Book description
The supply chain is a complex system of numerous, integrated stakeholders. These stakeholders are responsible for the transportation, storage, documentation, and handling of material goods and cargo. Each entity has its own unique relationship with and role within the chain as well as its own unique security requirements. The challenge of trying to
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- LIST OF FIGURES
- ABOUT THE AUTHOR
- INTRODUCTION
- PART I WHAT IS SUPPLY CHAIN SECURITY?
-
PART II DEVELOPING A SUPPLY CHAIN SECURITY PROGRAM
- CHAPTER 4 SECURITY FOR KEY LINKS IN THE CHAIN
- CHAPTER 5 ELEMENTS OF A SUCCESSFUL SUPPLY CHAIN SECURITY PROGRAM
- CHAPTER 6 METHODOLOGY FOR SUPPLY CHAIN SECURITY
- CHAPTER 7 BUDGETING
-
PART III REGULATION AND RESOURCE
-
CHAPTER 8 GOVERNMENT AND INDUSTRY SUPPLY CHAIN SECURITY PROGRAMS
- 8.1 C-TPAT (Customs-Trade Partnership against Terrorism)
- 8.2 PIP (Partners in Protection)
- 8.3 FAST (Free and Secure Trade)
- 8.4 BASC (Business Alliance for Secure Commerce)
- 8.5 AEO (Authorized Economic Operator)
- 8.6 CCSP (Certified Cargo Screening Program)
- 8.7 TAPA (Transported Asset Protection Association)
- CHAPTER 9 RESOURCES AND TECHNOLOGY FOR SUPPLY CHAIN SECURITY
-
CHAPTER 8 GOVERNMENT AND INDUSTRY SUPPLY CHAIN SECURITY PROGRAMS
- PART IV CASE STUDIES
- PART V APPENDICES
Product information
- Title: Supply Chain Security
- Author(s):
- Release date: March 2013
- Publisher(s): CRC Press
- ISBN: 9781482209501
You might also like
book
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to …
book
Two-Factor Authentication
Passwords are not enough A password is a single authentication factor – anyone who has it …
book
Principles of Logo Design
From noted graphic designer and logo expert George Bokhua, Principles of Logo Design presents essential techniques …
book
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This …