Buy Now

Buy This Book Online

Find A Local Bookstore

,

Security Technology Convergence Insights

ISBN: 0128028424

About This Book

Print Friendly, PDF & Email

You'll find dozens of ideas—from two decades of working in the area of Security/IT convergence—that you can apply to your own security technology projects.

Take a peek at the Table of Contents below and the 66 specific insight topics presented in the book.



Table of Contents

  • Foreword
  • Preface
  • Acknowledgements
  • About the Author
  • Introduction
  • Four Categories of Convergence
  • Mastering Convergence
  • Integration of Physical Security and Logical Security
  • Why Convergence Didn’t Really Disappear
  • Trends a Decade into Convergence
  • The Value of Technology
  • How Hacking is Changing the Physical Security Industry World
  • Security Industry Wake Up Call!
  • Convergence in Design: Virtual Construction
  • Collaboration between Physical Security and IT
  • How IT Can Help Physical Security System Planning
  • The Scope of Security Systems Integration
  • Convergence Roles and Responsibilities
  • Service Level Agreements
  • Convergence Collaboration Collisions
  • Security Video Requires Convergence Collaboration
  • Data Security for Corporate Security Departments
  • Financial Impact of Cyber Risk
  • Protecting Information in Human Memory
  • Network Protection for Security Systems
  • Physical Security for Computing Systems
  • Let IT Be Your Force Multiplier
  • Security Patrols for Desktop Security
  • ROI for Convergence Education and Training
  • Certifications Relevant to Convergence
  • Knowledge Gap: Customers and Security Integrators
  • Learning about IP-Based Systems
  • Maximizing Your Progress in the New Year
  • Convergence Initiatives: Timing Can Be Critical
  • Convergence and Layers of Security
  • Levels of Security
  • Why Do I Need a Technology Roadmap?
  • Power over Ethernet (PoE)
  • PSIM and DATA: What’s the Difference?
  • Impact – The Pace of Technology Development
  • Technology Blinders
  • Addressing Risks in Real Time
  • Who Specified This?
  • The Deadlocking Plunger Weakness
  • Smart Projects
  • Smart Perimeter Detection Projects
  • Backup Power for Video Systems
  • Uninterruptible Power Supply (UPS) Integration for Video
  • Standards Can Provide Significant Benefits
  • Lessons Learned: Physical Security & IT Collaboration
  • Single Logical-Physical Access Card Standards?
  • Where Do Standards Lead?
  • Technology Roadmap Match-Up
  • Benefits of Access Card Convergence
  • Security Cameras for Business Operations Use
  • Sharing Security Technology with Business Units
  • Automating Workforce Management
  • Wireless Analog Opens Vulnerability
  • Responsible Disclosure and Physical Security Risk
  • Facing Up to Lock and Key Denial
  • Wheels or Electrons?
  • Simple Network Management Passion
  • Log Me In, Scotty!
  • Costly Cable Kinks
  • Tech Projects Undermined by Poor Training and Documentation
  • Read the Release Notes!
  • Detecting the Gradual Loss of Video Network Capacity
  • Ongoing Maintenance for Outdoor Security Cameras
  • The Facility Code Access Control Vulnerability
  • Caught on Video: Trees Stealing Video Disk Storage
  • Prank – or Bigger Threat?