LOCKS, SAFES, AND SECURITY

TABLE OF CONTENTS  

FOREWORD

PREFACE

INTRODUCTION

ACKNOWLEDGEMENTS

CONTACTING THE AUTHOR

TECHNOLOGY USED TO PRODUCE THIS BOOK

ABOUT THE AUTHOR

CONVENTIONS

DEDICATION

LSS+ CD/ROM

 

                     BOOK I:        FUNDAMENTALS OF LOCKS, SAFES, AND SECURITY

PART I:        GENERAL INTRODUCTION TO LOCKS AND KEYS

PART II:       KEYS

PART III:       GENERAL LOCKING SYSTEMS: SPECIFIC PRINCIPLES OF OPERATION

PART IV:       SPECIALIZED LOCKING SYSTEMS AND APPLICATIONS

PART I:         GENERAL INTRODUCTION TO LOCKS AND KEYS

1.        THE LOCK: 4000 YEARS OF TECHNOLOGY

2.        THE LAST 25 YEARS

3.        DEFINITION OF TERMS

4.        TOOLS AND SUPPLIES

5.        MATERIALS AND PROCESSES

PART II:       KEYS AND KEYING SYSTEMS

6.        DEVELOPMENT OF KEYS

7.        PROCESSES AND MATERIALS FOR PRODUCING BLANK KEYS

8.        METHODS OF PRODUCING CUT KEYS

9.        PRODUCING KEYS FOR SPECIFIC LOCKS

10.       HIGH SECURITY LOCKS AND KEYS

11.       KEYING SYSTEMS

12.       BASIC LOCK CONFIGURATIONS: HARDWARE

PART III:    GENERAL LOCKING SYSTEMS: SPECIFIC PRINCIPLES OF OPERATION

13.       WARDED LOCKS

14.       LEVER LOCKS

15.       WAFER LOCKS

16.       PIN TUMBLER LOCKS

PART IV:     SPECIALIZED LOCKING SYSTEMS AND APPLICATIONS

17.       TRADITIONAL MECHANICAL LOCKING SYSTEMS

Section 1     Lever

Section 2     Wafer

Section 3     Disc Tumbler

Section 4     Pin Tumbler

Section 5     Combination

Section 6     Hybrid

Section 7     High Security

 

18.        ELECTRO MECHANICAL LOCKS

19.       MAGNETIC LOCKS

20.       WIRELESS EXCHANGE OF CODED INFORMATION

21.       INTELLIGENT KEYS AND LOCKS

22.       PROGRAMMABLE LOCKS AND KEYS

23.       SPECIALIZED INDUSTRY APPLICATIONS

 

                     BOOK II:       METHODS OF ENTRY

PART I:       INVESTIGATION

PART II:      GENERAL INTRODUCTION TO BYPASS: SILENT NON-DESTRUCTIVE ENTRY

PART III:     DESTRUCTIVE ENTRY

 

PART I:       INVESTIGATION

 24.      INVESTIGATION AND EVIDENCE INVOLVING LOCKS AND KEYS

25.       FORENSIC EXAMINATION: SPECIFICATIONS, OPERATION, AND SECURITY

26.       FORENSIC EXAMINATION: TOOLMARKS AND TRACE EVIDENCE

27.       FORENSIC EXAMINATION: KEYS

 

PART II:     GENERAL INTRODUCTION TO BYPASS: SILENT NON-DESTRUCTIVE ENTRY

28.     GENERAL INTRODUCTION TO BYPASS

29.     PICKING

30.     IMPRESSIONING

31.     DECODING

 

PART III:     DESTRUCTIVE ENTRY

32.     DESTRUCTIVE ENTRY: TOOLS AND TECHNIQUES

         

                    BOOK III:      LOCKS, SAFES, VAULTS, AND SECURE AREAS

  

33.     THE ORIGINS, DEVELOPMENT, AND DESIGN OF SAFES, VAULTS, AND STRONGROOMS

 34.    COMBINATION LOCKS

35.     DESTRUCTIVE ENTRY OF SAFES: TOOLS AND TECHNIQUES

36.      NON-DESTRUCTIVE METHODS OF ENTRY

  

                    BOOK IV:     SECURITY

 

37.     STANDARDS AND TESTING 

38.     SECURITY: ANALYSIS AND REDUCTION OF RISK

39.     SECURITY: PHYSICAL AND PROTECTIVE MEASURES

40.     ALARM SYSTEMS

 

BIBLIOGRAPHY

MASTER PATENT INDEX

TRADEMARK INDEX

INDEX

TO ORDER LSS+ CD/ROM

WAIVERS AND DISCLAIMERS