Locks, Safes, and Security: Table of Contents

TABLE OF CONTENTS

FOREWORD
PREFACE
INTRODUCTION
ACKNOWLEDGEMENTS
CONTACTING THE AUTHOR
TECHNOLOGY USED TO PRODUCE THIS BOOK
ABOUT THE AUTHOR
CONVENTIONS
DEDICATION
LSS+ CD/ROM

                   BOOK I:        FUNDAMENTALS OF LOCKS, SAFES, AND SECURITY
PART I:        GENERAL INTRODUCTION TO LOCKS AND KEYS
PART II:       KEYS
PART III:       GENERAL LOCKING SYSTEMS: SPECIFIC PRINCIPLES OF OPERATION
PART IV:       SPECIALIZED LOCKING SYSTEMS AND APPLICATIONS
PART I:         GENERAL INTRODUCTION TO LOCKS AND KEYS

  1. THE LOCK: 4000 YEARS OF TECHNOLOGY
  2. THE LAST 25 YEARS
  3. DEFINITION OF TERMS
  4. TOOLS AND SUPPLIES
  5. MATERIALS AND PROCESSES

PART II:       KEYS AND KEYING SYSTEMS

  1. DEVELOPMENT OF KEYS
  2. PROCESSES AND MATERIALS FOR PRODUCING BLANK KEYS
  3. METHODS OF PRODUCING CUT KEYS
  4. PRODUCING KEYS FOR SPECIFIC LOCKS
  5. HIGH SECURITY LOCKS AND KEYS
  6. KEYING SYSTEMS
  7. BASIC LOCK CONFIGURATIONS: HARDWARE

PART III:    GENERAL LOCKING SYSTEMS: SPECIFIC PRINCIPLES OF OPERATION

  1. WARDED LOCKS
  2. LEVER LOCKS
  3. WAFER LOCKS
  4. PIN TUMBLER LOCKS

PART IV:     SPECIALIZED LOCKING SYSTEMS AND APPLICATIONS

  1. TRADITIONAL MECHANICAL LOCKING SYSTEMS

Section 1     Lever
Section 2     Wafer
Section 3     Disc Tumbler
Section 4     Pin Tumbler
Section 5     Combination
Section 6     Hybrid
Section 7     High Security

  1. ELECTRO MECHANICAL LOCKS
  2. MAGNETIC LOCKS
  3. WIRELESS EXCHANGE OF CODED INFORMATION
  4. INTELLIGENT KEYS AND LOCKS
  5. PROGRAMMABLE LOCKS AND KEYS
  6. SPECIALIZED INDUSTRY APPLICATIONS

                     BOOK II:       METHODS OF ENTRY
PART I:       INVESTIGATION
PART II:      GENERAL INTRODUCTION TO BYPASS: SILENT NON-DESTRUCTIVE ENTRY
PART III:     DESTRUCTIVE ENTRY

PART I:       INVESTIGATION

  1.  INVESTIGATION AND EVIDENCE INVOLVING LOCKS AND KEYS
  2. FORENSIC EXAMINATION: SPECIFICATIONS, OPERATION, AND SECURITY
  3. FORENSIC EXAMINATION: TOOLMARKS AND TRACE EVIDENCE
  4.   FORENSIC EXAMINATION: KEYS

PART II:     GENERAL INTRODUCTION TO BYPASS: SILENT NON-DESTRUCTIVE ENTRY

  1. GENERAL INTRODUCTION TO BYPASS
  2. PICKING
  3. IMPRESSIONING
  4. DECODING

PART III:     DESTRUCTIVE ENTRY

  1. DESTRUCTIVE ENTRY: TOOLS AND TECHNIQUES

                    BOOK III:      LOCKS, SAFES, VAULTS, AND SECURE AREAS

  1.    THE ORIGINS, DEVELOPMENT, AND DESIGN OF SAFES, VAULTS, AND STRONGROOMS
  2.  COMBINATION LOCKS
  3. DESTRUCTIVE ENTRY OF SAFES: TOOLS AND TECHNIQUES
  4. NON-DESTRUCTIVE METHODS OF ENTRY

                    BOOK IV:     SECURITY

  1. STANDARDS AND TESTING
  2. SECURITY: ANALYSIS AND REDUCTION OF RISK
  3. SECURITY: PHYSICAL AND PROTECTIVE MEASURES
  4. ALARM SYSTEMS

BIBLIOGRAPHY
MASTER PATENT INDEX
TRADEMARK INDEX
INDEX
TO ORDER LSS+ CD/ROM
WAIVERS AND DISCLAIMERS

Skype