The Complete Guide to Physical Security: 1st Edition (Hardback) book cover

The Complete Guide to Physical Security

1st Edition

By Paul R. Baker, Daniel J. Benny

Auerbach Publications

360 pages | 90 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9781420099638
pub: 2012-11-19
SAVE ~$17.19
eBook (VitalSource) : 9780429133893
pub: 2016-04-19
from $41.48

FREE Standard Shipping!


To adequately protect an organization, physical security must go beyond the "gates, guns, and guards" mentality that characterizes most security programs. Creating a sound security plan involves understanding not only security requirements but also the dynamics of the marketplace, employee issues, and management goals. The Complete Guide to Physical Security discusses the assets of a facility—people, building, and location—and the various means to protect them. It emphasizes the marriage of technology and physical hardware to help those tasked with protecting these assets to operate successfully in the ever-changing world of security.

The book covers specific physical security technologies, such as intrusion detection, access control, and video surveillance systems—including networked video. It addresses the reasoning behind installations, how to work with contractors, and how to develop a central station for monitoring. It also discusses government regulations for building secured facilities and SCIFs (Sensitive Compartmented Information Facilities). Case examples demonstrate the alignment of security program management techniques with not only the core physical security elements and technologies but also operational security practices.

The authors of this book have nearly 50 years combined experience in the security industry—including the physical security and security management arenas. Their insights provide the foundation for security professionals to develop a comprehensive approach to achieving physical security requirements while also establishing leadership roles that help further the overall mission of their organization.


"There is much to like about this book with its definitions as well as the logical progression through the chapters on how to develop a physical security program … it is a good introduction to physical security concepts."

ASIS Dynamics

'For manufacturing readers wondering how truly safe their operations are, or how safe they could be, this volume is a great starting point.' --Blue Heron Journal

Table of Contents

Physical Security Planning

Setting the Stage

Site Planning

Reviewing the Physical Design

Vulnerability Assessments

The Security Survey

Vulnerability Assessment

Developing a Vulnerability Assessment

Understanding the Threats

Making Adjustments

Security Design and Planning

Security Planning and Evaluation

Security Design Concepts

Security Technologies

EASI Model

Adversary Sequence Diagram

Working with Architects

Working with Contractors

Construction Review

Security Construction Projects

New Construction

Initial Point of Access

Roadway Design


Loading Docks



Protection in Depth

Protection-in-Depth Concepts

Protection Plans

Evacuation Drills

Incident Response

Penetration Tests

Access Control Violation Monitoring

Perimeter Protection

Crime Prevention through Environmental Design (CPTED)

Protecting with CPTED Concepts



Access Control

Access Control


Access Control Head End

Turnstiles and Mantraps

Physical Protection Systems



Interior Intrusion Detection Systems

Perimeter Intrusion Detection Systems

CCTV and IP Video

The Essential Guide to Video Surveillance

Video Surveillance Use Cases

Video Surveillance System Classifications

Image Capture Video Sources—Cameras




Recording Systems

Video Management Systems

Video Control, Analysis, and Video Content Analysis Systems

Using a Step-by-Step Approach to System Selection and Deployment

Upgrade Path

Manpower and Video Surveillance

Privacy and Legal Considerations—Video Surveillance Checklist

The Future of Video Surveillance

Keys, Locks, and Safes

Keys, Locks, and Safes

Developing a Master Locking System





What Is Biometrics?

Multibiometric Systems

Deploying Biometrics


Biometric Metrics

Attacks on Biometric Systems and Their Remedies

Security Guard Force

Establishing a Security Guard Force

Mission and Duties of the Security Guard Force

Profile of the Facility to Be Protected

Proprietary Security Guard Force

Contract Security Guard Force

Hybrid Force

Security Guard Uniforms

Security Guard Identification

Security Guard as an Authority Figure

Security Guard Protective Equipment

Security Guard Training

Professional Security Certifications

Personnel Issues

Central Station Design

Developing an Operation

Design Requirements

Secondary Amenities for an Operations Control Center

Alarm Assessment

Government Security




Sound Masking





Security Alarm Requirements

Open Storage

Closed Storage

Dealing with Contractors

Appendix A: Fixed Facility Checklist

Financial Institutions and Banks




Night Depositories

Teller Cash Recyclers

Dye Packs


Ambush Features

Video Systems

Holdup Alarms

Bank Guards

Data Center Protection

Data Centers

Fire Protection

Fire Detection/Alerting

Fire Suppression

Total System Cost

Determining Total System Cost

System Design Cost

System Installation Cost

System Operational Cost

IT-Related Cost

Maintenance Cost

Replacement Cost

Cost-Benefit Analysis

Cost of Loss

Cost of Prevention

Return on Investment

Cost Factors

Security Master Plan

Security Master Plan Strategy

Engaging the Stakeholders

What Should Your Security Philosophies Be?

Technology Migration Strategy

Equipment Replacement Schedules

Security Foresight

Strategic Foresight

Foresight Techniques

Security Leadership

What Is Leadership?

Purpose of Leadership

Effective Leadership

Why Security Leaders Are Important

Understanding the Basics

Are Leaders Born or Made?

Good Leadership

Bad Leadership

Going from Bad to Good

Forging the Future

New Definitions for Leaders in the Twenty-First Century


About the Authors

Dr. Paul R. Baker began his security career in the U.S. Marine Corps as a military policeman. Upon discharge, he joined the Maryland State Police and worked in all phases of law enforcement, spending the majority of his career in the intelligence and narcotics areas. Upon retirement in 2001, he began the security management phase of his journey, working for the MITRE Corporation, Institute for Defense Analysis, Capital One Bank, and, finally, with the RAND Corporation.

Dr. Baker is board certified in security management as a certified protection professional (CPP) by ASIS (American Society for Industrial Security) International. He is an adjunct professor for University of Maryland University College in the homeland security field and an adjunct professor for Southwestern College in its security management curriculum. He is a contributor to the CRC Press books Official (ISC)2® Guide to the CISSP® CBK®, Second Edition and Official (ISC)2 Guide to the ISSAP CBK.

Dr. Daniel J. Benny is the security discipline chair at Embry-Riddle Aeronautical University. He served as a U.S. Navy intelligence officer and DOD Federal Police Chief and holds a Ph.D. in Criminal Justice from Capella University. He is board-certified in security management as a certified protection professional (CPP) and board-certified as a professional certified investigator (PCI)—both by ASIS International; certified fraud examiner (CFE) by the Association of Certified Fraud Examiners; certified confidentiality officer (CCO) by the Business Espionage Controls and Countermeasures Association; certified member (CM) airport certified employee-security (ACE); and airport security coordinator by the American Association of Airport Executives.

Dr. Benny is the author of the CRC Press books General Aviation Security: Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports; Cultural Property Security: Protecting Museums, Historic Sites, Archives, and Libraries; and the forthcoming book, Industrial Espionage: Developing a Counterespionage Program Security. He has authored over 300 articles on security administration, intelligence, aviation security, private investigation, and cultural property security topics.

Subject Categories

BISAC Subject Codes/Headings:
BUSINESS & ECONOMICS / Facility Management
LAW / Forensic Science