Dedication Preface Introduction PART I. Approaches to Crime Prevention & Loss Prevention Chapter 1. Introduction to Vulnerability Assessment Risk Management and Vulnerability Assessment Risk Assessment and the Vulnerability Assessment Process Statistics and Quantitative Analysis Vulnerability Assessment Process Overview Reporting and Using the Vulnerability Assessment Systems Engineering and Vulnerability Assessment Summary Chapter 2. Vulnerability Assessment Process Inputs -- Establish Protection Objectives Defining the Threat Asset Identification Facility Characterization Summary Chapter 3. Designing Security and Working with Architects Leadership in Energy and Environmental Design CPTED Planning and Design Review2 Physical Security Systems Glossary of Terms* Chapter 4. Designing Crime Risk Management Systems Understanding Crime Risk Management Who is the Manager? The Place Manager-Practitioner Relationship Crime Pattern Analysis Conducting the Security Survey Determination of Probable Maximum Loss Making Recommendations to Place Managers Conclusion Chapter 5. Approaches to Physical Security Levels of Physical Security The Value of Planning Physical Barriers The Security Plan Conclusion Chapter 6. Security Surveys and the Audit The Best Time to Conduct the Survey Why Conduct a Security Review Classification of Survey Recommendations Developing Security Points Nine Points of Security Concern Personality of the Complex Positive and Negative Aspects of making Recommendations Crime Analysis Key Control Digital Closed-Circuit Television Intrusion Alarms Lighting and Security Other Security Aspects Security Survey Follow-Up Residential Security Home Security Checklist Top Ten Security Threats The Audit Appendix 6.
A Site Survey and Risk Assessment* Appendix 6.B Physical Security Survey* Appendix 6.C Plant Security Checklist* Appendix 6.D Security Officers Checklist* Appendix 6.E Office Security Checklist Appendix 6.F Home Security Checklist* Appendix 6.G Fire Safety Inspection Appendix 6.H Bullet-Resistant Glazing for a Secure Workplace Appendix 6.
I Window Film Chapter 7. CPTED in the Twenty-First Century The Transition to the Future of CPTED CPTED in the New Millennium CPTED Applications Objectives for Commercial Environment Downtown Streets and Pedestrian Areas The Three-D Approach Crime Prevention Through Environmental Design2 Defensible Space Crime-Prevention Model The Environmental Influence on Criminal Behavior Chapter 8. Environmental Criminology and Crime Control Introduction Twenty-Five Techniques of Situational CRIME Prevention Four Components of Situational Crime Prevention, Part II Conclusion Chapter 9. Problem Solving -- Community Policing What is a Problem? What is Community Policing? The Sara Problem-Solving Model Chapter 10. Neighborhood Watch Guidelines for the Twenty-First Century Introduction Ten Secrets of Neighborhood Watch The Practitioner Safety Checklist for Apartments Robbery Prevention -- Tips for Small Business Burglary Prevention -- Tips for Small Business Suspicious Situations to Report Vehicle Theft -- A Big Problem Safety Skills for Children Street Smarts -- How to Protect Yourself The Con Artist Crime Prevention Tips for Senior Citizens Take Action -- Stop the Violence Protection from Telemarketing Fraud Crime Prevention Tips At ATMs Chapter 11. Situational Crime Prevention and Opportunity Blocking Introduction Opportunity Blocking Sixteen Techniques of Situational Crime Prevention in Public Housing Crime Control Strategy and Tactics Chapter 12. Design and Evaluation of Physical Protection Systems Safety Versus Security Deterrence Process Overview Physical Protection System Design PPS Functions Design Goals Design Criteria Analysis Physical Protection System Design and the Relationship to Risk Summary Chapter 13. Planning, Management, and Evaluation The Concepts Defined Statistical Information: The Backbone for Design of a Prevention Program Crime Statistics Demographic Data Efficiency Analysis: Measuring Activity Effectiveness Analysis: Measuring Program Impact Attitudinal Analysis: Gathering Opinions on the Program Impact A Strategy to Facilitate Implementation of the Evaluation Chapter 14.
