| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990000863690403321 |
|
|
Autore |
Walnum, Clayton |
|
|
Titolo |
Creating turbo C++ games / C. Walnum |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNISALENTO991004174229707536 |
|
|
Autore |
Bertoletti, Paolo |
|
|
Titolo |
Mito e simbolo : gli strumenti della psicologia analitica / Paolo Bertoletti ; prefazione di Luigi Zoja |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
Nuova biblioteca Dedalo. Nuovi saggi ; 60 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Complessi psicologici |
Miti - Interpretazione psicanalitica |
Simboli - Interpretazione psicanalitica |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910704341803321 |
|
|
Titolo |
The security of our nation's ports : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Tenth Congress, first session, October 4, 2007 |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Washington : , : U.S. Government Printing Office, , 2012 |
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (iii, 119 pages) : illustration |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Soggetti |
|
Ports of entry - Security measures - United States |
Container terminals - Security measures - United States |
Harbors - Security measures - United States |
Transport workers - United States - Identification |
Identification cards - United States |
Biometric identification - United States |
Interagency coordination - United States |
Terrorism - United States - Prevention |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Title from title screen (viewed on January 31, 2013). |
Paper version available for sale by the Superintendent of Documents, United States Government Printing Office. |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
|
|
|
|
|
|
|
4. |
Record Nr. |
UNINA9910815928803321 |
|
|
Autore |
Edgerton Michael <1961-> |
|
|
Titolo |
A practitioner's guide to effective maritime and port security / / Michael Edgerton |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, New Jersey : , : Wiley, a John Wiley & Sons, Inc., publication, , [2013] |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-118-63317-2 |
1-118-63315-6 |
1-118-63319-9 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (298 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Harbors - Security measures |
Shipping - Security measures |
Maritime terrorism - Prevention |
Harbors - Security measures - United States |
Shipping - Security measures - United States |
Maritime terrorism - United States - Prevention |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters and index. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
part one. The international maritime operating environment -- part two. Threats to ports and the maritime domain -- part three. Current approaches to maritime and port security -- part four. Principles for effective maritime and port security. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Sets forth practices to ensure security and foster international trade Written with an international perspective, this book analyzes the complex set of factors affecting the security of port and maritime operations, including shipping, politics, economics, crime, and terrorism. Author Michael Edgerton critiques current approaches to maritime and port security based on his more than twenty-five years of experience in the field. He not only points out vulnerabilities in today's practices, but also provides a set of proven and tested recommendations that recognize the role and int |
|
|
|
|
|
|
|
| |