{"id":399165,"date":"2024-10-20T04:41:03","date_gmt":"2024-10-20T04:41:03","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-692-2013-2\/"},"modified":"2024-10-26T08:29:00","modified_gmt":"2024-10-26T08:29:00","slug":"ieee-692-2013-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-692-2013-2\/","title":{"rendered":"IEEE 692-2013"},"content":{"rendered":"

Revision Standard – Active. Criteria for the design of an integrated security system for nuclear power generating stations are provided in this standard. Requirements are included for the overall system, interfaces, subsystems, and individual electrical and electronic equipment. This standard addresses equipment for security-related detection, surveillance, access control, communication, data acquisition, and threat assessment.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 692-2013 Front Cover <\/td>\n<\/tr>\n
3<\/td>\nTitle page
\n <\/td>\n<\/tr>\n
5<\/td>\nImportant Notices and Disclaimers Concerning IEEE Standards Documents
\n <\/td>\n<\/tr>\n
8<\/td>\nParticipants <\/td>\n<\/tr>\n
10<\/td>\nIntroduction <\/td>\n<\/tr>\n
14<\/td>\nContents <\/td>\n<\/tr>\n
16<\/td>\n1. Overview
1.1 Scope
1.2 Purpose <\/td>\n<\/tr>\n
17<\/td>\n2. Normative references
3. Definitions <\/td>\n<\/tr>\n
19<\/td>\n4. Integrated security system
4.1 Design basis
4.2 List of security system attributes <\/td>\n<\/tr>\n
20<\/td>\n4.3 General performance requirements <\/td>\n<\/tr>\n
25<\/td>\n5. Perimeter intrusion alarm system
5.1 Design basis
5.2 Types of perimeter intrusion alarm system sensors
5.3 Site evaluation, system selection, and location <\/td>\n<\/tr>\n
26<\/td>\n5.4 Location <\/td>\n<\/tr>\n
27<\/td>\n5.5 Probability of detection
5.6 Required alarm conditions
5.7 Tamper protection
6. Security lighting
6.1 Design basis <\/td>\n<\/tr>\n
28<\/td>\n6.2 Outdoor security lighting <\/td>\n<\/tr>\n
30<\/td>\n6.3 Primary portal security lighting
6.4 Interior security lighting <\/td>\n<\/tr>\n
31<\/td>\n6.5 Establishing and maintaining required illumination levels.
7. Video surveillance
7.1 Design basis <\/td>\n<\/tr>\n
32<\/td>\n7.2 Performance requirements <\/td>\n<\/tr>\n
35<\/td>\n7.3 Minimum equipment standards
7.4 Documentation <\/td>\n<\/tr>\n
36<\/td>\n8. Access control
8.1 Design basis
8.2 Access control barriers <\/td>\n<\/tr>\n
37<\/td>\n8.3 Types of hardware <\/td>\n<\/tr>\n
38<\/td>\n9. Interior intrusion detection
9.1 Design basis <\/td>\n<\/tr>\n
39<\/td>\n9.2 Description
9.3 Site evaluation <\/td>\n<\/tr>\n
40<\/td>\n9.4 Performance requirements
9.5 Tamper protection
10. Data acquisition, processing, and display
10.1 Design basis
10.2 Data acquisition <\/td>\n<\/tr>\n
41<\/td>\n10.3 Signal processing <\/td>\n<\/tr>\n
42<\/td>\n10.4 Data display <\/td>\n<\/tr>\n
44<\/td>\n10.5 Alarm reporting <\/td>\n<\/tr>\n
45<\/td>\n10.6 Integration of access control system with other security functions <\/td>\n<\/tr>\n
46<\/td>\n11. Voice communications
11.1 Design basis
11.2 Telephone
11.3 Radio
11.4 Communications coverage <\/td>\n<\/tr>\n
47<\/td>\n11.5 Communication protection
11.6 Antenna protection
11.7 Intelligence protection
11.8 Radio interference protection
11.9 Loss of communication
12. Line supervision
12.1 Design basis
12.2 Continuous detection <\/td>\n<\/tr>\n
48<\/td>\n12.3 Timely detection
12.4 Protection-in-depth and balanced protection
12.5 Specific approaches to line supervision
13. Duress alarms
13.1 Design basis
13.2 Duress alarm devices <\/td>\n<\/tr>\n
49<\/td>\n13.3 Operation
13.4 Multiplexing considerations
13.5 Annunciation exclusion
13.6 Wireless considerations <\/td>\n<\/tr>\n
50<\/td>\n13.7 Hand-held transceiver considerations
14. Power supplies
14.1 Design basis <\/td>\n<\/tr>\n
51<\/td>\n14.2 Security system power <\/td>\n<\/tr>\n
53<\/td>\n15. Maintenance and testing
15.1 Design basis <\/td>\n<\/tr>\n
54<\/td>\n15.2 Acceptance testing
15.3 Equipment identification
15.4 Procedures
15.5 Intervals
15.6 Records <\/td>\n<\/tr>\n
55<\/td>\n15.7 Spare parts
15.8 Technical information
15.9 Training and qualifications <\/td>\n<\/tr>\n
56<\/td>\nAnnex A (informative)Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Criteria for Security Systems for Nuclear Power Generating Stations (Redline)<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2013<\/td>\n57<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":399170,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-399165","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/399165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/399170"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=399165"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=399165"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=399165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}