Book description
A crucial reference for the practicing or aspiring design consultant, Security Design Consulting brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, Security Design Consulting gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultant’s important and growing role in an overall security program.* Focuses on consulting in security design, not security management
* Provides sample service agreements, specifications, and reports to use as models
* Emphasizes the highest technical and ethical standards for this increasingly crucial profession
Table of contents
- Cover
- Copyright page
- Table of contents
- Foreword
- Acknowledgments
- Introduction
- Chapter 1: The Profession of Security Design Consulting
- Chapter 2: How to Get Started
- Chapter 3: Marketing
- Chapter 4: The Proposal
- Chapter 5: Fees and Billing
- Chapter 6: Assessment
- Chapter 7: System Design
- Chapter 8: Determining What Products to Specify
- Chapter 9: Determining Total System Cost
- Chapter 10: The Report
-
Chapter 11: Project Management
- ASSIST IN ATTACHING BID DOCUMENTS TO THE DESIGN SPECIFICATIONS
- ASSIST IN LOCATING AND INVITING QUALIFIED CONTRACTORS TO BID
- LEAD THE PRE-BID CONFERENCE AND WALK-THROUGH
- PROVIDE WRITTEN ANSWERS TO QUESTIONS AT PRE-BID WALK-THROUGH
- APPROVE PRODUCT CHANGES
- ASSIST IN EVALUATION OF BIDS
- REVIEW AND APPROVE ALL SUBMITTALS
- RESPOND TO ANY CONTRACTORS’ REQUESTS FOR INFORMATION
- ATTEND CONSTRUCTION MEETINGS
- CHECK, REVIEW, AND APPROVE INSTALLATION PROGRESS AND TECHNIQUES
- REVIEW AND APPROVE ANY CHANGE ORDERS OR CHANGE IN SCOPE OF WORK
- WITNESS SYSTEM TEST WITH CONTRACTOR
- REVIEW AND APPROVE TEST REPORT
- MAINTAIN PUNCH LIST FOR ANY DEFICIENCIES
- REVIEW AND APPROVE AS-BUILT DRAWINGS AND RECORD OF COMPLETION
- APPROVE CONTRACTOR PAYMENTS
- RESPOND TO OTHER REQUESTS BY CLIENT
- Chapter 12: Forensic Consulting
- Chapter 13: Continuing Education
- Appendix A: Sample Proposals
- Appendix B: Sample Service Agreement
- Appendix C: Sample Assessment Reports
-
Appendix D: Sample Design Specifications
- PART I GENERAL (1/2)
- PART I GENERAL (2/2)
- PART II PRODUCTS (1/8)
- PART II PRODUCTS (2/8)
- PART II PRODUCTS (3/8)
- PART II PRODUCTS (4/8)
- PART II PRODUCTS (5/8)
- PART II PRODUCTS (6/8)
- PART II PRODUCTS (7/8)
- PART II PRODUCTS (8/8)
- PART III EXECUTION (1/3)
- PART III EXECUTION (2/3)
- PART III EXECUTION (3/3)
- Appendix E: Sample Design Drawings (1/2)
- Appendix E: Sample Design Drawings (2/2)
- Appendix F: Sample As-Built Drawings (1/2)
- Appendix F: Sample As-Built Drawings (2/2)
- Index (1/2)
- Index (2/2)
Product information
- Title: Security Design Consulting
- Author(s):
- Release date: May 2007
- Publisher(s): Butterworth-Heinemann
- ISBN: 9780080493053
You might also like
book
The Security Consultant's Handbook
A compendium of essential information for the modern security entrepreneur and practitioner The modern security practitioner …
audiobook
The Security Consultant's Handbook
The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities …
book
Enterprise-Grade IT Security for Small and Medium Businesses: Building Security Systems, in Plain English
Understand the IT security features that are needed to secure the IT infrastructure of a small …
book
Strategic Security Management
Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security …