Book description
The response of the U.S. federal government to the events of September 11, 2001 has reflected the challenge of striking a balance between implementing security measures to deter terrorist attacks while at the same time limiting disruption to air commerce. Airport and Aviation Security: U.S. Policy and Strategy in the Age of Global Terrorism is a co
Table of contents
- Front cover (1/2)
- Front cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Preface (1/2)
- Preface (2/2)
- Acknowledgments
- Author
- Author’s Disclaimer
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (1/8)
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (2/8)
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (3/8)
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (4/8)
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (5/8)
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (6/8)
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (7/8)
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (8/8)
- Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (1/6)
- Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (2/6)
- Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (3/6)
- Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (4/6)
- Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (5/6)
- Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (6/6)
- Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (1/6)
- Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (2/6)
- Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (3/6)
- Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (4/6)
- Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (5/6)
- Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (6/6)
- Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (1/7)
- Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (2/7)
- Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (3/7)
- Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (4/7)
- Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (5/7)
- Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (6/7)
- Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (7/7)
- Chapter 5. Evaluating and Managing Security Risks (1/6)
- Chapter 5. Evaluating and Managing Security Risks (2/6)
- Chapter 5. Evaluating and Managing Security Risks (3/6)
- Chapter 5. Evaluating and Managing Security Risks (4/6)
- Chapter 5. Evaluating and Managing Security Risks (5/6)
- Chapter 5. Evaluating and Managing Security Risks (6/6)
- Chapter 6. Exploiting Intelligence and Counterterrorism Information (1/7)
- Chapter 6. Exploiting Intelligence and Counterterrorism Information (2/7)
- Chapter 6. Exploiting Intelligence and Counterterrorism Information (3/7)
- Chapter 6. Exploiting Intelligence and Counterterrorism Information (4/7)
- Chapter 6. Exploiting Intelligence and Counterterrorism Information (5/7)
- Chapter 6. Exploiting Intelligence and Counterterrorism Information (6/7)
- Chapter 6. Exploiting Intelligence and Counterterrorism Information (7/7)
- Chapter 7. Passenger and Baggage Screening (1/9)
- Chapter 7. Passenger and Baggage Screening (2/9)
- Chapter 7. Passenger and Baggage Screening (3/9)
- Chapter 7. Passenger and Baggage Screening (4/9)
- Chapter 7. Passenger and Baggage Screening (5/9)
- Chapter 7. Passenger and Baggage Screening (6/9)
- Chapter 7. Passenger and Baggage Screening (7/9)
- Chapter 7. Passenger and Baggage Screening (8/9)
- Chapter 7. Passenger and Baggage Screening (9/9)
- Chapter 8. Airline In-Flight Security Measures (1/8)
- Chapter 8. Airline In-Flight Security Measures (2/8)
- Chapter 8. Airline In-Flight Security Measures (3/8)
- Chapter 8. Airline In-Flight Security Measures (4/8)
- Chapter 8. Airline In-Flight Security Measures (5/8)
- Chapter 8. Airline In-Flight Security Measures (6/8)
- Chapter 8. Airline In-Flight Security Measures (7/8)
- Chapter 8. Airline In-Flight Security Measures (8/8)
- Chapter 9. Commercial Airport Access Controls and Perimeter Security (1/7)
- Chapter 9. Commercial Airport Access Controls and Perimeter Security (2/7)
- Chapter 9. Commercial Airport Access Controls and Perimeter Security (3/7)
- Chapter 9. Commercial Airport Access Controls and Perimeter Security (4/7)
- Chapter 9. Commercial Airport Access Controls and Perimeter Security (5/7)
- Chapter 9. Commercial Airport Access Controls and Perimeter Security (6/7)
- Chapter 9. Commercial Airport Access Controls and Perimeter Security (7/7)
- Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (1/6)
- Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (2/6)
- Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (3/6)
- Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (4/6)
- Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (5/6)
- Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (6/6)
- Chapter 11. Air Cargo Security (1/6)
- Chapter 11. Air Cargo Security (2/6)
- Chapter 11. Air Cargo Security (3/6)
- Chapter 11. Air Cargo Security (4/6)
- Chapter 11. Air Cargo Security (5/6)
- Chapter 11. Air Cargo Security (6/6)
- Chapter 12. Security for GA Operations and Airports (1/8)
- Chapter 12. Security for GA Operations and Airports (2/8)
- Chapter 12. Security for GA Operations and Airports (3/8)
- Chapter 12. Security for GA Operations and Airports (4/8)
- Chapter 12. Security for GA Operations and Airports (5/8)
- Chapter 12. Security for GA Operations and Airports (6/8)
- Chapter 12. Security for GA Operations and Airports (7/8)
- Chapter 12. Security for GA Operations and Airports (8/8)
- Index (1/4)
- Index (2/4)
- Index (3/4)
- Index (4/4)
- Back cover
Product information
- Title: Airport and Aviation Security
- Author(s):
- Release date: September 2009
- Publisher(s): CRC Press
- ISBN: 9781420070309
You might also like
book
Simple Steps to Data Encryption
Everyone wants privacy and security online, something that most computer users have more or less given …
book
Practical Monitoring
Do you have a nagging feeling that your monitoring needs improvement, but you just aren’t sure …
book
ITIL Foundation, ITIL 4 edition
The first step on the ITIL 4 pathway provides IT professionals with an understanding of the …
book
IT Change Management
Essential reading for anyone wishing to understand how IT change management can be implemented and put …