Global supply chain security
The author explores the potential impact of port-related catastrophic events in the United States and their effects worldwide, concentrating, in particular, on the United States' contribution to global container security. He underscores the vulnerabilities in the supply chain that U.S. governme...
Saved in:
| Main Author: | Giermanski, James R. (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Lanham
The Scarecrow Press, Inc.
2013
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Transport logistics
Published: (2002)
Published: (2002)
Freight Transport and Distribution Concepts and Optimisation Models
by: Bektas, Tolga
Published: (2017)
by: Bektas, Tolga
Published: (2017)
Securing global transportation networks A total security management approach
by: Ritter
Published: (2007)
by: Ritter
Published: (2007)
Managing global supply chains compliance, security, and dealing with terrorism
by: Cook , Thomas A. 1953-
Published: (2008)
by: Cook , Thomas A. 1953-
Published: (2008)
Intermodal freight transport and logistics
by: Monios, Jason, et al.
Published: (2017)
by: Monios, Jason, et al.
Published: (2017)
Global supply chain security and management appraising programs, preventing crimes
by: Prokop, Darren
Published: (2017)
by: Prokop, Darren
Published: (2017)
Water supply systems security
Published: (2004)
Published: (2004)
Containerisation, multimodal transport and infrastructure development in India
by: Hariharan, K. V.
Published: (2014)
by: Hariharan, K. V.
Published: (2014)
Risk and the war on terror
Published: (2008)
Published: (2008)
Port facility security officer
Published: (2003)
Published: (2003)
Maritime security protection of marinas, ports, small watercraft, yachts, and ships
by: Benny, Daniel J.
Published: (2016)
by: Benny, Daniel J.
Published: (2016)
Maritime security an introduction
by: McNicholas, Michael
Published: (2016)
by: McNicholas, Michael
Published: (2016)
Logistics and transportation security a strategic, tactical, and operational guide to resilience
by: Burns, Maria G.
Published: (2015)
by: Burns, Maria G.
Published: (2015)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
The future of intermodal freight transport operations, design and policy
Published: (2008)
Published: (2008)
Fourth-generation corporate security asymmetrical warfare for protective services professionals
by: Godlewski, R.J
Published: (2014)
by: Godlewski, R.J
Published: (2014)
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014)
by: Shimeall, Timothy
Published: (2014)
Security manual
by: Brooksbank
Published: (2007)
by: Brooksbank
Published: (2007)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Internet security you can afford using Untangle as your internet gateway
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Transportation security
Published: (2008)
Published: (2008)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
CWSP guide to wireless security
Published: (2007)
Published: (2007)
E-commerce security
by: Ghosh
Published: (1998)
by: Ghosh
Published: (1998)
Secure communications applications and management
by: Sutton
Published: (2001)
by: Sutton
Published: (2001)
mCommerce security a beginner's guide
by: RainalhKapil
by: RainalhKapil
Corporate computer and network security
by: Panko, R. R.
Published: (2010)
by: Panko, R. R.
Published: (2010)
Web security a whitehat perspective
by: Hanqing, Wu, et al.
Published: (2015)
by: Hanqing, Wu, et al.
Published: (2015)
Applied approach to privacy and security for the internet of things
Published: (2020)
Published: (2020)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Security and software for cybercafes
Published: (2008)
Published: (2008)
Security and privacy issues in sensor networks and IoT
Published: (2020)
Published: (2020)
Information security handbook develop a threat model and incident response strategy to build a strong information security framework
by: Death, Darren
Published: (2017)
by: Death, Darren
Published: (2017)
Management of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
by: Whitman, Michael E. 1964-, et al.
Published: (2019)
Web 2.0 security defending Ajax, RIA, and SOA
by: Shah, Shreeraj
Published: (2008)
by: Shah, Shreeraj
Published: (2008)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Risk analysis and security countermeasure selection
by: Norman, Thomas L.
Published: (2016)
by: Norman, Thomas L.
Published: (2016)
Security for mobile networks and platforms
by: Aissi
Published: (2006)
by: Aissi
Published: (2006)
Wireless Internet security architecture and protocols
by: Kempf, James 1952-
Published: (2008)
by: Kempf, James 1952-
Published: (2008)
Similar Items
-
Transport logistics
Published: (2002) -
Freight Transport and Distribution Concepts and Optimisation Models
by: Bektas, Tolga
Published: (2017) -
Securing global transportation networks A total security management approach
by: Ritter
Published: (2007) -
Managing global supply chains compliance, security, and dealing with terrorism
by: Cook , Thomas A. 1953-
Published: (2008) -
Intermodal freight transport and logistics
by: Monios, Jason, et al.
Published: (2017)