Crime Analysis Introduction Don''t be Discouraged by the Displacement Doomsters Pay Attention to Daily and Weekly Rhythms Identify Risky Facilities Chapter 15. Standards, Regulations and Guidelines Introduction Standards Regulations Guidelines Managing Compliance Resources PART II. Security Operations, Tools, and Technology Chapter 16. Access Control, Access Badges, and Biometrics Characteristics Access Control Designated Restricted Areas Degree of Security Considerations Employee Screening Identification System ID Methods Mechanized/Automated Systems Card/Badge Specifications Visitor Identification and Control Visitors Enforcement Measures Sign/Countersign and Code Word Duress Code Access-Control Rosters Methods of Control Security Controls of Packages, Personal Property, and Vehicles Tactical-Environment Considerations Biometrics Characteristics2 Chapter 17. Alarms Components of Alarm Systems Application Alarm Equipment Overhaul Additional Resources Conclusion Glossary for Alarm Systems* Appendix 17.A Smoke Detectors Appendix 17.B Alarm Certificate Services Glossary of Terms Certificate Types* Appendix 17.C Fire Classifications Chapter 18.
Video Technology Overview Overview The Video System The Camera Function Scene Illumination Scene Characteristics Lenses Cameras Transmission Switchers Quads and Multiplexers Monitors Recorders Hard-Copy Video Printers Ancillary Equipment Summary Glossary for CCTV Chapter 19. Security Lighting Introduction Illumination3 Twenty-Five Things you Need to Know About Lighting7 Energy Management Lighting Definitions Web Sites Appendix 19.A Lighting Description Chapter 20. Information Technology Systems Infrastructure Introduction Basics of TCP/IP and Signal Communications TCP/UDP/RTP User Datagram Protocol Networking Devices Network Infrastructure Devices Servers Network Architecture Network Configurations Creating Network Efficiencies Digital Video Digital Resolution Frame Rates Display Issues Managing Data Systems Throughput System Architecture Interfacing to other Enterprise Information Technology Systems Summary Chapter 21. Information Security Introduction Three Basic Categories of Information Determining the Value of Information Case Study -- A Process for Determining Information Value The Protection of Automated Information and High-Technology Equipment IAPS Organization Responsibilities IAPS Management Job Description IAPS Staff Job Descriptions Information Assurance and Protection Program (IAPP) Summary Chapter 22. Protective Barriers Overview Perimeter Entrances Barrier Planning Fence Standards Types of Security Fences Conclusion Chapter 23. Physical Barriers Doors Roofs Floors Fences Walls and Moats Chapter 24. Fence Standards Recommendations Security Planning Material Specifications Design Features and Considerations Typical Design Example Chapter 25.
The Use of Locks in Physical Crime Prevention Lock Terminology and Components Key-Operated Mechanisms Combination Locks Lock Bodies Door Lock Types Strikes Attacks and Countermeasures Locks and the Systems Approach to Security Appendix 25.A Key Control* Appendix 25.B Key Control and Lock Security Checklist* Appendix 25.C Terms and Definitions for Door and Window Security* Chapter 26. Safes, Vaults, and Accessories Choose The Right Container UL-Rated Combination Locks Relocking Devices Locking Dials Lockable Handles Time Locks Time-Delay Combination Locks Alarmed Combination Locks Vision-Restricting and Shielded Dials Combination Changing Safe Burglaries Overcoming Safe-Opening Problems Appendix 26.A Rating Files, Safes, and Vaults* Chapter 27. Guard Service in the Twenty-First Century Liabilities Connected with a Security Force Power and Authority of the Security Guard Training Report Writing Weapons Safety Safety Bomb Threats Bomb Search Fire Protection Fire Prevention Emergency.