Securing global transportation networks a total security management approach
Securing Global Transportation Networks demonstrates how improved security processes can create value across all the business functions throughout an entire value chain. Readers will learn a whole new security management philosophy, as explained through domestic and international examples and case s...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York [u.a.]
McGraw-Hill
2007
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV022406631 | ||
003 | DE-604 | ||
005 | 20100125 | ||
007 | t | ||
008 | 070430s2007 ad|| |||| 00||| eng d | ||
020 | |a 0071477519 |9 0-07-147751-9 | ||
020 | |a 9780071477512 |9 978-0-07-147751-2 | ||
035 | |a (OCoLC)71350526 | ||
035 | |a (DE-599)BVBBV022406631 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-M347 | ||
050 | 0 | |a HV8290 | |
082 | 0 | |a 363.1207 |2 22 | |
084 | |a QP 530 |0 (DE-625)141897: |2 rvk | ||
100 | 1 | |a Ritter, Luke |e Verfasser |4 aut | |
245 | 1 | 0 | |a Securing global transportation networks |b a total security management approach |c Luke Ritter ; J. Michael Barrett ; Rosalyn Wilson |
264 | 1 | |a New York [u.a.] |b McGraw-Hill |c 2007 | |
300 | |a XXXV, 276 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a Securing Global Transportation Networks demonstrates how improved security processes can create value across all the business functions throughout an entire value chain. Readers will learn a whole new security management philosophy, as explained through domestic and international examples and case studies ranging from major retailers such as Home Depot to shipping giants such as Maersk and FedEx. This book also looks ahead to future developments and "best practices" for the future. If you're charged with making or evaluating transportation security decisions, you'll find the tools you need to succeed -- and prosper -- with the Total Security Management approach. Explains globalization's impact on transportation networks. Creates a framework for realizing a return on security investments by integrating it as a core business process. Details how transportation firms, investors, and insurance companies can measure and reward smart security practices that protect a firm's fixed assets, assets in transit, brand equity and goodwill, and human capital. | |
650 | 7 | |a Beveiliging |2 gtt | |
650 | 7 | |a Internationaal vervoer |2 gtt | |
650 | 7 | |a Risk management |2 gtt | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Freight and freightage |x Security measures | |
650 | 4 | |a Terrorism |x Prevention | |
650 | 4 | |a Total quality management | |
650 | 4 | |a Transportation |x Security measures | |
650 | 0 | 7 | |a Sicherheitsplanung |0 (DE-588)4217560-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internationaler Güterverkehr |0 (DE-588)4162070-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Qualitätsmanagement |0 (DE-588)4219057-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerkmanagement |0 (DE-588)4245322-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internationaler Güterverkehr |0 (DE-588)4162070-7 |D s |
689 | 0 | 1 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | 2 | |a Qualitätsmanagement |0 (DE-588)4219057-5 |D s |
689 | 0 | 3 | |a Netzwerkmanagement |0 (DE-588)4245322-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Internationaler Güterverkehr |0 (DE-588)4162070-7 |D s |
689 | 1 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 1 | 2 | |a Sicherheitsplanung |0 (DE-588)4217560-4 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Barrett, J. Michael |e Verfasser |4 aut | |
700 | 1 | |a Wilson, Rosalyn |e Verfasser |4 aut | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015615186&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015615186 |
Datensatz im Suchindex
_version_ | 1804136470266511360 |
---|---|
adam_text | Contents at a Glance
1. Global Trade and Total Security Management 3
2. The Total Security Management Framework 33
3. Creating Value: The Case for TSM 61
4. The Risk Management Approach to TSM 83
5. Securing Fixed Assets 103
6. Securing Assets in Transit 129
7. Securing Brand Equity and Goodwill 161
8. Securing Human Capital 187
9. TSM and Business Continuity Planning 209
10. The End of the Beginning 229
A. Risk and Vulnerability Assessment
Report Template 239
B. Sample Value Chain Security Procedures
for Chemical Firms 247
C. Seven Signs of Possible Terrorist Activity 253
D. Sample Procedures for Handling
Suspicious Packages 257
E. Total Security Management Glossary 259
Index 263
vii
Contents
Foreword xiii
Total Security Management xvii
Introduction xxi
1. Global Trade and Total Security
Management 3
CHANGE AGENT #1: Globalization 7
CHANGE AGENT #2: Infrastructure
and Economic Interdependencies 12
CHANGE AGENT #3: Discontinuous Events 14
Overview of Total Security Management 17
Conclusion 27
2. The Total Security Management
Framework 33
The Five Strategic Pillars 36
TSM s Four Operational Enablers 41
The TSM Value Creation Model 47
Conclusion 56
3. Creating Value: The Case for TSM 61
TSM and Return on Investment 65
The TSM Problem Solving Process 76
Conclusion 77
4. The Risk Management Approach to TSM 83
Conclusion 98
ix
x Contents
