Index
Note: Page numbers followed by f indicate figures.
A
Access card reader
356
Access control panels
attributes and components
communications infrastructure
222
electronics panel
223
field elements
222
fourth generation systems
222
second and third generation systems
221–222
security system development theme
222, 223
server(s)
222
software
222
workstation(s)
222
Communications Board
digital protocol
224
EPROM
225
input/output interfaces
225–226
power supply and battery
224
RAM
225
TCP/IP
224
electronics
356
form factors
cost reduction
227
functionality increase
227
Input and Output boards
226
microcontrollers
228
2, 4, 8, or 16 door connections
226
SQL
228
user experience improvement
227
virtually unlimited functionality
228
functions
alarm status information, alarm inputs
229
anti-passback event
230
authorized user, parking structure
230
building core lighting
230
building signage lighting
230
decision making
229
downloaded data, server(s)
228–229
event data
229
fifth generation systems
229
night
230
output control, relay activation
229
weekend day/holiday
230
working day
230
local and network connections
digital video and intercom systems
233, 234
echelon systems
232
Ethernet (TCP/IP)
233
multicast protocol
234
RS-232
232
RS-422
233
RS-485
232–233
UDP/IP and RTP/IP
234
VLAN
234
locations
230–232
and networks
9
redundancy and reliability factors
A/C power
236
digital communications
237
good data infrastructure
236
good design
235
good power
235–236
good wiring and installation
235
heartbeat and watchdog timer
237
mission critical systems
234–235
servers
237
Access control portals
alarm monitoring
41
common type
39–40
credential readers
40
electrified locks
40
pedestrian portal types
automated wall
73–74
automatic doors
69–71, 70f, 71f
man-trap
73, 73f
revolving doors
71–72, 72f
standard doors
68–69, 69f
turnstiles
72–73, 73f
pedestrian and vehicle types
39, 39f
portal passage concept
anti-passback schemes
68
card entry/card exit
66
card entry/free exit
66, 66f
2-Man Rule
67
positive access control
67, 67f
scheduling
68
tailgate detection
66–67, 67f
request-to-exit sensors
41
safety systems
40–41
tailgating
40
vehicle portals
automated roll-up vehicle gates
76, 76f
automated sliding vehicle gates
75–76, 75f
automated vehicle swing gates
75, 75f
high-security barrier gates
76–77, 76f
sally ports
77, 77f
standard barrier gates
74–75, 74f
Access credential and credential reader
access cards, key fobs, and card readers
125 KHz active proximity cards
57
125 K passive proximity cards
57
magnetic stripe cards
53, 54
13.56 MHz contactless smart cards
57
multi-technology cards
58, 58f
RFID wireless transmitter systems
57–58
Wiegand wire cards
55–56, 56f
biometric readers
authorized user
59
definition
58
fingerprint reader
58, 59f
hand geometry reader
58, 59f
identification readers
59
iris reader
58, 59f
photo identification
60
unique vs. individual attributes
58
verification readers
59
evidence of authority
51–52
identification card and bars
52
keypads
52–53
Alarm/access control system industry
avoiding obsolescence
automated password function
217
four-channel digital switch
217
microcontrollers
217
planned obsolescence
216
unplanned obsolescence
216
digital video industry
208
fifth generation
BAS
215
detection system
214–215
DSP chips
215
edge devices
215–216
EPROM
214
Ethernet architectures
215
logical functions
214–215
microcontrollers
215–216
PLCs
214, 215
reference databases
215
software-based functions
215
first generation
Hotel Room Doors
209, 209f
McCulloh Loop telegraph-type alarm system
208–209, 209f
Night Watchmen
208
Police Call Boxes and Fire Pull Stations
208–209
security technology, intercoms and CCTV
209
fourth generation
6502 and 8088 8-bit microprocessors
211
4-bit microprocessor
211
consumer videocassette recorders
212–213
controller microcomputer
211–212
ENIAC computer
211, 212f
intercoms
212, 213
mini-computer
211–212
stalled progress
213–214
system interfaces
213
integrated security system
208
“me too” approach
207
second generation
210, 210f
third generation
210–211
Alarm kit (ALK)
145–146
Alarm management
402–403
Alternating current (AC)
126, 127
Aluminum conduit
342
Ashtray keypad
52
Astragal
113
Authorities Having Jurisdiction (AJH)
82
Authorization
7
Automatic doors
bi-fold door
71
4-fold door
71, 71f
materials handling areas
69
one-/two-leaf swing door
69–70
sliding door
70–71, 70f
swing door operation
70, 70f
B
Barcode cards
54, 54f
Barium ferrite cards
54
Bill of quantities (BOQ)
368
Bistatic microwave detection systems
290
Blumcraft electrified door hardware
182, 183f
Building automation systems (BAS)
215, 326–327
Building/facility systems
Direct Action Interfaces
328
elevators
326
Feedback Interfaces
328–329
lighting
327–328
Proxy Action Interfaces
328
stairwell pressurization
326–327
Threat Actors
325
Building management systems (BMS)
C
Cables
brands
340–341
colors
340
conduit
bends
345
conduit fill
343–345
fire protection
345
indoor applications
343
outdoor applications
343
wireways
342
copper/fiber
337
documentation
348–349
dressing
cross-dressing
348
definition
346
nightmares
346, 347f
rules
347
system troubleshooting
346–347
handling
nightmares
345–346
system troubleshooting
346
insulation
339
stranded vs. solid core wires
339
voltage and power classes
338
wire gauge
338–339
Cable Trays
342
Cardkey systems
211
Card readers
210
Central processing unit (CPU)
attributes and components
221–222
Communications Board
224–225
Classroom lock
139
Classroom security
139
Client management
369–370
Closed-circuit television (CCTV)
fifth generation
215–216
first generation
208–209
fourth generation
212–213
second generation
210
Command, control, and communications (C3) Consoles
318
Communication systems
10
Consolidated communication systems (CCS)
316–317
Copper/fiber cables
337
Corridor lock
139
Crash-rated gates
201, 202
Credential readers
access control portals
40
credential authorization
42
D
Database management
401–402
Daughter boards
226
Dead-bolt equipped electrified mortise lock
164–165, 164f
Dead bolt monitoring switch
148
Delayed egress locks
electrified locks
170–171, 171f
fire ratings
108
magnetic locks
132, 132f
Digital signal processing (DSP) chips
215
Digital video recorders (DVRs)
309–310, 309f
Direct attached storage (DAS)
310, 311, 311f
Direct current (DC)
126, 127
Distributed cluster management
245
Door lock relay
200
Door lockset selection
door description
automatic door
179–180
EPH with vertical rods
180
fire-rated doors
178–179
FM-200 fire suppression system
178
hollow–metal
179
double-egress doors, hospital corridor
187–188
framed glass door
180–182, 181f
Herculite™ lobby doors
182, 183f
high-rise building stair-tower door
dead bolt
184–185
hi-tower lock
182, 183f, 185
hollow metal door
182–184
robust electrified lock
184
stair-tower door
184
inswinging office door
188–190
office suite door
186–187
revolving door, emergency egress side door
190–191
standard application rules
177
warehouse rear-exit door with hi-value equipment
185–186
Door position switch (DPS)
270
Door types
bi- and 4-fold doors
103
and frames
7–8
frames and mountings
aluminum
101
hollow metal
101
mounting methods
101–102
wood
101
overhead doors
102
revolving doors
102–103
security
93–94
single- and double-leaf swinging doors
balanced doors
100, 100f
framed glass doors
96–97, 97f
hollow metal doors
95, 95f
pivoting doors
99–100, 99f
solid core wood doors
95–96, 96f
total doors
98–99, 99f
unframed glass doors
97–98, 98f
sliding panel doors
103
Dormitory lock
140
Dot commands
211
Duress Alarms
293–294
E
Electrical metallic tubing (EMT)
341
Electrical non-metallic tubing (ENT)
341
Electric latch retraction (EL)
145
Electric mortise lock device
145
Electric rim device
145
Electric strikes
123, 123f
Electrified dead-bolt locks
concealed direct-throw mortise dead-bolt lock
164, 164f
dead-bolt equipped electrified mortise lock
164–165, 164f
gate locks
165–166, 165f
safety provisions
166
surface-mounted
163, 163f
top-latch release bolt
165, 165f
Electrified locks
8, 9
access control portals
40
circuit controls
129–130
CRL-Blumcraft panic hardware
beautiful and egress door
172, 173f
C.R Laurence Co., Inc
172
panic bar mechanism
172, 173f
top-latching panic hardware montage
172, 174f
dead-bolt equipped panic hardware
169–170
delayed egress lock
170–171, 171f
electric strike pocket
44
electrified mortise and cylinder locks
43
electrified panic hardware
44, 86, 86f
essential attributes
86
evolution
121
fire ratings
114
hi-tower lock
171–172, 171f
infinite array
86
key distribution
120
lost keys
120
magnetic lock
43
mechanical
86
mortise lock
87, 87f
no special knowledge exit
85
operation
cylindrical lock
124
electric strikes
123, 123f
electrified dead bolts
