Securing global transportation networks a total security management approach

Securing Global Transportation Networks demonstrates how improved security processes can create value across all the business functions throughout an entire value chain. Readers will learn a whole new security management philosophy, as explained through domestic and international examples and case s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Ritter, Luke (VerfasserIn), Barrett, J. Michael (VerfasserIn), Wilson, Rosalyn (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: New York [u.a.] McGraw-Hill 2007
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV022406631
003 DE-604
005 20100125
007 t
008 070430s2007 ad|| |||| 00||| eng d
020 |a 0071477519  |9 0-07-147751-9 
020 |a 9780071477512  |9 978-0-07-147751-2 
035 |a (OCoLC)71350526 
035 |a (DE-599)BVBBV022406631 
040 |a DE-604  |b ger  |e rakwb 
041 0 |a eng 
049 |a DE-706  |a DE-M347 
050 0 |a HV8290 
082 0 |a 363.1207  |2 22 
084 |a QP 530  |0 (DE-625)141897:  |2 rvk 
100 1 |a Ritter, Luke  |e Verfasser  |4 aut 
245 1 0 |a Securing global transportation networks  |b a total security management approach  |c Luke Ritter ; J. Michael Barrett ; Rosalyn Wilson 
264 1 |a New York [u.a.]  |b McGraw-Hill  |c 2007 
300 |a XXXV, 276 S.  |b Ill., graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
520 3 |a Securing Global Transportation Networks demonstrates how improved security processes can create value across all the business functions throughout an entire value chain. Readers will learn a whole new security management philosophy, as explained through domestic and international examples and case studies ranging from major retailers such as Home Depot to shipping giants such as Maersk and FedEx. This book also looks ahead to future developments and "best practices" for the future. If you're charged with making or evaluating transportation security decisions, you'll find the tools you need to succeed -- and prosper -- with the Total Security Management approach. Explains globalization's impact on transportation networks. Creates a framework for realizing a return on security investments by integrating it as a core business process. Details how transportation firms, investors, and insurance companies can measure and reward smart security practices that protect a firm's fixed assets, assets in transit, brand equity and goodwill, and human capital. 
650 7 |a Beveiliging  |2 gtt 
650 7 |a Internationaal vervoer  |2 gtt 
650 7 |a Risk management  |2 gtt 
650 4 |a Terrorismus 
650 4 |a Freight and freightage  |x Security measures 
650 4 |a Terrorism  |x Prevention 
650 4 |a Total quality management 
650 4 |a Transportation  |x Security measures 
650 0 7 |a Sicherheitsplanung  |0 (DE-588)4217560-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Internationaler Güterverkehr  |0 (DE-588)4162070-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Qualitätsmanagement  |0 (DE-588)4219057-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Netzwerkmanagement  |0 (DE-588)4245322-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Terrorismus  |0 (DE-588)4059534-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Risikomanagement  |0 (DE-588)4121590-4  |2 gnd  |9 rswk-swf 
689 0 0 |a Internationaler Güterverkehr  |0 (DE-588)4162070-7  |D s 
689 0 1 |a Risikomanagement  |0 (DE-588)4121590-4  |D s 
689 0 2 |a Qualitätsmanagement  |0 (DE-588)4219057-5  |D s 
689 0 3 |a Netzwerkmanagement  |0 (DE-588)4245322-7  |D s 
689 0 |5 DE-604 
689 1 0 |a Internationaler Güterverkehr  |0 (DE-588)4162070-7  |D s 
689 1 1 |a Terrorismus  |0 (DE-588)4059534-1  |D s 
689 1 2 |a Sicherheitsplanung  |0 (DE-588)4217560-4  |D s 
689 1 |5 DE-604 
700 1 |a Barrett, J. Michael  |e Verfasser  |4 aut 
700 1 |a Wilson, Rosalyn  |e Verfasser  |4 aut 
856 4 2 |m HBZ Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015615186&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
999 |a oai:aleph.bib-bvb.de:BVB01-015615186 

Datensatz im Suchindex

_version_ 1804136470266511360
