BKEFPHSC.RVW 20020503 "Effective Physical Security", Lawrence J. Fennelly, 1997, 0-7506-9873-X, U$44.99 %A Lawrence J. Fennelly %C 225 Wildwood Street, Woburn, MA 01801 %D 1997 %G 0-7506-9873-X %I Butterworth-Heinemann/CRC Press/Digital Press %O U$44.99 1-800-366-BOOK %O http://www.amazon.com/exec/obidos/ASIN/075069873X/robsladesinterne %P 289 p. %T "Effective Physical Security, Second Edition" Physical security tends to be an isolated, arcane, and misunderstood field: the general public tends to see it as inconvenient and unnecessary, and the practitioners tend to learn it by (often difficult) experience. This book has a number of gaps in coverage, but provides useful guidance in a number of areas. Part one is involved with design. Chapter one starts by suggesting that security be first considered at the initial architecting stage, and then goes on to provide a number of checklists of points to consider. The lists are good, and fairly comprehensive, but terse, and without much explanation. One item, for example, notes "[l]ines of vision," without going into details about considerations for sight lines from guard positions over entrances and driveways, from the street into and around buildings, and for the occupants to the entrances and surrounding area. Chapter two discusses security surveys and risk analysis. The main body has explanatory material (including pointers on how to write and present such an assessment) and is backed up by appendices detailing questions and elements for different types of studies. Extensive detail on environmental (exterior) design, including landscaping and parking, is provided in chapter three. A more conceptual overall review of physical security is given in chapter four. Part two deals with equipment. Chapter five explains considerations for physical barriers such as doors, roofs, and fences. The coverage of locks is possibly more than anyone except a locksmith might want, but chapter six does outline a number of considerations that would be important, even for non-specialists. Vaults and safes are discussed in chapter seven. Chapter eight's material on lights and lighting is somewhat more generic, but still useful. Intrusion sensors and alarms are covered in chapter nine. Provision for, and the requirements of, closed circuit television (CCTV) is explained briefly in chapter ten. Chapter eleven is a very short look at wiretapping. Physical access to computer systems gets chapter twelve all to itself. Chapter thirteen reviews electronic access control systems, and the need for integration and management. Part three discusses operations. Chapter fourteen takes a rather optimistic view of the capabilities and responsibilities of security guards (and is also the only chapter to mention fire and safety considerations). Bomb incident handling is outlined in chapter fifteen. Chapter sixteen, on public relations and the media, also contains discussion of how to promote security awareness within your own organization. While missing some areas of physical security, such as fire, safety, and disaster response, this is an extremely informative and useful guide. It is concise, readable, and reliable. I recommend this book to managers of physical plant, security guard firms (often asked for security assessments and resources), and information security professionals (who generally lack experience and knowledge of the physical aspects of their field). copyright Robert M. Slade, 2002 BKEFPHSC.RVW 20020503