Sign in
|
Register
|
Mobile
Home
Browse
About us
Help/FAQ
Advanced search
Home
>
Browse
>
Securing Global Transportation Networks: A Total Security Management Approach
CITATION
Ritter, Luke;
Barrett, J. Michael; and
Wilson, Rosalyn
.
Securing Global Transportation Networks: A Total Security Management Approach
.
US
: McGraw-Hill Education, 2007.
Add to Favorites
Email to a Friend
Download Citation
Securing Global Transportation Networks: A Total Security Management Approach
Authors:
Luke Ritter
,
J. Michael Barrett
and
Rosalyn Wilson
Published:
2007
ISBN:
9780071709767 0071477519
Open eBook
Book Description
Table of Contents
Contents
Foreword
Total Security Management
Introduction
1. Global Trade and Total Security Management
CHANGE AGENT #1: Globalization
CHANGE AGENT #2: Infrastructure and Economic Interdependencies
CHANGE AGENT #3: Discontinuous Events
Overview of Total Security Management
Conclusion
2. The Total Security Management Framework
The Five Strategic Pillars
TSM’s Four Operational Enablers
The TSM Value Creation Model
Conclusion
3. Creating Value: The Case for TSM
TSM and Return on Investment
The TSM Problem Solving Process
Conclusion
4. The Risk Management Approach to TSM
Conclusion
5. Securing Fixed Assets
ENABLER #1: Best Practices Implementation
ENABLER #2: Situational Awareness
ENABLER #3: Training and Exercises
ENABLER #4: Outreach
Applying the TSM Value Creation Model
Conclusion
6. Securing Assets in Transit
ENABLER #1: Best Practices Implementation
ENABLER #2: Situational Awareness
ENABLER #3: Training and Exercises
ENABLER #4: Outreach
Applying the TSM Value Creation Model
Conclusion
7. Securing Brand Equity and Goodwill
ENABLER #1: Best Practices Implementation
ENABLER #2: Situational Awareness
ENABLER #3: Training and Exercises
ENABLER #4: Outreach
The Brand Equity Equation
Applying the TSM Value Creation Model
Conclusion
8. Securing Human Capital
ENABLER #1: Best Practices Implementation
ENABLER #2: Situational Awareness
ENABLER #3: Training and Exercises
ENABLER #4: Outreach
Applying the TSM Value Creation Model
Conclusion
9. TSM and Business Continuity Planning
BCP Implementation
Conclusion
10. The End of the Beginning
The Total Security Management Solution
A. Risk and Vulnerability Assessment Report Template
Table of Contents
I. Executive Summary
II. Assessment Background
III. The Risk Assessment Process
IV. Conclusions
B. Sample Value Chain Security Procedures for Chemical Firms
I. Purpose
II. Scope
III. Responsibilities
IV. Definitions
V. Procedures
VI. Education and Training
C. Seven Signs of Possible Terrorist Activity
I. Surveillance
II. Elicitation
III. Tests of Security
IV. Acquiring Supplies
V. Suspicious People Who Don’t Belong
VI. Dry Runs
VII. Deploying Assets/Getting Into Position
D. Sample Procedures for Handling Suspicious Packages
E. Total Security Management Glossary
Index