adam_text Contents at a Glance 1. Global Trade and Total Security Management 3 2. The Total Security Management Framework 33 3. Creating Value: The Case for TSM 61 4. The Risk Management Approach to TSM 83 5. Securing Fixed Assets 103 6. Securing Assets in Transit 129 7. Securing Brand Equity and Goodwill 161 8. Securing Human Capital 187 9. TSM and Business Continuity Planning 209 10. The End of the Beginning 229 A. Risk and Vulnerability Assessment Report Template 239 B. Sample Value Chain Security Procedures for Chemical Firms 247 C. Seven Signs of Possible Terrorist Activity 253 D. Sample Procedures for Handling Suspicious Packages 257 E. Total Security Management Glossary 259 Index 263 vii Contents Foreword xiii Total Security Management xvii Introduction xxi 1. Global Trade and Total Security Management 3 CHANGE AGENT #1: Globalization 7 CHANGE AGENT #2: Infrastructure and Economic Interdependencies 12 CHANGE AGENT #3: Discontinuous Events 14 Overview of Total Security Management 17 Conclusion 27 2. The Total Security Management Framework 33 The Five Strategic Pillars 36 TSM s Four Operational Enablers 41 The TSM Value Creation Model 47 Conclusion 56 3. Creating Value: The Case for TSM 61 TSM and Return on Investment 65 The TSM Problem Solving Process 76 Conclusion 77 4. The Risk Management Approach to TSM 83 Conclusion 98 ix x Contents 5. Securing Fixed Assets 103 ENABLER #1: Best Practices Implementation 104 ENABLER #2: Situational Awareness 110 ENABLER #3: Training and Exercises 112 ENABLER #4: Outreach 117 Applying the TSM Value Creation Model 118 Conclusion 120 6. Securing Assets in Transit 129 ENABLER #1: Best Practices Implementation 133 ENABLER #2: Situational Awareness 142 ENABLER #3: Training and Exercises 146 ENABLER #4: Outreach 147 Applying the TSM Value Creation Model 151 Conclusion 153 7. Securing Brand Equity and Goodwill 161 ENABLER #1: Best Practices Implementation 173 ENABLER #2: Situational Awareness 174 ENABLER #3: Training and Exercises 175 ENABLER #4: Outreach 176 The Brand Equity Equation 177 Applying the TSM Value Creation Model 178 f Conclusion 181 8. Securing Human Capital 187 ENABLER #1: Best Practices Implementation 194 ENABLER #2: Situational Awareness 195 ENABLER #3: Training and Exercises 196 ENABLER #4: Outreach 197 Applying the TSM Value Creation Model 198 Conclusion 201 9. TSM and Business Continuity Planning 209 BCP Implementation 223 Conclusion 225 Contents xi 10. The End of the Beginning 229 The Total Security Management Solution 231 A. Risk and Vulnerability Assessment Report Template 239 Table of Contents 239 I. Executive Summary 240 II. Assessment Background 241 III. The Risk Assessment Process 243 IV. Conclusions 245 B. Sample Value Chain Security Procedures for Chemical Firms 247 I. Purpose 247 II. Scope 247 III. Responsibilities 248 IV. Definitions 248 V. Procedures 249 VI. Education and Training 252 C. Seven Signs of Possible Terrorist Activity 253 I. Surveillance 253 II. Elicitation 254 III. Tests of Security 254 IV. Acquiring Supplies 254 V. Suspicious People Who Don t Belong 255 VI. Dry Runs 255 VII. Deploying Assets/Getting Into Position 255 D. Sample Procedures for Handling Suspicious Packages 257 E. Total Security Management Glossary 259 Index 263
adam_txt Contents at a Glance 1. Global Trade and Total Security Management 3 2. The Total Security Management Framework 33 3. Creating Value: The Case for TSM 61 4. The Risk Management Approach to TSM 83 5. Securing Fixed Assets 103 6. Securing Assets in Transit 129 7. Securing Brand Equity and Goodwill 161 8. Securing Human Capital 187 9. TSM and Business Continuity Planning 209 10. The End of the Beginning 229 A. Risk and Vulnerability Assessment Report Template 239 B. Sample Value Chain Security Procedures for Chemical Firms 247 C. Seven Signs of Possible Terrorist Activity 253 D. Sample Procedures for Handling Suspicious Packages 257 E. Total Security Management Glossary 259 Index 263 vii Contents Foreword xiii Total Security Management xvii Introduction xxi 1. Global Trade and Total Security Management 3 CHANGE AGENT #1: Globalization 7 CHANGE AGENT #2: Infrastructure and Economic Interdependencies 12 CHANGE AGENT #3: Discontinuous Events 14 Overview of Total Security Management 17 Conclusion 27 2. The Total Security Management Framework 33 The Five Strategic Pillars 36 TSM's Four Operational Enablers 41 The TSM Value Creation Model 47 Conclusion 56 3. Creating Value: The Case for TSM 61 TSM and Return on Investment 65 The TSM Problem Solving Process 76 Conclusion 77 4. The Risk Management Approach to TSM 83 Conclusion 98 ix x Contents 5. Securing Fixed Assets 103 ENABLER #1: Best Practices Implementation 104 ENABLER #2: Situational Awareness 110 ENABLER #3: Training and Exercises 112 ENABLER #4: Outreach 117 Applying the TSM Value Creation Model 118 Conclusion 120 6. Securing Assets in Transit 129 ENABLER #1: Best Practices Implementation 133 ENABLER #2: Situational Awareness 142 ENABLER #3: Training and Exercises 146 ENABLER #4: Outreach 147 Applying the TSM Value Creation Model 151 Conclusion 153 7. Securing Brand Equity and Goodwill 161 ENABLER #1: Best Practices Implementation 173 ENABLER #2: Situational Awareness 174 ENABLER #3: Training and Exercises 175 ENABLER #4: Outreach 176 The Brand Equity Equation 177 Applying the TSM Value Creation Model 178 f Conclusion 181 8. Securing Human Capital 187 ENABLER #1: Best Practices Implementation 194 ENABLER #2: Situational Awareness 195 ENABLER #3: Training and Exercises 196 ENABLER #4: Outreach 197 Applying the TSM Value Creation Model 198 Conclusion 201 9. TSM and Business Continuity Planning 209 BCP Implementation 223 Conclusion 225 Contents xi 10. The End of the Beginning 229 The Total Security Management Solution 231 A. Risk and Vulnerability Assessment Report Template 239 Table of Contents 239 I. Executive Summary 240 II. Assessment Background 241 III. The Risk Assessment Process 243 IV. Conclusions 245 B. Sample Value Chain Security Procedures for Chemical Firms 247 I. Purpose 247 II. Scope 247 III. Responsibilities 248 IV. Definitions 248 V. Procedures 249 VI. Education and Training 252 C. Seven Signs of Possible Terrorist Activity 253 I. Surveillance 253 II. Elicitation 254 III. Tests of Security 254 IV. Acquiring Supplies 254 V. Suspicious People Who Don't Belong 255 VI. Dry Runs 255 VII. Deploying Assets/Getting Into Position 255 D. Sample Procedures for Handling Suspicious Packages 257 E. Total Security Management Glossary 259 Index 263
any_adam_object 1
any_adam_object_boolean 1
author Ritter, Luke
Barrett, J. Michael
Wilson, Rosalyn
author_facet Ritter, Luke
Barrett, J. Michael
Wilson, Rosalyn
author_role aut
aut
aut
author_sort Ritter, Luke
author_variant l r lr
j m b jm jmb
r w rw
building Verbundindex
bvnumber BV022406631
callnumber-first H - Social Science
callnumber-label HV8290
callnumber-raw HV8290
callnumber-search HV8290
callnumber-sort HV 48290
callnumber-subject HV - Social Pathology, Criminology
classification_rvk QP 530
ctrlnum (OCoLC)71350526
(DE-599)BVBBV022406631
dewey-full 363.1207
dewey-hundreds 300 - Social sciences
dewey-ones 363 - Other social problems and services
dewey-raw 363.1207
dewey-search 363.1207
dewey-sort 3363.1207
dewey-tens 360 - Social problems and services; associations
discipline Soziologie
Wirtschaftswissenschaften
discipline_str_mv Soziologie
Wirtschaftswissenschaften
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03576nam a2200625 c 4500</leader><controlfield tag="001">BV022406631</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100125 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070430s2007 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0071477519</subfield><subfield code="9">0-07-147751-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071477512</subfield><subfield code="9">978-0-07-147751-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)71350526</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022406631</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-M347</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV8290</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.1207</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 530</subfield><subfield code="0">(DE-625)141897:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ritter, Luke</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing global transportation networks</subfield><subfield code="b">a total security management approach</subfield><subfield code="c">Luke Ritter ; J. Michael Barrett ; Rosalyn Wilson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">McGraw-Hill</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXV, 276 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Securing Global Transportation Networks demonstrates how improved security processes can create value across all the business functions throughout an entire value chain. Readers will learn a whole new security management philosophy, as explained through domestic and international examples