Book description
After 9/11, the initial focus from the U.S. government, media, and the public was on security at commercial airports and aboard commercial airlines. Soon, investigation revealed the hijackers had trained at flight schools operating out of general aviation airports, leading to a huge outcry by the media and within the government to mandate security
Table of contents
- Cover
- Title Page
- Copyright
- Dedication
- CONTENTS
- Foreword
- Acknowledgments
- About the Author
- 1 General Aviation
- 2 The Security Threat to General Aviation
- 3 Physical Security for the Aviation Environment
- 4 Airport/Corporate Aviation Security Force
- 5 Security of General Aviation Aircraft
- 6 Security of General Aviation Airports
- 7 Airport Safety
- 8 Emergency Response
- 9 Security of General Aviation Hangars
- 10 Security of Fixed-Base Operation
- 11 Security of the Flight School
- 12 Corporate Aviation Security Department
- 13 Aircraft Owners and Pilots Association Airport Watch
- 14 Transportation Security Administration Security Requirements and Recommendations for General Aviation
- 15 General Aviation Security Resources
- Appendix A: Global Terrorist Groups
- Appendix B: Sample General Aviation Airport Security Plan
- Appendix C: The Impact of the Aircraft Owners and Pilots Association Airport Watch Program on Crime at Pennsylvania General Aviation Airports
- Index
Product information
- Title: General Aviation Security
- Author(s):
- Release date: August 2012
- Publisher(s): CRC Press
- ISBN: 9781466510883
You might also like
book
Airport and Aviation Security
Beginning with a historical backdrop describing the dawn of the age of global terrorism in the …
book
Cybersecurity Law, 2nd Edition
The second edition of the definitive guide to cybersecurity law, updated to reflect recent legal developments …
book
Schneier on Security
Presenting invaluable advice from the world's most famous computer security expert, this intensely readable collection features …
book
Network Attacks and Exploitation
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides …