10. Section III: Special Design Sections
  11. Index
Stili delle citazioni per Integrated Security Systems Design

APA 6 Citation

Norman, T. (2014). Integrated Security Systems Design (2nd ed.). Elsevier Science. Retrieved from https://www.perlego.com/book/1828229/integrated-security-systems-design-a-complete-reference-for-building-enterprisewide-digital-security-systems-pdf (Original work published 2014)

Chicago Citation

Norman, Thomas. (2014) 2014. Integrated Security Systems Design. 2nd ed. Elsevier Science. https://www.perlego.com/book/1828229/integrated-security-systems-design-a-complete-reference-for-building-enterprisewide-digital-security-systems-pdf.

Harvard Citation

Norman, T. (2014) Integrated Security Systems Design. 2nd edn. Elsevier Science. Available at: https://www.perlego.com/book/1828229/integrated-security-systems-design-a-complete-reference-for-building-enterprisewide-digital-security-systems-pdf (Accessed: 15 October 2022).

MLA 7 Citation

Norman, Thomas. Integrated Security Systems Design. 2nd ed. Elsevier Science, 2014. Web. 15 Oct. 2022.