125, 125f
electrified panic hardware
124, 124f
electromagnetism
122
electromechanical locks
122–123
magnetic lock
124–125, 124f
mortise lock
123, 123f
paddle-operated electromechanical dead bolts
126, 126f
plate and shear locks
43
power supplies
126–127, 126f
Securitech locks
170
types
121–122
electrified cylinder locks
131
electrified dead bolts
131
electrified strikes
131
magnetic locks
131–132
wiring considerations
127–129
constant voltage
128
Ohm's Law
127–128
total resistance
127
voltage drop
128–129
Electrified panic hardware
371–372
Electronic access control systems
access control panel
37
access groups
38
access zones
38
authorized users
37
credential authorization
42
data, data retention, and reports
45
digital networks
37
elements
35, 36
locks, alarms, and exit devices
43–45
Manhattan Project physical security
42
portals
alarm monitoring
41
common type
39–40
credential readers
40
electrified locks
40
pedestrian and vehicle types
39, 39f
request-to-exit sensors
41
safety systems
40–41
tailgating
40
scheduling
38
user groups
38
Electronic circuitry sensitivities
355
Electronic dead-bolt locks
8
Electronic security system
265
Electronic turnstile
electronic beams and circuit embedded type
72–73
“paddles”/“glass wings,”
72, 73f
positive access control
67, 67f
throughput and safety provision
72–73
Emergency generator
231
End-of-line resistors
395
Enterprise-class security systems
269, 270, 272
Entry set
140
Environmental factors, system failures
dirt
358
humidity/condensation
357
insects, birds, snakes, and other creatures
358–359
lighting
359
temperature extremes
356–357
vibrations
357–358
Erasable programmable read-only memory (EPROMs)
213–214, 225
Ethernet architecture
215
Exit push button
88–89
Explosives detection methods and systems
dogs
294
millimeter wave scanners
295
package X-ray scanners
295
personnel X-ray scanners
295
spectrographic detection systems
295–296
types
294
visual inspection approaches
294
F
Facility Managers
6
Fail-over host server
246
Fail-Safe locks
40
Fail-Secure locks
40
Fiber-optic cables
337, 348
Fingerprint reader
58, 59f
Fire ratings
basic fire egress concept
108
door assembly ratings
glass doors
110
louvers
111
temperature rise doors
110–111
three-fourths rule
110
electrified locks
114
fire door frames and hardware
fire exit hardware
112
latching devices
111
life safety code
108
pairs of doors
astragal
113
double egress doors
112
inactive leaf
112
latching hardware
112
smoke and draft control
113
path of egress doors
113–114
penetration ratings
time
109
wall ratings
109
two broad exceptions
108
Flexible metallic conduit (FMC)
342
Flexible metallic tubing (FMT)
342
Force Multiplier
5
Foundational security
access control portal
17, 17f
risk management
credential programming
30
group and schedule programming
30
methods
22–23
portal programming
30
program elements, security
23–24
risk analysis
24
security and access control programs
23
security countermeasures
25–26
security policies and procedures
24
types of areas/groups
29
types of users
29
user schedules
30
understanding risk
criticalities and consequences
21
organization asset types
18, 18f
probability
22
threat actors
19–21
types of users
19
vulnerability
21
“Frame Actuator Controlled” strike plate
172
Framed glass doors
96–97, 97f, 180–182, 181f
Frame spreader
372
Free egress electrified locks
8
electric strikes
AC/DC version
147–148
fail-safe/fail-secure functions
147
latch keeper
147
mechanical lock
147
switches
148
electrified cylinder lock
148
electrified mortise locks
additional lock switch fitting
141–142
advantages
138
dead bolts
139–140
door frame considerations
141
door handing
142, 142f
latch only — no lock
138
mechanical lock
138, 138f
no dead bolt
138–139
solenoid mechanism
138
electrified “panic” hardware
concealed vertical rod exit device
144, 144f
electrical options
145–146
latch dogging
145
mortise lock exit devices
143, 143f
normal function
144
popular double door applications
146–147
purpose
142
rim exit devices
143, 143f
surface-mounted vertical rod exit devices
143–144, 143f
three-point latching exit device
144, 144f
self-contained access control lock
149, 149f
G
Galvanized rigid conduit (GRC)
341
Gantt chart
381, 381f
Glass-wing turnstiles
199, 200f
H
Hand geometry reader
58, 59f
Hard disk storage (HDS)
310
Herculite™ lobby doors
182, 183f
Hirsch keypad
53, 53f
Hi-Tech countermeasures
265
Hi-tower lock
171–172, 171f, 182, 183f, 185
Hollerith cards
54, 55f
Hollow metal
doors
95, 95f
frames
101
I
Identification readers
59
Institution lock, ANSI F30
139
Integrated alarm system devices
10
assessment
284–285
building perimeter detection systems
balanced-biased door position switches
290
glass break detectors
291
photoelectric beam detectors
290–291
seismic detectors
291
communication and annunciation
283–284
complex alarm sensing
297
detection and initiation
281
evidence
286
filtering and alarm states
282–283
intelligent video analytics sensors
conventional central processing sensors
297
edge sensors
297
learning algorithm systems
297
types
296
interior point detection systems
Duress Alarms
293–294
explosives detection methods and systems
radiological detection systems
296
interior volumetric sensors
dual-technology detection systems
292
infrared detection systems
292
microwave detection systems
291–292
thermal imaging detection systems
293
ultrasonic detection systems
292
outer perimeter detection systems
capacitance detection systems
287
fiber-optic detection systems
287
gate breach detection system
286
ground-based radar
290
infrared and laser detection systems
288
leaky-coax cable
288
microwave detection systems
289–290
outdoor passive infrared detectors
288–289
pneumatic underground detection systems
289
seismic detection systems
286–287
response
285
trend analysis
298
vulnerability analysis
298
Intermediate metal conduit (IMC)
341
International Building Code (IBC)
83
Internet group management protocol (IGMP)
236
Iris reader
58, 59f
K
K8 lift-arm barrier gate
201, 201f
K12 phalanx gate
201, 201f
K12 sliding gate
201, 202f
L
Latch-bolt monitoring (LX) switch
145, 148
Layering approach
5
Life safety
7
codes and standards
fire watch
84
IBC
83
legal action
83
NFPA 72
83
NFPA 101
82
security contractor
83–84
UL 294
85
electrified locks
electrified panic hardware
86, 86f
essential attributes
86
infinite array
86
mechanical
86
mortise lock
87, 87f
no special knowledge exit
85
and exit devices
access panel
87
change of state
88
intrusion
87, 88
mechanical switches
88
motion detector
88
request-to-exit sensor
87, 88
and fire alarm system interface
89–90
first
81–82
function
40
vs. security
82
Lift-arm barrier gates
202
Liquid-tight flexible metal conduit (LFMC)
342
Liquid-tight flexible non-metallic conduit (LFNC)
342
Local area network (LAN)
215
Lock power supply
231
Lock status monitoring switch
148
Lo-Tech countermeasures
265
M
Magnetic locks
8
cautions
egress assurance
157–158
operational and maintenance warnings
158–159
magnetic gate locks
156, 157f
magnetic shear locks
155–156, 155f, 156f
standard
basic forms
154
DC current
154
door configurations
154
double door configuration
155f
holding forces
154
inswinging door configuration
155f
large contact area
153
outswinging door configuration
155f
primary version
153, 153f
Magnetic plate lock
Magnetic shear lock
125, 125f
Maintenance concerns
159
Man-trap
72, 73, 73f
Master host server
250–251
Microcontrollers
231, 232, 371
Millimeter wave scanners
295
Monostatic microwave detection systems
289
Motherboard
226
Mouse-operated graphical user interface systems
211
“Moving shooter” attack
73, 74
Multi-technology card readers
58, 58f
Municipal area network (MAN)
215
N
National Electrical Code (NEC)
378
National Fire Protection Association 101 (NFPA 101)
82
Network attached storage (NAS)
310, 311, 311f
No-Tech countermeasures
265
O
Office lock
138–139
“One-to-one” match reader
P
Package X-ray scanners
295
Paddle-type electronic turnstiles
199, 199f
Paneled overhead doors
102
PDP-8/IBM Series 1 mini-computer
210–211
Pedestrian portal types
automated wall
73–74
automatic doors
69–71, 70f, 71f
man-trap
73, 73f
revolving doors
71–72, 72f
standard doors
68–69, 69f
turnstiles
72–73, 73f
Personnel X-ray scanners
295
Phalanx gates
202
Photo ID card
combined functions, single credential
60, 60f
printer
60, 60f
Pizza Guy
52
Pneumatic controlled devices (PN)
146
Pneumatic push button exit switches
395
Portal system
7
Positive access control
199
Prison function lock
140
Privacy set
140
Programmable logic controllers (PLCs)
214, 215, 395
Project management
368–369
Project Management Institute (PMI) certification
368
Project Management Professional (PMP) certification
368, 369
PVC conduit
342
R
Random access memory (RAM)
213–214, 225
Rare-Earth magnets
54–55
Reactive electronic automated protection systems (REAPS)
acoustic weapons
330–331
appropriateness
332
attack disruption
329
barriers and weapons operation
332
communications elements
329
deluge fire sprinkler control
330
deployable barriers
329
electronic safety systems
333
high-voltage weaponry
331
irrigation systems
329, 330f
mechanical safety systems
333
operational safeguards
333
procedural safety systems
333
remotely operated weaponry
332
Recommended Standard 232 (RS-232)
232
Redundant host server
246
Request-to-exit sensors
access control panel
157
categorization, reliability
157
exit devices
44
magnetic lock
158
montage
157, 157f
portals
41
Request-to-exit (RX) switch
145
Rigid metal conduit (RMC)
341
Rigid non-metallic conduit (RNC)
341
Rising bollards
202
Risk management
7
credential programming
30
group and schedule programming
30
methods
22–23
portal programming
30
program elements, security
23–24
risk analysis
24
security and access control programs
23
security countermeasures
25–26
security policies and procedures
24
types of areas/groups
29
types of users
29
user schedules
30
Roll-up overhead doors
102
S
Safety concerns
158
Securitech locks
170
Security countermeasures
Hi-Tech systems
25
layering
26
Lo-Tech elements
25
mixing approach
26
No-Tech elements
26
Security door controls (SDC)
165
Security program
7
Security system integration
advanced system integration
273–275
appropriate and inappropriate users
264
armed guards
267
assets
263
basic system integration
272
cost benefits
269–270
decision making
266
deterrence
265
digital video system
267
GUI Map
267
highly qualified guard at location
266
operational benefits
better communications
269
force multipliers
268
improved monitoring
268–269
improved system performance
268
multiple buildings
268
multiple business units
268
multiple sites
268
multiple systems
268
reduced training
269
uniform application of security policies
267–268
organization's mission
263
Police Emergency number
267
resources
266–267
security countermeasures
265
threat actors
264
types
database integration
272
dry contact integration
270
serial data integration
271–272
TCP/IP integration
272
wet contact integration
271
Security systems
application
electronic security countermeasures
373
expandable and flexible
374
installation quality
373
layered security approach
373, 373f
monitoring functions
374
redundancy
373–374
sustainability
374–375
architecture models
317
cabling
11
campuses and remote sites
317
C3 consoles
318
communications
electronic security systems
313
intercoms and bullhorns
315
Nextel™ phones
316
public address systems
315–316
smart phones and tablets
316
telephones
314
Voice logger
316
2-way radio
314
design
3, 11
digital architecture
365
elements
client management
369–370
drawings
366
interdiscipline coordination
367–368
product selection
368
project management
368–369
specifications
367
environmental considerations
11
growth and flexibility
365
implementation
access control zones
375–376
alarm devices
377, 378f
conduits and boxes
378
door types
376–377
physical details
378–379
racks, consoles, and panels
377, 378f
riser diagrams
379
schedules
379, 380f
single-line diagrams
379, 380f
wiring diagrams
379
vs. installation vs. maintenance
364
photo ID systems
303–304
risk analysis
364, 365
robust portals
door frames
372
double glass door exploit
371
electrified panic hardware
371–372
unlocking door from outside
370–371
security video
assess events
304
auto-white balance
308
cameras and lenses
306–307
display devices
309
Dynamic Range
308–309
history
305–306
inappropriate/suspicious activity
304
lighting and light sources
307–308
motion detectors
312
movements of subjects
304
recording devices
remote investigations
304
system interfaces
313
video analytics
312, 313f
visual evidence
304
system installation
access coordination
383
coordination with trades
383
permits
383
preliminary checks and testing
384
product acquisition
382
project planning
380–381
project schedule
381–382
punch list items completion
384–385
shop and field drawings
382
system acceptance
384, 385
system commissioning
384
technicians
4
visitor management systems
304
vulnerabilities, probability, and consequences
364
Security technologies
4
Semaphore arm barrier gate
74, 74f
Servers and workstations