and case studies ranging from major retailers such as Home Depot to shipping giants such as Maersk and FedEx. This book also looks ahead to future developments and "best practices" for the future. If you're charged with making or evaluating transportation security decisions, you'll find the tools you need to succeed -- and prosper -- with the Total Security Management approach. Explains globalization's impact on transportation networks. Creates a framework for realizing a return on security investments by integrating it as a core business process. Details how transportation firms, investors, and insurance companies can measure and reward smart security practices that protect a firm's fixed assets, assets in transit, brand equity and goodwill, and human capital.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Beveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internationaal vervoer</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Risk management</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Freight and freightage</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Total quality management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Transportation</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsplanung</subfield><subfield code="0">(DE-588)4217560-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationaler Güterverkehr</subfield><subfield code="0">(DE-588)4162070-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Qualitätsmanagement</subfield><subfield code="0">(DE-588)4219057-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerkmanagement</subfield><subfield code="0">(DE-588)4245322-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internationaler Güterverkehr</subfield><subfield code="0">(DE-588)4162070-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Qualitätsmanagement</subfield><subfield code="0">(DE-588)4219057-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Netzwerkmanagement</subfield><subfield code="0">(DE-588)4245322-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internationaler Güterverkehr</subfield><subfield code="0">(DE-588)4162070-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Sicherheitsplanung</subfield><subfield code="0">(DE-588)4217560-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barrett, J. Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wilson, Rosalyn</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=015615186&amp;sequence=000002&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015615186</subfield></datafield></record></collection>
id DE-604.BV022406631
illustrated Illustrated
index_date 2024-07-02T17:20:20Z
indexdate 2024-07-09T20:56:54Z
institution BVB
isbn 0071477519
9780071477512
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-015615186
oclc_num 71350526
open_access_boolean
owner DE-706
DE-M347
owner_facet DE-706
DE-M347
physical XXXV, 276 S. Ill., graph. Darst.
publishDate 2007
publishDateSearch 2007
publishDateSort 2007
publisher McGraw-Hill
record_format marc
spelling Ritter, Luke Verfasser aut
Securing global transportation networks a total security management approach Luke Ritter ; J. Michael Barrett ; Rosalyn Wilson
New York [u.a.] McGraw-Hill 2007
XXXV, 276 S. Ill., graph. Darst.
txt rdacontent
n rdamedia
nc rdacarrier
Securing Global Transportation Networks demonstrates how improved security processes can create value across all the business functions throughout an entire value chain. Readers will learn a whole new security management philosophy, as explained through domestic and international examples and case studies ranging from major retailers such as Home Depot to shipping giants such as Maersk and FedEx. This book also looks ahead to future developments and "best practices" for the future. If you're charged with making or evaluating transportation security decisions, you'll find the tools you need to succeed -- and prosper -- with the Total Security Management approach. Explains globalization's impact on transportation networks. Creates a framework for realizing a return on security investments by integrating it as a core business process. Details how transportation firms, investors, and insurance companies can measure and reward smart security practices that protect a firm's fixed assets, assets in transit, brand equity and goodwill, and human capital.
