|
|
|||
|
||||
OverviewBuildings protect what is important to us and given that there will always be threats to building security, there is a need to deploy appropriate and proportionate protective security to protect people and assets from losses. This guide, written for the procurement team, discusses the importance of establishing security objectives at the outset of a new project and the need for close collaboration between project team members and security advisers. It describes: - facility planning and design of a protective security system - how to integrate an effective protective security system into the procurement process for new building projects - key security tasks, information exchanges, and security roles and responsibilities - the need to protect information relating to buildings and their security, especially as the industry adopts BIM for procurement and asset management efficiencies. The importance of testing, evaluating and reviewing security system performance to ensure the system remains fit for purpose through the life of the facility is highlighted. Full Product DetailsAuthor: Gavin JonesPublisher: IHS BRE Press Imprint: IHS BRE Press Weight: 0.154kg ISBN: 9781848064331ISBN 10: 1848064330 Pages: 28 Publication Date: 31 March 2016 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contents1. Introduction. 2. Background - Facility protective security; Why is security so important?; Setting protective security objectives; Summary. 3. Facility planning and design: a foundation for effective protective security - Examples of good planning and design. 4. Protective security design - What does 'good' protective security look like?; Adopting a performance-based approach and system-level thinking; Measuring security risk (R); Assessing the threat (T); Assessing vulnerability (V); Assessing consequences (C). 5. The procurement process: an integrated approach - Procurement process overview; Asking the right questions; Security tasks and information exchanges: stage-by-stage commentary. 6. System testing and evaluation. 7. Key messages. 8. References and further information.ReviewsAuthor InformationGavin Jones is Product Development Manager, BRE Global, UK, and a Chartered Engineer and specialist in risk management in the built environment. Tab Content 6Author Website:Countries AvailableAll regions |
||||