Aviation and Airport Security Terrorism and Safety Concerns, Second Edition
Spend $50 to get a
Edition: 2nd 2008
List price: $105.00
This item qualifies for FREE shipping.
30 day, 100% satisfaction guarantee!
Rush Rewards U
You have reached 400 XP and carrot coins. That is the daily max!
Considered the definitive handbook on the terrorist threat to commercial airline and airport security, Colonel Kathleen Sweets seminal resource is now updated to include an analysis of modern day risks, as well an examination of the plethora of changes made to air security policies, practices, and regulations since 9/11. She covers the history of aviation security and compares current in-flight security practices with those of other countries. In addition to cargo and passenger security, the text looks at airport and aviation business practices and how security considerations are factored into business processes. New regulations for the Transportation Security Administration are also…
List price: $105.00
Copyright year: 2008
Publisher: CRC Press LLC
Publication date: 12/23/2008
Size: 7.10" wide x 10.00" long x 1.10" tall
|The Aviation Industry: A national security asset|
|The Historical Hijacking Threat and Government Response: A Persistent Problem International Solutions and Reactions|
|Growth and Change: Aircraft As Missiles Terrorism: The Roots Remain International Major Counter Terrorism Units, Law Enforcement, and Intelligence Agencies|
|The best defense Screening G++ the last line of defense|
|Private Security Personnel versus Transportation Administration Security Personnel|
|Metal Detectors, X-Ray Inspection, Explosive Detection, and Trace Detection Devices: Will the Public Tolerate the Intrusion?|
|Cargo Security: A Loose End Security and the Rules of Law|
|A Slippery Slope Foreign Airport Security: Comparison of U.S. Law and Foreign Domestic Law|
|Lessons Learned Technological Improvements: Some Intrusive, Some Not Airport Operator Concerns and Other Safety and Security Issues: The Foundations of Security Access Controls, Perimeter Security: Another Foundation|
|For a more comprehensive Table of Contents, visit crcpress.com|