000 | 06956cam a2200937M 4500 | ||
---|---|---|---|
001 | sulb-eb0032872 | ||
003 | BD-SySUS | ||
005 | 20170713221346.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 131001s2013 nju ob 001 0 eng d | ||
040 |
_aCDX _beng _epn _cCDX _dOCLCQ _dE7B _dMEAUC _dEBLCP _dOCLCQ _dHF7 _dOCLCO _dOCLCQ _dCOO _dOCLCO _dTEFOD _dOCLCQ _dN$T _dIDEBK _dYDXCP _dCUS _dDG1 _dB24X7 _dRECBK _dOCLCF _dOCLCO _dDEBSZ _dOCLCO _dOCLCQ _dOCLCO _dDEBBG _dTEFOD _dOCLCQ _dBD-SySUS |
||
019 |
_a858861147 _a872647183 _a961561924 _a962643679 |
||
020 |
_a9781299907676 _q(electronic bk.) |
||
020 |
_a1299907679 _q(electronic bk.) |
||
020 |
_a1118633199 _q(electronic bk.) |
||
020 |
_a9781118633199 _q(electronic bk.) |
||
020 |
_a9781118633175 _q(electronic bk.) |
||
020 |
_a1118633172 _q(electronic bk.) |
||
020 |
_a9781118633151 _q(electronic bk.) |
||
020 |
_a1118633156 _q(electronic bk.) |
||
020 | _z1118099915 | ||
020 | _z9781118099919 | ||
028 | 0 | 1 |
_aEB00174720 _bRecorded Books |
029 | 1 |
_aAU@ _b000052334809 |
|
029 | 1 |
_aAU@ _b000052913136 |
|
029 | 1 |
_aCHBIS _b010131745 |
|
029 | 1 |
_aCHVBK _b314714030 |
|
029 | 1 |
_aDEBBG _bBV041573314 |
|
029 | 1 |
_aDEBBG _bBV041910409 |
|
029 | 1 |
_aDEBBG _bBV043396261 |
|
029 | 1 |
_aDEBSZ _b431508488 |
|
029 | 1 |
_aNZ1 _b15351119 |
|
035 |
_a(OCoLC)859403866 _z(OCoLC)858861147 _z(OCoLC)872647183 _z(OCoLC)961561924 _z(OCoLC)962643679 |
||
037 |
_a522018 _bMIL |
||
037 |
_a5850A425-8024-469E-9B34-E995C7D6249F _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
043 | _an-us--- | ||
050 | 4 | _aVK | |
072 | 7 |
_aBUS _x032000 _2bisacsh |
|
072 | 7 |
_aSOC _x000000 _2bisacsh |
|
082 | 0 | 4 |
_a363.28 _a363.289 |
049 | _aMAIN | ||
100 | 1 | _aEdgerton, Michael. | |
245 | 1 | 0 | _aPractitioner's Guide to Effective Maritime and Port Security. |
260 |
_aHoboken, N.J. : _bWiley _c2013. |
||
300 | _a1 online resource (1 online resource (296 pages)) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
505 | 0 | _aCover; Title Page; Copyright Page; Contents; Introduction; Foreword; PART ONE The International Maritime Operating Environment; CHAPTER 1 Unique Characteristics of Ports and International Shipping; Introduction; The Multinational Nature of Shipping and Business Drivers in Port Operations; Flag States; Vessel Registries; Types of Vessel Registries; Implications for Security; Third Country Owners; Implications for Security; Multinational Crews; Implications for Security; Port States; Regulatory Requirements; International Treaties and Codes; Oversight Mechanisms; Ship-Port Relationships. | |
505 | 8 | _aThe Supply ChainJust-in-Time Delivery; The Components of a Maritime Supply Chain; Regulatory Issues; Intermodal Links; CHAPTER 2 The Criticality of Ports: Why and How They Matter; Introduction; Geopolitical Considerations; Trade Routes; Trade Chokepoints; Sea Lines of Communication; Ports; Ports as Targets; Ports as Conduits; Cargo Theft; Smuggling; Ports as Borders; Intermodal Connections; PART TWO Threats to Ports and the Maritime Domain; CHAPTER 3 Threats; Introduction; Threats by States; State Actors; Conventional Military Attacks Against Ports; Conventional Attacks Against Supply Chains. | |