Beveiliging gtt
Internationaal vervoer gtt
Risk management gtt
Terrorismus
Freight and freightage Security measures
Terrorism Prevention
Total quality management
Transportation Security measures
Sicherheitsplanung (DE-588)4217560-4 gnd rswk-swf
Internationaler Güterverkehr (DE-588)4162070-7 gnd rswk-swf
Qualitätsmanagement (DE-588)4219057-5 gnd rswk-swf
Netzwerkmanagement (DE-588)4245322-7 gnd rswk-swf
Terrorismus (DE-588)4059534-1 gnd rswk-swf
Risikomanagement (DE-588)4121590-4 gnd rswk-swf
Internationaler Güterverkehr (DE-588)4162070-7 s
Risikomanagement (DE-588)4121590-4 s
Qualitätsmanagement (DE-588)4219057-5 s
Netzwerkmanagement (DE-588)4245322-7 s
DE-604
Terrorismus (DE-588)4059534-1 s
Sicherheitsplanung (DE-588)4217560-4 s
Barrett, J. Michael Verfasser aut
Wilson, Rosalyn Verfasser aut
HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015615186&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis
spellingShingle Ritter, Luke
Barrett, J. Michael
Wilson, Rosalyn
Securing global transportation networks a total security management approach
Beveiliging gtt
Internationaal vervoer gtt
Risk management gtt
Terrorismus
Freight and freightage Security measures
Terrorism Prevention
Total quality management
Transportation Security measures
Sicherheitsplanung (DE-588)4217560-4 gnd
Internationaler Güterverkehr (DE-588)4162070-7 gnd
Qualitätsmanagement (DE-588)4219057-5 gnd
Netzwerkmanagement (DE-588)4245322-7 gnd
Terrorismus (DE-588)4059534-1 gnd
Risikomanagement (DE-588)4121590-4 gnd
subject_GND (DE-588)4217560-4
(DE-588)4162070-7
(DE-588)4219057-5
(DE-588)4245322-7
(DE-588)4059534-1
(DE-588)4121590-4
title Securing global transportation networks a total security management approach
title_auth Securing global transportation networks a total security management approach
title_exact_search Securing global transportation networks a total security management approach
title_exact_search_txtP Securing global transportation networks a total security management approach
title_full Securing global transportation networks a total security management approach Luke Ritter ; J. Michael Barrett ; Rosalyn Wilson
title_fullStr Securing global transportation networks a total security management approach Luke Ritter ; J. Michael Barrett ; Rosalyn Wilson
title_full_unstemmed Securing global transportation networks a total security management approach Luke Ritter ; J. Michael Barrett ; Rosalyn Wilson
title_short Securing global transportation networks
title_sort securing global transportation networks a total security management approach
title_sub a total security management approach
topic Beveiliging gtt
Internationaal vervoer gtt
Risk management gtt
Terrorismus
Freight and freightage Security measures
Terrorism Prevention
Total quality management
Transportation Security measures
Sicherheitsplanung (DE-588)4217560-4 gnd
Internationaler Güterverkehr (DE-588)4162070-7 gnd
Qualitätsmanagement (DE-588)4219057-5 gnd
Netzwerkmanagement (DE-588)4245322-7 gnd
Terrorismus (DE-588)4059534-1 gnd
Risikomanagement (DE-588)4121590-4 gnd
topic_facet Beveiliging
Internationaal vervoer
Risk management
Terrorismus
Freight and freightage Security measures
Terrorism Prevention
Total quality management
Transportation Security measures
Sicherheitsplanung
Internationaler Güterverkehr
Qualitätsmanagement
Netzwerkmanagement
Risikomanagement
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015615186&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT ritterluke securingglobaltransportationnetworksatotalsecuritymanagementapproach
AT barrettjmichael securingglobaltransportationnetworksatotalsecuritymanagementapproach
AT wilsonrosalyn securingglobaltransportationnetworksatotalsecuritymanagementapproach