Locks, Safes, and Security, provides an extensive, yet simple, description of the evolution of locks. From their invention thousands of years ago, through to the present day, state-of-the-art, lock designs. Information covers; materials; processes and tools to produce cut keys; blank keys; high security locks; keying systems; lock configuration; various locking systems; destructive/non destructive modes of entry; alarm systems; forensic investigation and much more. This really is the ultimate Locks, Safes, and Security guide.
-----------------------------------------------------
It is unknown when the original mechanism that could fairly be described as a lock, was really created.
It appears that the first reference to locks was noted by Joseph Bonomi in Ninevah and its Palaces.
There are a number of references to locks and keys in the Bible, leaving no doubt that the lock as we understand the concept today, has existed for at least forty centuries.
During the past quarter century, many developments have dramatically affected the lock and security industry. Perhaps the greatest advance has been in the integration of computers with mechanical locking devices.
The lock, safe, and security industry has developed jargon to describe and define its products and product-component parts. Basic definition of general terms is presented here for the reader to grasp information with ease.
Techniques of disassembly, keying, re-keying, picking, impressioning, decoding, master keying, and forensic analyses of locks are detailed throughout this book. Unique tools that are used in the forced-entry of locks are also described.
When considering metals and the principles of metallurgy, many basic questions come to mind that bear a relationship to locks, keys, safes, and their penetration.
Keys have taken many forms throughout the past four thousand years, from Chinese finger rings, to early pin tumbler wooden keys, to modern metal keys incorporating sophisticated integrated circuits. They all, however, perform essentially the same function. You will also find outline of procedures required during the manufacturing process of keys.
Keys can be produced from other keys, from the lock itself, or from information about the key in the form of codes.
The requirement for high-security in locks and keys is found within both government and the private sector everywhere. Read on to find out the evaluation criteria for high-security locks, their keys, and keying systems.
Specialized keying systems are required whenever there are a large number of locks in use at one installation or facility. Such systems can address complex issues of security, access control, convenience, safety, simplified organization, and executive access.
Electromechanical locks incorporate electronic circuitry into traditional mechanical locking devices for enhanced security and access control.
Various methods to bypass various types of locks and safes without damage or evidence of doing so are examined in this book.
The function of any alarm system is to reliably signal the entry of intruders or an irregular event within a protected area as soon as possible. Alarm systems do not prevent or hinder intrusion; they just provide an immediate notification so that action can be taken.
An essential read for anyone interested in the history of the key and the modern techniques and uses. *A tool most of us take for granted today.
Topics covered in Locks, Safes, and Security, include:
подробнее...
- Chapter 1 The Lock: Four Thousand Years of Technology
- Chapter 2 The Last Twenty-Five Years
- Chapter 3 Definition of Terms
- Chapter 4 Tools and Supplies
- Chapter 5 Materials and Processes
- Chapter 6 The Development of Keys
- Chapter 7 Processes and Materials for Producing Blank Keys
- Chapter 8 Methods of Producing Cut Keys
- Chapter 9 Producing Keys for Specific Locks
- Chapter 10 High-Security Locks and Keys
- Chapter 11 Keying Systems
- Chapter 12 Basic Lock Configurations: Hardware
- Chapter 13 Warded Locks
- Chapter 14 The Lever Tumbler Lock
- Chapter 15 Wafer Locks
- Chapter 16 Pin Tumbler Locks
- Chapter 17 Traditional Mechanical Locking Systems
- Chapter 18 Electromechanical Locks
- Chapter 19 Magnetic Locks
- Chapter 20 Wireless Exchange of Code Information
- Chapter 21 Intelligent Keys and Locks
- Chapter 22 Programmable Locks and Keys
- Chapter 23 Specialized Industry Applications
- Chapter 24 Investigation and Evidence Involving Locks and Keys
- Chapter 25 Forensic Examination: Specifications, Operations, and Security
- Chapter 26 Forensic Examination: Tool Marks and Trace Evidence
- Chapter 27 Forensic Examination of Keys
- Chapter 28 General Introduction to Bypass
- Chapter 29 Picking
- Chapter 30 Impressioning
- Chapter 31 The Decoding of Locks: Theory, Procedures, and Technologies
- Chapter 32 Destructive Entry: Tools and Techniques
- Chapter 33 The Origin, Development, and Design of Safes, Vaults, and Strong rooms
- Chapter 34 Combination Locks
- Chapter 35 Destructive Entry of Safes: Tools and Techniques
- Chapter 36 Non-Destructive Methods of Entry
- Chapter 37 Standards and Testing
- Chapter 38 Security: Analysis and Reduction of Risk
- Chapter 39 Security: Physical Protective Measures
- Chapter 40 Alarm Systems