Book description
Beginning with a historical backdrop describing the dawn of the age of global terrorism in the 1960s and continuing up until the present time, this volume demonstrates the broad social and political context underlying the aviation security system that was in place on September 11th and the system that has evolved in response to the 9/11 attacks. Examining ongoing threats and vulnerabilities, the book describes how they have come to shape U.S. policy and strategy. Topics discussed include legislation, intelligence gathering, best practices for risk management, in-flight security measures, and passenger, baggage, and employee screening methods.
Table of contents
- Front cover (1/2)
- Front cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Preface (1/2)
- Preface (2/2)
- Acknowledgments
- Author
- Author’s Disclaimer
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (1/8)
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (2/8)
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (3/8)
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (4/8)
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (5/8)
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (6/8)
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (7/8)
- Chapter 1. Pre-9/11 Threats to Aviation Security and the U.S. Policy Response (8/8)
- Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (1/6)
- Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (2/6)
- Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (3/6)
- Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (4/6)
- Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (5/6)
- Chapter 2. The 9/11 Attacks and the Ensuing Policy Debate (6/6)
- Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (1/6)
- Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (2/6)
- Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (3/6)
- Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (4/6)
- Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (5/6)
- Chapter 3. Policy Refinement in Response to the Evolving Terrorist Threat (6/6)
- Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (1/7)
- Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (2/7)
- Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (3/7)
- Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (4/7)
- Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (5/7)
- Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (6/7)
- Chapter 4. The U.S. Strategy for Combatting Terror Threats to the Aviation Domain (7/7)
- Chapter 5. Evaluating and Managing Security Risks (1/6)
- Chapter 5. Evaluating and Managing Security Risks (2/6)
- Chapter 5. Evaluating and Managing Security Risks (3/6)
- Chapter 5. Evaluating and Managing Security Risks (4/6)
- Chapter 5. Evaluating and Managing Security Risks (5/6)
- Chapter 5. Evaluating and Managing Security Risks (6/6)
- Chapter 6. Exploiting Intelligence and Counterterrorism Information (1/7)
- Chapter 6. Exploiting Intelligence and Counterterrorism Information (2/7)
- Chapter 6. Exploiting Intelligence and Counterterrorism Information (3/7)
- Chapter 6. Exploiting Intelligence and Counterterrorism Information (4/7)
- Chapter 6. Exploiting Intelligence and Counterterrorism Information (5/7)
- Chapter 6. Exploiting Intelligence and Counterterrorism Information (6/7)
- Chapter 6. Exploiting Intelligence and Counterterrorism Information (7/7)
- Chapter 7. Passenger and Baggage Screening (1/9)
- Chapter 7. Passenger and Baggage Screening (2/9)
- Chapter 7. Passenger and Baggage Screening (3/9)
- Chapter 7. Passenger and Baggage Screening (4/9)
- Chapter 7. Passenger and Baggage Screening (5/9)
- Chapter 7. Passenger and Baggage Screening (6/9)
- Chapter 7. Passenger and Baggage Screening (7/9)
- Chapter 7. Passenger and Baggage Screening (8/9)
- Chapter 7. Passenger and Baggage Screening (9/9)
- Chapter 8. Airline In-Flight Security Measures (1/8)
- Chapter 8. Airline In-Flight Security Measures (2/8)
- Chapter 8. Airline In-Flight Security Measures (3/8)
- Chapter 8. Airline In-Flight Security Measures (4/8)
- Chapter 8. Airline In-Flight Security Measures (5/8)
- Chapter 8. Airline In-Flight Security Measures (6/8)
- Chapter 8. Airline In-Flight Security Measures (7/8)
- Chapter 8. Airline In-Flight Security Measures (8/8)
- Chapter 9. Commercial Airport Access Controls and Perimeter Security (1/7)
- Chapter 9. Commercial Airport Access Controls and Perimeter Security (2/7)
- Chapter 9. Commercial Airport Access Controls and Perimeter Security (3/7)
- Chapter 9. Commercial Airport Access Controls and Perimeter Security (4/7)
- Chapter 9. Commercial Airport Access Controls and Perimeter Security (5/7)
- Chapter 9. Commercial Airport Access Controls and Perimeter Security (6/7)
- Chapter 9. Commercial Airport Access Controls and Perimeter Security (7/7)
- Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (1/6)
- Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (2/6)
- Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (3/6)
- Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (4/6)
- Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (5/6)
- Chapter 10. Mitigating the Threat of Shoulder-Fired Missiles and Other Standoff Weapons (6/6)
- Chapter 11. Air Cargo Security (1/6)
- Chapter 11. Air Cargo Security (2/6)
- Chapter 11. Air Cargo Security (3/6)
- Chapter 11. Air Cargo Security (4/6)
- Chapter 11. Air Cargo Security (5/6)
- Chapter 11. Air Cargo Security (6/6)
- Chapter 12. Security for GA Operations and Airports (1/8)
- Chapter 12. Security for GA Operations and Airports (2/8)
- Chapter 12. Security for GA Operations and Airports (3/8)
- Chapter 12. Security for GA Operations and Airports (4/8)
- Chapter 12. Security for GA Operations and Airports (5/8)
- Chapter 12. Security for GA Operations and Airports (6/8)
- Chapter 12. Security for GA Operations and Airports (7/8)
- Chapter 12. Security for GA Operations and Airports (8/8)
- Index (1/4)
- Index (2/4)
- Index (3/4)
- Index (4/4)
- Back cover
Product information
- Title: Airport and Aviation Security
- Author(s):
- Release date: September 2009
- Publisher(s): CRC Press
- ISBN: 9781420070309
You might also like
book
General Aviation Security
Addressing all aspects of general aviation security, this book offers guidance to a wide audience including …
book
Network and Data Security for Non-Engineers
Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, …
book
Aircraft Systems
An authoritative guide to the various systems related to navigation, control, and other instrumentation used in …
book
Industrial Network Security, 2nd Edition
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, …