Maritime security : an introduction /
Maritime Security, 2e, provides practical, experience-based, and proven knowledge - and a "how-to-guide"--Maritime security. McNicholas explains in clear language how commercial seaports and vessels function; what threats currently exist; what security policies, procedures, systems, and me...
Saved in:
Main Authors: | |
---|---|
Corporate Authors: | |
Published: |
Academic,
|
Publisher Address: | Burlington, MA : |
Publication Dates: | 2008. |
Literature type: | eBook |
Language: | English |
Series: |
Butterworth-Heinemann homeland security series
|
Subjects: | |
Online Access: |
http://www.sciencedirect.com/science/book/9780128036723 |
Summary: |
Maritime Security, 2e, provides practical, experience-based, and proven knowledge - and a "how-to-guide"--Maritime security. McNicholas explains in clear language how commercial seaports and vessels function; what threats currently exist; what security policies, procedures, systems, and measures must be implemented to mitigate these threats; and how to conduct ship and port security assessments and plans. Whether the problem is weapons of mass destruction or cargo theft, Maritime Security provides invaluable guidance for the professionals who protect our shipping and ports. New chapters focu |
Carrier Form: | 1 online resource (xxii, 447 pages) : illustrations, maps. |
Bibliography: | Includes bibliographical references and index. |
ISBN: |
9780080919539 0080919537 9780128036723 0128036729 |
Index Number: | VK203 |
CLC: | U698 |
Contents: | Commercial seaports and modes of maritime transport -- Documentation, financial transactions, and business entities in commercial maritime transportation -- International and U.S. maritime security regulation and programs -- Vulnerabilities in the cargo supply chain -- Plagues of the seas: piracy and stowaways -- Drug smuggling via maritime cargo, containers, and vessels -- Terrorism and commercial maritime transportation -- A strategic blueprint for world-class seaport security -- Port security management --Threat mitigation strategies -- Information security and assurance. |