5. Securing Fixed Assets 103
ENABLER #1: Best Practices Implementation 104
ENABLER #2: Situational Awareness 110
ENABLER #3: Training and Exercises 112
ENABLER #4: Outreach 117
Applying the TSM Value Creation Model 118
Conclusion 120
6. Securing Assets in Transit 129
ENABLER #1: Best Practices Implementation 133
ENABLER #2: Situational Awareness 142
ENABLER #3: Training and Exercises 146
ENABLER #4: Outreach 147
Applying the TSM Value Creation Model 151
Conclusion 153
7. Securing Brand Equity and Goodwill 161
ENABLER #1: Best Practices Implementation 173
ENABLER #2: Situational Awareness 174
ENABLER #3: Training and Exercises 175
ENABLER #4: Outreach 176
The Brand Equity Equation 177
Applying the TSM Value Creation Model 178
f Conclusion 181
8. Securing Human Capital 187
ENABLER #1: Best Practices Implementation 194
ENABLER #2: Situational Awareness 195
ENABLER #3: Training and Exercises 196
ENABLER #4: Outreach 197
Applying the TSM Value Creation Model 198
Conclusion 201
9. TSM and Business Continuity Planning 209
BCP Implementation 223
Conclusion 225
Contents xi
10. The End of the Beginning 229
The Total Security Management Solution 231
A. Risk and Vulnerability Assessment
Report Template 239
Table of Contents 239
I. Executive Summary 240
II. Assessment Background 241
III. The Risk Assessment Process 243
IV. Conclusions 245
B. Sample Value Chain Security Procedures
for Chemical Firms 247
I. Purpose 247
II. Scope 247
III. Responsibilities 248
IV. Definitions 248
V. Procedures 249
VI. Education and Training 252
C. Seven Signs of Possible Terrorist Activity 253
I. Surveillance 253
II. Elicitation 254
III. Tests of Security 254
IV. Acquiring Supplies 254
V. Suspicious People Who Don t Belong 255
VI. Dry Runs 255
VII. Deploying Assets/Getting Into Position 255
D. Sample Procedures for Handling
Suspicious Packages 257
E. Total Security Management Glossary 259
Index 263
|
adam_txt |
Contents at a Glance
1. Global Trade and Total Security Management 3
2. The Total Security Management Framework 33
3. Creating Value: The Case for TSM 61
4. The Risk Management Approach to TSM 83
5. Securing Fixed Assets 103
6. Securing Assets in Transit 129
7. Securing Brand Equity and Goodwill 161
8. Securing Human Capital 187
9. TSM and Business Continuity Planning 209
10. The End of the Beginning 229
A. Risk and Vulnerability Assessment
Report Template 239
B. Sample Value Chain Security Procedures
for Chemical Firms 247
C. Seven Signs of Possible Terrorist Activity 253
D. Sample Procedures for Handling
Suspicious Packages 257
E. Total Security Management Glossary 259
Index 263
vii
Contents
Foreword xiii
Total Security Management xvii
Introduction xxi
1. Global Trade and Total Security
Management 3
CHANGE AGENT #1: Globalization 7
CHANGE AGENT #2: Infrastructure
and Economic Interdependencies 12
CHANGE AGENT #3: Discontinuous Events 14
Overview of Total Security Management 17
Conclusion 27
2. The Total Security Management
Framework 33
The Five Strategic Pillars 36
TSM's Four Operational Enablers 41
The TSM Value Creation Model 47
Conclusion 56
3. Creating Value: The Case for TSM 61
TSM and Return on Investment 65
The TSM Problem Solving Process 76
Conclusion 77
4. The Risk Management Approach to TSM 83
Conclusion 98
ix
x Contents
5. Securing Fixed Assets 103
ENABLER #1: Best Practices Implementation 104
ENABLER #2: Situational Awareness 110
ENABLER #3: Training and Exercises 112
ENABLER #4: Outreach 117
Applying the TSM Value Creation Model 118
Conclusion 120
6. Securing Assets in Transit 129
ENABLER #1: Best Practices Implementation 133
ENABLER #2: Situational Awareness 142
ENABLER #3: Training and Exercises 146
ENABLER #4: Outreach 147
Applying the TSM Value Creation Model 151
Conclusion 153
7. Securing Brand Equity and Goodwill 161
ENABLER #1: Best Practices Implementation 173
ENABLER #2: Situational Awareness 174
ENABLER #3: Training and Exercises 175
ENABLER #4: Outreach 176
The Brand Equity Equation 177
Applying the TSM Value Creation Model 178
f Conclusion 181
8. Securing Human Capital 187
ENABLER #1: Best Practices Implementation 194
ENABLER #2: Situational Awareness 195
ENABLER #3: Training and Exercises 196
ENABLER #4: Outreach 197
Applying the TSM Value Creation Model 198
Conclusion 201
9. TSM and Business Continuity Planning 209
BCP Implementation 223
Conclusion 225
Contents xi
10. The End of the Beginning 229
The Total Security Management Solution 231
A. Risk and Vulnerability Assessment
Report Template 239
Table of Contents 239
I. Executive Summary 240
II. Assessment Background 241
III. The Risk Assessment Process 243
IV. Conclusions 245
B. Sample Value Chain Security Procedures
for Chemical Firms 247
I. Purpose 247
II. Scope 247
III. Responsibilities 248
IV. Definitions 248
V. Procedures 249
VI. Education and Training 252
C. Seven Signs of Possible Terrorist Activity 253
I. Surveillance 253
II. Elicitation 254
III. Tests of Security 254
IV. Acquiring Supplies 254
V. Suspicious People Who Don't Belong 255
VI. Dry Runs 255
VII. Deploying Assets/Getting Into Position 255
D. Sample Procedures for Handling
Suspicious Packages 257
E. Total Security Management Glossary 259
Index 263 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Ritter, Luke Barrett, J. Michael Wilson, Rosalyn |
author_facet | Ritter, Luke Barrett, J. Michael Wilson, Rosalyn |
author_role | aut aut aut |
author_sort | Ritter, Luke |
author_variant | l r lr j m b jm jmb r w rw |
building | Verbundindex |
bvnumber | BV022406631 |
callnumber-first | H - Social Science |
callnumber-label | HV8290 |
callnumber-raw | HV8290 |
callnumber-search | HV8290 |
callnumber-sort | HV 48290 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | QP 530 |
ctrlnum | (OCoLC)71350526 (DE-599)BVBBV022406631 |
dewey-full | 363.1207 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.1207 |
dewey-search | 363.1207 |
dewey-sort | 3363.1207 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie Wirtschaftswissenschaften |
discipline_str_mv | Soziologie Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03576nam a2200625 c 4500</leader><controlfield tag="001">BV022406631</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100125 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070430s2007 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0071477519</subfield><subfield code="9">0-07-147751-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071477512</subfield><subfield code="9">978-0-07-147751-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)71350526</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022406631</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-M347</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV8290</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.1207</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 530</subfield><subfield code="0">(DE-625)141897:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ritter, Luke</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing global transportation networks</subfield><subfield code="b">a total security management approach</subfield><subfield code="c">Luke Ritter ; J. Michael Barrett ; Rosalyn Wilson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">McGraw-Hill</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXV, 276 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Securing Global Transportation Networks demonstrates how improved security processes can create value across all the business functions throughout an entire value chain. Readers will learn a whole new security management philosophy, as explained through domestic and international examples and case studies ranging from major retailers such as Home Depot to shipping giants such as Maersk and FedEx. This book also looks ahead to future developments and "best practices" for the future. If you're charged with making or evaluating transportation security decisions, you'll find the tools you need to succeed -- and prosper -- with the Total Security Management approach. Explains globalization's impact on transportation networks. Creates a framework for realizing a return on security investments by integrating it as a core business process. Details how transportation firms, investors, and insurance companies can measure and reward smart security practices that protect a firm's fixed assets, assets in transit, brand equity and goodwill, and human capital.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Beveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internationaal vervoer</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Risk management</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Freight and freightage</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Total quality management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Transportation</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsplanung</subfield><subfield code="0">(DE-588)4217560-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationaler Güterverkehr</subfield><subfield code="0">(DE-588)4162070-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Qualitätsmanagement</subfield><subfield code="0">(DE-588)4219057-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerkmanagement</subfield><subfield code="0">(DE-588)4245322-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internationaler Güterverkehr</subfield><subfield code="0">(DE-588)4162070-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Qualitätsmanagement</subfield><subfield code="0">(DE-588)4219057-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Netzwerkmanagement</subfield><subfield code="0">(DE-588)4245322-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internationaler Güterverkehr</subfield><subfield code="0">(DE-588)4162070-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Sicherheitsplanung</subfield><subfield code="0">(DE-588)4217560-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barrett, J. Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wilson, Rosalyn</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015615186&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015615186</subfield></datafield></record></collection> |
id | DE-604.BV022406631 |
illustrated | Illustrated |
index_date | 2024-07-02T17:20:20Z |
indexdate | 2024-07-09T20:56:54Z |
institution | BVB |
isbn | 0071477519 9780071477512 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015615186 |
oclc_num | 71350526 |
open_access_boolean | |
owner | DE-706 DE-M347 |
owner_facet | DE-706 DE-M347 |
physical | XXXV, 276 S. Ill., graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | McGraw-Hill |
record_format | marc |
spelling | Ritter, Luke Verfasser aut Securing global transportation networks a total security management approach Luke Ritter ; J. Michael Barrett ; Rosalyn Wilson New York [u.a.] McGraw-Hill 2007 XXXV, 276 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Securing Global Transportation Networks demonstrates how improved security processes can create value across all the business functions throughout an entire value chain. Readers will learn a whole new security management philosophy, as explained through domestic and international examples and case studies ranging from major retailers such as Home Depot to shipping giants such as Maersk and FedEx. This book also looks ahead to future developments and "best practices" for the future. If you're charged with making or evaluating transportation security decisions, you'll find the tools you need to succeed -- and prosper -- with the Total Security Management approach. Explains globalization's impact on transportation networks. Creates a framework for realizing a return on security investments by integrating it as a core business process. Details how transportation firms, investors, and insurance companies can measure and reward smart security practices that protect a firm's fixed assets, assets in transit, brand equity and goodwill, and human capital. Beveiliging gtt Internationaal vervoer gtt Risk management gtt Terrorismus Freight and freightage Security measures Terrorism Prevention Total quality management Transportation Security measures Sicherheitsplanung (DE-588)4217560-4 gnd rswk-swf Internationaler Güterverkehr (DE-588)4162070-7 gnd rswk-swf Qualitätsmanagement (DE-588)4219057-5 gnd rswk-swf Netzwerkmanagement (DE-588)4245322-7 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf Risikomanagement (DE-588)4121590-4 gnd rswk-swf Internationaler Güterverkehr (DE-588)4162070-7 s Risikomanagement (DE-588)4121590-4 s Qualitätsmanagement (DE-588)4219057-5 s Netzwerkmanagement (DE-588)4245322-7 s DE-604 Terrorismus (DE-588)4059534-1 s Sicherheitsplanung (DE-588)4217560-4 s Barrett, J. Michael Verfasser aut Wilson, Rosalyn Verfasser aut HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015615186&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Ritter, Luke Barrett, J. Michael Wilson, Rosalyn Securing global transportation networks a total security management approach Beveiliging gtt Internationaal vervoer gtt Risk management gtt Terrorismus Freight and freightage Security measures Terrorism Prevention Total quality management Transportation Security measures Sicherheitsplanung (DE-588)4217560-4 gnd Internationaler Güterverkehr (DE-588)4162070-7 gnd Qualitätsmanagement (DE-588)4219057-5 gnd Netzwerkmanagement (DE-588)4245322-7 gnd Terrorismus (DE-588)4059534-1 gnd Risikomanagement (DE-588)4121590-4 gnd |
subject_GND | (DE-588)4217560-4 (DE-588)4162070-7 (DE-588)4219057-5 (DE-588)4245322-7 (DE-588)4059534-1 (DE-588)4121590-4 |
title | Securing global transportation networks a total security management approach |
title_auth | Securing global transportation networks a total security management approach |
title_exact_search | Securing global transportation networks a total security management approach |
title_exact_search_txtP | Securing global transportation networks a total security management approach |
title_full | Securing global transportation networks a total security management approach Luke Ritter ; J. Michael Barrett ; Rosalyn Wilson |
title_fullStr | Securing global transportation networks a total security management approach Luke Ritter ; J. Michael Barrett ; Rosalyn Wilson |
title_full_unstemmed | Securing global transportation networks a total security management approach Luke Ritter ; J. Michael Barrett ; Rosalyn Wilson |
title_short | Securing global transportation networks |
title_sort | securing global transportation networks a total security management approach |
title_sub | a total security management approach |
topic | Beveiliging gtt Internationaal vervoer gtt Risk management gtt Terrorismus Freight and freightage Security measures Terrorism Prevention Total quality management Transportation Security measures Sicherheitsplanung (DE-588)4217560-4 gnd Internationaler Güterverkehr (DE-588)4162070-7 gnd Qualitätsmanagement (DE-588)4219057-5 gnd Netzwerkmanagement (DE-588)4245322-7 gnd Terrorismus (DE-588)4059534-1 gnd Risikomanagement (DE-588)4121590-4 gnd |
topic_facet | Beveiliging Internationaal vervoer Risk management Terrorismus Freight and freightage Security measures Terrorism Prevention Total quality management Transportation Security measures Sicherheitsplanung Internationaler Güterverkehr Qualitätsmanagement Netzwerkmanagement Risikomanagement |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015615186&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ritterluke securingglobaltransportationnetworksatotalsecuritymanagementapproach AT barrettjmichael securingglobaltransportationnetworksatotalsecuritymanagementapproach AT wilsonrosalyn securingglobaltransportationnetworksatotalsecuritymanagementapproach |