505 | 8 | _aAsymmetric AttacksState Proxies; Proxy Tactics; Nonstate Actors; Terrorism; Criminal Activity; Piracy; Terrorism, State Actors, and Criminal Nexus; PART THREE Current Approaches to Maritime and Port Security; CHAPTER 4 Approaches to Security Policy Development; Introduction; Political Considerations; Commercial Interests; Costs of Implementation; Increased Government Oversight; Potential Delays; Domestic Political Constituencies; Container Screening; Port Security Grants; Measuring the Effectiveness of Security Measures; Deterrence; Punishment; Denial; Consequence Management. | |
505 | 8 | _aMeasurement of Activity vs. EffectivenessMeasurement of Activity; Resources Expended; Measurement of Criminal Activity; How to Measure Effectiveness; Why Don't We Do This Already?; The Maritime Context of Assessing Deterrence; Lack of a Risk Approach; What is Risk?; Dynamic Risk; Pure Risk; Fundamental Risk; Particular Risk; Components of Security Risk; Threat; Vulnerability; Consequence; Risk Management; The Weaknesses of Current Risk Management Approaches; Lack of Understanding of Security Risk Components; Lack of a Process to Determine Risk Tolerances. | |
505 | 8 | _aTendency Towards Risk Aversion or AvoidanceFocus on Risk Mitigation (Reduction) instead of Risk Treatment; Lack of Recognition of Critical Nodes in the Maritime Domain; Overquantifying Security Risk; Tendency to Use the Rubric of All-hazard Risk; A Propensity to Minimize the Element of Threat in Performing Security Risk Assessments; CHAPTER 5 A Critique of Current Maritime Security Measures and Approaches; Introduction; Regulations and Their Limits; The ISPS Code; Supply Chain Security; International Organization for Standardization. | |
520 | _aSets forth practices to ensure security and foster international trade Written with an international perspective, this book analyzes the complex set of factors affecting the security of port and maritime operations, including shipping, politics, economics, crime, and terrorism. Author Michael Edgerton critiques current approaches to maritime and port security based on his more than twenty-five years of experience in the field. He not only points out vulnerabilities in today's practices, but also provides a set of proven and tested recommendations that recognize the role and int. | ||
588 | 0 | _aPrint version record. | |
504 | _aIncludes bibliographical references and index. | ||
650 | 0 |
_aHarbors _xSecurity measures. |
|
650 | 0 |
_aShipping _xSecurity measures. |
|
650 | 0 |
_aMaritime terrorism _xPrevention. |
|
650 | 0 |
_aHarbors _xSecurity measures _zUnited States. |
|
650 | 0 |
_aShipping _xSecurity measures _zUnited States. |
|
650 | 0 |
_aMaritime terrorism _zUnited States _xPrevention. |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xInfrastructure. _2bisacsh |
|
650 | 7 |
_aSOCIAL SCIENCE _xGeneral. _2bisacsh |
|
650 | 7 |
_aTechnology. _2fast _0(OCoLC)fst01145078 |
|
655 | 4 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _z9781299907676 |
856 | 4 | 0 |
_uhttp://onlinelibrary.wiley.com/book/10.1002/9781118633151 _zWiley Online Library [Free Download only for SUST IP] |
938 |
_aBooks 24x7 _bB247 _nbkg00052638 |
||
938 |
_aCoutts Information Services _bCOUT _n26244947 |
||
938 |
_aEBL - Ebook Library _bEBLB _nEBL1404582 |
||
938 |
_aebrary _bEBRY _nebr10767591 |
||
938 |
_aEBSCOhost _bEBSC _n642220 |
||
938 |
_aIngram Digital eBook Collection _bIDEB _ncis26244947 |
||
938 |
_aRecorded Books, LLC _bRECE _nrbeEB00174720 |
||
938 |
_aYBP Library Services _bYANK _n9985164 |
||
938 |
_aYBP Library Services _bYANK _n11157417 |
||
938 |
_aYBP Library Services _bYANK _n13035625 |
||
994 |
_a92 _bDG1 |
||
999 |
_c64524 _d64524 |