PART I: THE BASICS1. Introduction and Overview2. Foundational Security and Access Control Concepts3. How Access Control Systems Work
PART II: HOW THINGS WORK4. Access Control Credentials and Credential Readers5. Types of Access Controlled Portals6. Life Safety and Exit Devices7. Door Types and Door Frames8. Doors and Fire Ratings9. Electronic Locks - Overview10. Electronic Locks - Free Egress Locks11. Electronic Locks - Magnetic Locks12. Electronic Locks - Dead-Bolt Locks13. Electronic Locks - Specialized Locks14. Standard Door/Lock Combinations15. Specialized Portal Control Devices and Applications16. Access Control System History You'll Need to Know17. Access Control Panels and Networks18. Access Control System Servers and Workstations
PART III: THE THINGS THAT MAKE SYSTEMS SING19. Security System Integration20. Integrated Alarm System Devices21. Related Security Systems22. The Merging of Physical and IT Security23. Securing the Security System24. Related Building/Facility Systems - and REAPS Systems25. Cabling Considerations26. Environmental Considerations27. Access Control System Design28. Access Control System Installation and Commissioning29. System Management, Maintenance and Repair
Thomas L. Norman, CPP, PSP, CSC, is an internationally acclaimed security risk management and enterprise-class security system design consultant with experience in the United States, the Middle East, Europe, Africa, and Asia. Mr. Norman has experience in security designs for critical infrastructure including oil and gas terminals, lines, and distribution centers; mass transit and vehicle transportation systems including air security, rail, and marine facilities and systems; long-span suspension and truss bridges; and central banking, utility and financial facilities. Mr. Norman's extended experience includes a large number of chemical, petrochemical, banking, government, corporate facilities, hospitality, healthcare, venues, and museums.
Mr. Norman's unique processes focus on identifying and securing the underlying causes of building system vulnerabilities, that is, business processes, technologies, and cultures that encourage the development of vulnerabilities to the detriment of the organization. As the author of the industry reference manual on integrated security system design, and with more than 35 years of experience in design, construction management and commissioning, Mr. Norman is considered one of the industry's leading design consultants, worldwide, having contributed many industry design firsts including Video Pursuit and REAPs design concepts, among others.
Mr. Norman has developed formulas and detailed processes that are used by the entire security industry to calculate the effectiveness of security programs and security program elements and also overall security program cost-effectiveness.
Mr. Norman has authored four books: for the American Institute of Architects, "Security Planning and Design - A Guide for Architects and Building Owners"; "Integrated Security Systems Design" (Elsevier); "Risk Analysis and Security Countermeasures Selection" (CRC Press); and "Electronic Access Control" (Elsevier). His works have been quoted and referenced by organizations such as the Cato Institute, NBC, and Security Management.