A Guide to Live Video Monitoring Integration with Perimeter Intrusion Detection Systems