The document discusses access control measures and technologies. It describes how security needs have increased due to terrorist attacks. Access control provides monitoring and restricting movement of people and assets. The document outlines different access control options like token-based systems using proximity cards, digital keypads, and biometric readers. It compares technologies on factors like security, cost, and environmental tolerance. Integrating access control with other systems is also discussed.