access control system networking
access control panel network
252–253
business information technology network
254
core network
251–252
integrated security system interfaces
253
multi-site network interfaces
254
server network
252
TCP/IP Ethernet networks
251
VLANs
253
workstation network
252
decision process
248–249
functions
243
access control events
245
access control module configurations
244
access control panel configurations
244
alarm events
245
anti-passback events
245
cluster configurations
244
communications management
246–247
distributed cluster management
245
operator logs
246
output control events
245
real-time data and reports
247–248
scheduled events
245–246
legacy access control systems
254–255
system scalability
basic scalability
249
enterprise-wide system
250
master host
250–251
multi-site systems
250
super-host/sub-host
251
system-wide card compatibility
250
unscalable systems
249
Signal switch (SS)
145
Silicon controlled rectifier (SCR)
271, 271f
Single- and double-leaf swinging doors
balanced doors
100, 100f
framed glass doors
96–97, 97f
hollow metal doors
95, 95f
pivoting doors
99–100, 99f
solid core wood doors
95–96, 96f
total doors
98–99, 99f
unframed glass doors
97–98, 98f
Sliding gates
202
Software developers kit (SDK)
226
Solenoid function
123, 123f
Specialized portal control devices
pedestrians
anti-tailgate alarm
200
automatic doors
195–196
electronic turnstiles
199–200
full-verification portals
198–199
man-traps
197–198
vehicles
high-security barrier gates
201–202
sally ports
202–203
Standard gamma ray detectors
296
Standard magnetic locks
basic forms
154
DC current
154
door configurations
154
double door configuration
155f
holding forces
154
inswinging door configuration
155f
large contact area
153
outswinging door configuration
155f
primary version
153, 153f
Storage area network (SAN)
310, 311, 311f
Storefront doors
Storeroom lock
ANSI F07
139
dead bolt
139
Store/utility room lock
139
Structured Query Language (SQL)
access control panel form factors
228
BMS
328
database integration
272
EPROM
225
fifth generation systems
215
Surface-mounted magnetic lock
124, 124f
Surface-mounted magnetic shear lock
156f
Surface mounted raceways
342
System installation and commissioning
access schedules and areas
397
alarm and reader device database
396
conduit vs. open cabling
394
device installation considerations
395
device setup and initial testing
396
documentation
395–396
jobsite considerations
393–394
user access database
397
System maintenance and repair
12
as-built drawings
floor plans
404
physical details
404
power infrastructure
404
schedule sheets
403
single-line diagrams
404
title sheet
403
wiring diagrams
404
contracting options
annual maintenance agreement
407
extended warranty
407
in-house technician
406–407
on-call maintenance and repairs
407–408
definition
405
emergency
406
infant mortality
405
scheduled maintenance
406
wire run sheets
405
System management
alarm management
402–403
common corporate campus
402
database management
401–402
maintenance and repair
12
reports
403
T
Tailgate detector
66, 67f
TCP/IP Ethernet communications
251
Temperature rise doors
110–111
Thin-wall tubing
341
Top jam mount surface magnetic shear lock
156f
Triac
271, 271f
Tripod turnstiles
72
U
Underground conduit
342
Understanding risk
6
Underwriters Laboratories 294 (UL 294)
85
Uninterruptable power supply (UPS)
231
Universal Building Code (UBC)
V
Vehicle portals
automated roll-up vehicle gates
76, 76f
automated sliding vehicle gates
75–76, 75f
automated vehicle swing gates
75, 75f
high-security barrier gates
76–77, 76f
sally ports
77, 77f
standard barrier gates
74–75, 74f
Verification readers
59
Video gamma ray detectors
296
Video recording devices
DAS
310, 311, 311f
Fail-Over servers
310
internal HDS
310
NAS
310, 311, 311f
network video recording systems
309
open reel 2" videotape recorders
309
RAID arrays
311
SAN
310, 311, 311f
server-based systems
310
time-lapse VHS recorders
309
Virtual local area networks (VLANs)
local and network connections
234
security architecture models
317
servers and workstations
253
Virtual private networks (VPNs)
236
W
Web fabric gates
202
Web fabric K12 gate
201, 202f
Wide area network (WAN)
215, 251
Wiegand protocol
56
Wiegand wire cards
55–56, 56f
Wire run sheets
405
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.222.164.228