The commercial maritime sector is highly vulnerable to theft and piracy, and presents a probable target for a major terrorist attack. The best way to prevent losses is to apply lessons learned in another arena--the struggle to curb drug smuggling. This effort has shown that successes can be achieved when effective and comprehensive security measures and procedures are implemented at key initial links in the cargo supply chain. The integrity and security of whole system are improved when efforts are focused at the primary "choke point" - the load seaports and their ships.
This book provides practical, experience-based, and proven knowledge - and a "how-to-guide" - on maritime security. McNicholas explains in clear language how commercial seaports and vessels function; what threats currently exist; what security policies, procedures, systems, and measures must be implemented to mitigate these threats; and how to conduct ship and port security assessments and plans. Whether the problem is weapons of mass destruction or cargo theft, Maritime Security provides invaluable guidance for the professionals who protect our shipping and ports.
This book provides practical, experience-based, and proven knowledge - and a "how-to-guide" - on maritime security. McNicholas explains in clear language how commercial seaports and vessels function; what threats currently exist; what security policies, procedures, systems, and measures must be implemented to mitigate these threats; and how to conduct ship and port security assessments and plans. Whether the problem is weapons of mass destruction or cargo theft, Maritime Security provides invaluable guidance for the professionals who protect our shipping and ports.
- Holds the keys to successfully designing, implementing, and managing effective port and vessel security programs in a high-risk environment
- Provides real-world experience in Maritime Security from the Managing Director of Phoenix Management Services Group in the USA and Panama.
- Offers specifics of a model port security program and case studies of effective tactics in a high-threat environment
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.