Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Amsterdam ; : Elsevier/Butterworth Heinemann,
    UID:
    edocfu_9959232546502883
    Format: 1 online resource (470 p.)
    Edition: 1st ed.
    ISBN: 1-281-79003-6 , 9786611790035 , 0-08-091953-7
    Series Statement: Butterworth-Heinemann homeland security series
    Content: The commercial maritime sector is highly vulnerable to theft and piracy, and presents a probable target for a major terrorist attack. The best way to prevent losses is to apply lessons learned in another arena--the struggle to curb drug smuggling. This effort has shown that successes can be achieved when effective and comprehensive security measures and procedures are implemented at key initial links in the cargo supply chain. The integrity and security of whole system are improved when efforts are focused at the primary ""choke point"" - the load seaports and their ships. This book
    Note: Description based upon print version of record. , Front Cover; Maritime Security An Introduction; Copyright Page; Dedication Page; Table of Contents; About the Author; Contributors; Preface; Acknowledgments; Chapter 1: Commercial Seaports and Modes of Maritime Transport; Chapter 2: Documentation, Financial Transactions, and Business Entities in Commercial Maritime Transportation; Summary; Chapter 3: International and U.S. Maritime Security Regulation and Programs; Objectives; Introduction; The ISPS Code; Amendments to SOLAS; WCO's Framework of Standards to Secure and Facilitate Global Trade; U.S. Laws and Programs , Maritime Transportation Security Act (MTSA)Customs-Trade Partnership Against Terrorism (C-TPAT); C-TPAT Security Criteria for Sea Carriers; Business Partner Requirements; Security Procedures; Container Security; Physical Access Controls; Personnel Security; Procedural Security; Security Training and Awareness; Physical Security; Information Technology Security; Security Assessment, Response, and Improvement; Summary; Chapter 4: Vulnerabilities in the Cargo Supply Chain; Objectives; Introduction; Vulnerabilities and Their Potential Impact; Lessons Learned from the Drug War , Recommended Security Practices at the Production/Loading PhaseManufacturer, Factory, and Plant; Recommended Security Practices at the Export Phase; Carriers and Seaports; Recommended Security Practices at the Importation/Distribution Phase; Ports of Entry and Importers; Special Vulnerabilities in the Maritime Environment; Cargo Theft; Internal Conspiracies and Techniques Used to Circumvent Security; Container Seals; ""Red Flags"" of Possible Criminal/Terrorist Surveillance; Summary; Chapter 5: Plagues of the Seas: Piracy and Stowaways; Objectives; Definition and Historical Beginnings , Highlights of Recent Cases of PiracyTactics and Techniques in Piracy; Chapter 6: Drug Smuggling via Maritime Cargo, Containers, and Vessels; Chapter 7: Terrorism and Commercial Maritime Transportation; Chapter 8: A Strategic Blueprint for World-Class Seaport Security; Chapter 9: Port Security Management; Chapter 10: Threat Mitigation Strategies; Chapter 11: Information Security and Assurance; Further Reading; Glossary; Index , English
    Additional Edition: ISBN 0-12-370859-1
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages