𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Protecting Transportation: Implementing Security Policies and Programs

✍ Scribed by R William Johnstone


Publisher
Butterworth-Heinemann
Year
2015
Tongue
English
Leaves
389
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Protecting Transportation: Implementing Security Policies and Programs provides a thorough overview of transportation security in the United States, with a focus on policy. The book coversall major transportation modes and puts the American security system into perspective against other national and international systems. Author R. William Johnstone, a transportation security expert and member of the 9/11 Commission staff, discusses how the current transportation security system came to be and how it is performing.

Whether you are a current or aspiring transportation security professional, a policymaker, or an engaged citizen, Johnstone’s presentation equips you to understand today’s issues and debates on a problem that affects every member of the global community. Transportation security has evolved in the years since 9/11 from a relatively modest, sporadic undertaking into a multi-billion dollar enterprise employing tens of thousands. Protecting Transportation describes how that system is organized, funded, and implemented.

  • Fosters critical thinking by reviewing the development and evaluation of key transportation security programs
  • Clarifies security issues in the context of civil liberties, federal spending, and terrorist incidents in the United States and globally
  • Considers the β€œinputsΒ” of security policy, including laws, regulations, and programs; and the β€œoutcomes,Β” such as enforcement, effectiveness metrics, and workforce morale

✦ Table of Contents


Content:
Front matter, Page iii
Copyright, Page iv
Digital Assets, Page ix
Introduction, Pages xi-xvi
1 - Transportation Security Before 9/11/01, Pages 1-36
2 - The 9/11 Watershed, Pages 37-72
3 - Transportation Systems and Security Risks, Pages 73-106
4 - Transportation Security Roles and Responsibilities, Pages 107-142
5 - Transportation Security Policymaking, Pages 143-177
6 - Implementing Maritime Security, Pages 179-213
7 - Implementing Land Transportation Security, Pages 215-250
8 - Implementing Aviation Security, Pages 251-288
9 - Evaluating Transportation Security, Pages 289-326
10 - Transportation Security in Context, Pages 327-358
Conclusion, Pages 359-364
Index, Pages 365-382


πŸ“œ SIMILAR VOLUMES


Security Policies and Implementation Iss
✍ Robert Johnson, Chuck Easttom πŸ“‚ Library πŸ“… 2020 πŸ› Jones & Bartlett Learning 🌐 English

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psycho

An Introduction to Sustainable Transport
✍ Preston L. Schiller, Eric Bruun, Jeffrey R. Kenworthy πŸ“‚ Library πŸ“… 2010 πŸ› Earthscan 🌐 English

Transportation plays a substantial role in the modern world; it provides tremendous benefits to society, but it also imposes significant economic, social and environmental costs. Sustainable transport planning requires integrating environmental, social, and economic factors in order to develop optim

Building and implementing a security cer
✍ Patrick D. Howard πŸ“‚ Library πŸ“… 2006 πŸ› Auerbach Publications 🌐 English

Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It pro

Implementing Information Security in Hea
✍ Herzig, Terrell W(Editor);Walsh, Tom(Editor);Gallagher, Lisa A(Editor) πŸ“‚ Library πŸ“… 2013 πŸ› Healthcare Information and Management Systems Soci 🌐 English

Implementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare security concerns in an era of powerful computer technology, increased mobility, and complex regulations designed to protect personal information. Featuring perspective