Autor: |
Khairallah, Michael |
Zdroj: |
Physical Security Systems Handbook; 2005, p51-81, 31p, 2 Diagrams, 3 Charts |
Abstrakt: |
Chapter 3 of the book "Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems," by Michael Khairallah, is presented. This chapter highlights the techniques employed in conducting a vulnerability study to determine the threats discovered during the Physical Threat Assessment. A Vulnerability Study identifies all openings in the protected perimeter and creates the optimum means to control and monitor such openings. |
Databáze: |
Supplemental Index |
Externí odkaz: |
|