
- 416 pages
- English
- PDF
- Available on iOS & Android
eBook - PDF
Alarm Systems and Theft Prevention
About this book
Alarm Systems and Theft Prevention, Second Edition, recounts the sometimes sad, sometimes humorous, and nearly always unfortunate experiences of manufacturers, distributors, retailers, and individuals who have lost valuable merchandise, money, jewelry, or securities to criminal attacks. In most cases the losses occurred because there was a weak link: a vulnerability in the total security defense. The book presents in practical terms those weaknesses in physical security, alarm systems, or related security procedures that, when blended together, result in vulnerability. In addition to analyzing these cases and identifying the key elements of vulnerability, remedies for curing the weakness are also offered. Other sections of this book deal with the application, strengths, and limitations of security equipment. For the most part, equipment is presented from the practical viewpoint—what a security device or system will do (or not do) and how it should be applied and operated, rather than the detail of mechanical design, electrical circuitry, or laboratory theories. This book is written in layman's language and is intended to be read by people who supply, use, or need security services and equipment.
Trusted by 375,005 students
Access to over 1.5 million titles for a fair monthly price.
Study more efficiently using our study tools.
Information
Table of contents
- Front Cover
- Alarm Systems and Theft Prevention
- Copyright Page
- Table of Contents
- Preface and Acknowledgments
- Chapter 1. Introduction
- Chapter 2. Basic Burglary
- Chapter 3. Sophisticated Burglary
- Chapter 4. Burglary Through Unprotected Points
- Chapter 5. Underwriters' Laboratories
- Chapter 6. Ultrasonic Intrusion Alarm Systems
- Chapter 7. Microwave Motion Detection
- Chapter 8. Passive Infrared Technology
- Chapter 9. Environmental Causes of False Alarms
- Chapter 10. Alarm Defeat by Lock Picking
- Chapter 11. Problems of Police-Connected Alarms
- Chapter 12. Corner Cutting in Security
- Chapter 13. Attack Against Telephone Alarm Lines
- Chapter 14. First U.S. Defeat of Central Station-Connected System
- Chapter 15. Defeat of Police-Connected Alarm Systems
- Chapter 16. Alarm Line Security
- Chapter 17. Advances in Hard-Wired Sensing Systems
- Chapter 18. Business Skills in Criminal Attack
- Chapter 19. Dual Central Station Protection
- Chapter 20. Update on Burglary Attack Techniques
- Chapter 21. Digital Paging and Effective Alarm Response
- Chapter 22. The Thermic Lance
- Chapter 23. Safe Choice and Considerations
- Chapter 24. Imported Tough Safes
- Chapter 25. Capacitance Alarm Safe Protection
- Chapter 26. Burglary of Mercantile Vaults
- Chapter 27. Vault Construction and Protection
- Chapter 28. Shopping Center Burglary
- Chapter 29. Hit-and-Run Attacks Against Glass
- Chapter 30. Residential Alarm Systems
- Chapter 31. Apartment Burglary
- Chapter 32. Advances in Low-Power Wireless Sensing Systems
- Chapter 33. Procedural Weaknesses in Security
- Chapter 34. Oversights in Security
- Chapter 35. Attacks on Out-of-Order Alarms
- Chapter 36. Amateur Alarm Systems
- Chapter 37. Pretext and Impersonation in Burglary
- Chapter 38. Impersonation in Robbery
- Chapter 39. Robbery Attack
- Chapter 40. It's Robbery Time
- Chapter 41. Surveillance Systems Choice
- Chapter 42. The Diamond Switch
- Chapter 43. Internal Theft Through Unprotected Points
- Chapter 44. Metal Detection and Inspection
- Chapter 45. Bomb Threat Planning
- Chapter 46. Commercial Office Building Security
- Chapter 47. Proprietary Alarm System Centers
- Chapter 48. There Are Two Sides to An Alarm Contract
- Chapter 49. The Alarm Industry in the Twenty-first Century
- Chapter 50. The Consultants Role
- Appendix: The Security Audit
- Index
Frequently asked questions
Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn how to download books offline
Perlego offers two plans: Essential and Complete
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.5M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1.5 million books across 990+ topics, we’ve got you covered! Learn about our mission
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more about Read Aloud
Yes! You can use the Perlego app on both iOS and Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app
Yes, you can access Alarm Systems and Theft Prevention by Thad L. Weber in PDF and/or ePUB format, as well as other popular books in Social Sciences & Criminology. We have over 1.5 million books available in our catalogue for you to explore.