Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    Online-Ressource
    Online-Ressource
    Amsterdam ; : Elsevier/Butterworth Heinemann,
    UID:
    almafu_9959232546502883
    Umfang: 1 online resource (470 p.)
    Ausgabe: 1st ed.
    ISBN: 1-281-79003-6 , 9786611790035 , 0-08-091953-7
    Serie: Butterworth-Heinemann homeland security series
    Inhalt: The commercial maritime sector is highly vulnerable to theft and piracy, and presents a probable target for a major terrorist attack. The best way to prevent losses is to apply lessons learned in another arena--the struggle to curb drug smuggling. This effort has shown that successes can be achieved when effective and comprehensive security measures and procedures are implemented at key initial links in the cargo supply chain. The integrity and security of whole system are improved when efforts are focused at the primary ""choke point"" - the load seaports and their ships. This book
    Anmerkung: Description based upon print version of record. , Front Cover; Maritime Security An Introduction; Copyright Page; Dedication Page; Table of Contents; About the Author; Contributors; Preface; Acknowledgments; Chapter 1: Commercial Seaports and Modes of Maritime Transport; Chapter 2: Documentation, Financial Transactions, and Business Entities in Commercial Maritime Transportation; Summary; Chapter 3: International and U.S. Maritime Security Regulation and Programs; Objectives; Introduction; The ISPS Code; Amendments to SOLAS; WCO's Framework of Standards to Secure and Facilitate Global Trade; U.S. Laws and Programs , Maritime Transportation Security Act (MTSA)Customs-Trade Partnership Against Terrorism (C-TPAT); C-TPAT Security Criteria for Sea Carriers; Business Partner Requirements; Security Procedures; Container Security; Physical Access Controls; Personnel Security; Procedural Security; Security Training and Awareness; Physical Security; Information Technology Security; Security Assessment, Response, and Improvement; Summary; Chapter 4: Vulnerabilities in the Cargo Supply Chain; Objectives; Introduction; Vulnerabilities and Their Potential Impact; Lessons Learned from the Drug War , Recommended Security Practices at the Production/Loading PhaseManufacturer, Factory, and Plant; Recommended Security Practices at the Export Phase; Carriers and Seaports; Recommended Security Practices at the Importation/Distribution Phase; Ports of Entry and Importers; Special Vulnerabilities in the Maritime Environment; Cargo Theft; Internal Conspiracies and Techniques Used to Circumvent Security; Container Seals; ""Red Flags"" of Possible Criminal/Terrorist Surveillance; Summary; Chapter 5: Plagues of the Seas: Piracy and Stowaways; Objectives; Definition and Historical Beginnings , Highlights of Recent Cases of PiracyTactics and Techniques in Piracy; Chapter 6: Drug Smuggling via Maritime Cargo, Containers, and Vessels; Chapter 7: Terrorism and Commercial Maritime Transportation; Chapter 8: A Strategic Blueprint for World-Class Seaport Security; Chapter 9: Port Security Management; Chapter 10: Threat Mitigation Strategies; Chapter 11: Information Security and Assurance; Further Reading; Glossary; Index , English
    Weitere Ausg.: ISBN 0-12-370859-1
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz