Chapter 1: Introduction to Vulnerability Assessment -- Chapter 2: Physical Protection Systems Principles and Concepts -- Chapter 3: Getting Started -- Chapter 4: VA Process Inputs -- Establish Protection Objectives -- Chapter 5: Data Collection -- Intrusion Detection Subsystem -- Chapter 6: Data Collection-Alarm Assessment Subsystem -- Chapter 7: Data Collection-Entry Control Subsystem -- Chapter 8: Data Collection-Alarm Communication and Display Subsystem -- Chapter 9: Data Collection-Delay Subsystem -- Chapter 10: Data Collection -- Response Subsystem -- Chapter 11: Analysis Chapter -- 12: Reporting and Using Results -- Appendices.
0
Describes the vulnerability assessment process, from the start of planning through final analysis and out brief to senior management. This book addresses the spectrum of a VA, including negotiating tasks with the customer, project management and planning of the VA, team membership, details for performing the VA and data collection and analysis.
Vulnerability assessment of physical protection systems.
9780750677882
Security systems-- Evaluation.
BUSINESS & ECONOMICS-- Corporate Governance.
BUSINESS & ECONOMICS-- Leadership.
BUSINESS & ECONOMICS-- Organizational Development.