Professional

Physical & Technical Security: An Introduction, 1st Edition

  • Robert Gruber Northern Virginia Community College - Manassas
  • ISBN-10: 1401850669  |  ISBN-13: 9781401850661
  • 352 Pages
  • © 2006 | Published
  • List Price = $ 180.95
  • For quantity discounts, Contact your Representative
  • For single copy purchases, visit CengageBrain.com

About

Overview

Multiple functions of physical security are presented in this A to Z guide. Physical and Technical Security: An Introduction furnishes readers with an industry-based perspective and a practitioner's point of view on all phases of physical security, including what works and what does not, through a careful mix of theory and practical application. Readers will obtain a solid foundation in both the technological and operational aspects of physical security through comprehensive coverage that explores such principal topics as security electronics, communications systems, test equipment, video and optics, alarm systems, computers and security software, access control, and more.

Features and Benefits

  • a chapter on Technical Surveillance Countermeasures (TSCM) fosters a basic awareness of corporate and government espionage required by security personnel
  • explores multiple functions of physical and technical security in one complete volume
  • coverage that is broad in scope and easy to read makes this an excellent reference for beginners and seasoned professionals alike
  • provides overview of technologies that support the security function in a modern organization

Table of Contents

CHAPTER 1 Planning and Defining Physical Security
CHAPTER 2 Security Electronics
CHAPTER 3 Communication Systems
CHAPTER 4 Test Equipment
CHAPTER 5 Tansmission Line Theroy
CHAPTER 6 Video and Optics
CHAPTER 7 Alarm Systems
CHAPTER 8 Computer and Security Software
CHAPTER 9 Low Tech Tools, Small Tools, and Methods of Use
CHAPTER 10 Locks, Keys, and Access Control
CHAPTER 11 Technical Surveillance Countermeasures
CHAPTER 12 Putting It Together With Risk Analyses and Physical Security Surveys
APPENDIX A Common Lock and Key Control Terms
APPENDIX B Answeres to Odd Numbered Questions
Appendix C Companies and Addresses
Index.

Supplements

All supplements have been updated in coordination with the main title. Select the main title's "About" tab, then select "What's New" for updates specific to title's edition.

For more information about these supplements, or to obtain them, contact your Learning Consultant.

Instructor Supplements

Instructor's Guide CD-ROM  (ISBN-10: 1401850677 | ISBN-13: 9781401850678)

Computer Security Assurance  (ISBN-10: 1401862659 | ISBN-13: 9781401862657)

Written in a friendly and easy-to-understand tone, Computer Security Assurance Using the Common Criteria helps readers navigate through all the activities within the Common Criteria (CC) that have gained the attention of the security community and will revolutionize how people compare, select, purchase, and maintain security systems. Practical examples aimed at deciphering the contents and activities within the CC help build an understanding that places readers on a path to real-world security assurance applications. Up-to-date coverage explains IT security assurance methodologies and the activities within any of the CC-defined user roles that are necessary for high quality and proven secure IT software and hardware.

List Price = $263.95  | CengageBrain Price = $263.95  | College Bookstore Wholesale Price = $198.75

Information Security Intelligence: Cryptographic Principles & Applications  (ISBN-10: 1401837271 | ISBN-13: 9781401837273)

Safeguarding the confidentiality, authenticity, integrity, and non-repudiation of information is paramount to organizational stability and success. This new book provides an understanding of information security, potential threats to our information, and effective countermeasures to proactively combat those threats. A comprehensive review of cryptographic techniques is presented and explained in simple mathematical terms. The text covers symmetrical and asymmetrical encryption, digital signatures, Kerberos, creation/deployment of strong keys and passwords, Virtual Private Networks, SET, SSL, SSH, IPSec, and authentication techniques. A detailed examination of Tiny Encryption Algorithm (TEA) exposes readers to the inner workings of encryption. CD-ROM experiments help solidify the learning experience. Emphasis throughout is on the application of the cryptographic methods and support structures needed to effectively apply the principles to create a secure business setting.

List Price = $165.95  | CengageBrain Price = $165.95  | College Bookstore Wholesale Price = $124.75

Student Supplements

Computer Security Assurance  (ISBN-10: 1401862659 | ISBN-13: 9781401862657)

Written in a friendly and easy-to-understand tone, Computer Security Assurance Using the Common Criteria helps readers navigate through all the activities within the Common Criteria (CC) that have gained the attention of the security community and will revolutionize how people compare, select, purchase, and maintain security systems. Practical examples aimed at deciphering the contents and activities within the CC help build an understanding that places readers on a path to real-world security assurance applications. Up-to-date coverage explains IT security assurance methodologies and the activities within any of the CC-defined user roles that are necessary for high quality and proven secure IT software and hardware.

List Price = $263.95  | CengageBrain Price = $263.95  | College Bookstore Wholesale Price = $198.75

Information Security Intelligence: Cryptographic Principles & Applications  (ISBN-10: 1401837271 | ISBN-13: 9781401837273)

Safeguarding the confidentiality, authenticity, integrity, and non-repudiation of information is paramount to organizational stability and success. This new book provides an understanding of information security, potential threats to our information, and effective countermeasures to proactively combat those threats. A comprehensive review of cryptographic techniques is presented and explained in simple mathematical terms. The text covers symmetrical and asymmetrical encryption, digital signatures, Kerberos, creation/deployment of strong keys and passwords, Virtual Private Networks, SET, SSL, SSH, IPSec, and authentication techniques. A detailed examination of Tiny Encryption Algorithm (TEA) exposes readers to the inner workings of encryption. CD-ROM experiments help solidify the learning experience. Emphasis throughout is on the application of the cryptographic methods and support structures needed to effectively apply the principles to create a secure business setting.

List Price = $165.95  | CengageBrain Price = $165.95  | College Bookstore Wholesale Price = $124.75

Meet the Author

Author Bio

Robert Gruber

Robert Gruber, a former Marine, has served with US Naval Intelligence and with the Central Intelligence Agency. He managed his own security business for over a decade, and has been a Dean of Technology Programs spearheading a Security Engineering Technology program with DeVry University. He is a member of ASIS International, and serves on the association's educational council.