U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Intrusion and Detection Systems, Second Edition

NCJ Number
R L Barnard
Date Published
462 pages
This text provides security directors and others responsible for protecting a company's assets with the basic operating principles and applications of intrusion detection equipment.
Part 1 of this seven-part book explains the importance of conducting a threat analysis and discusses factors that can influence the threat. It also describes how to conduct a site survey and factors that can adversely affect the site's security. A design guide that establishes four levels of security that should encompass most security applications is included to help those who are inexperienced in conducting security surveys. The guide describes a generic threat for each level and suggests the minimal security measures necessary to protect against this threat. A threat/physical security matrix is provided to assist managers in selecting the intrusion system and establishing the operating and control procedures for residential, commercial, industrial and high-risk facilities. Parts 2, 3, and 4 describe the basic principle of operation and application of exterior and interior sensors and alarm transmission systems. The way sensors function is discussed and many of the stimuli that cause sensors to alarm are identified. Guidance is provided on how the sensors should be deployed, and typical applications for each type of sensor are described. Part 5 addresses visual and television surveillance and alarm assessment -- a major part of a fully integrated physical security system. The basic principles of operation and application of lighting and television equipment for the nontechnical security person are discussed. In Part 6, access control is discussed and the reader is acquainted with control techniques and vulnerabilities, various types of access control systems, and contraband search and equipment used at critical facilities such as nuclear plants. Part 7 describes the design considerations and equipment selection for three hypothetical facilities -- a school complex, nuclear power reactor, and high-rise office building. Each facility was selected to illustrate a different design concept and system application. All three examples illustrate how an intrusion detection system must be totally integrated with all other necessary security functions. Tables, 89 references, and index.