Wednesday, December 17, 2008

Financial Theory and Corporate Policy or Securing Global Transportation Networks

Financial Theory and Corporate Policy

Author: Thomas E Copeland

Financial Theory and Corporate Policy, the classic text in the field, is now available in this completely updated and revised fourth edition. Dedicated to preparing students for the complex world of modern financial scholarship and practice, the text responds to current trends with up-to-date research, literature, and reflection, while continuing to provide a solid foundation of established theory.



Book review: Death by Supermarket or History of Food

Securing Global Transportation Networks

Author: Luke Ritter

Viable, value-creating solutions for securing global transportation networks

Securing Global Transportation Networks demonstrates how improved security processes can create value across all the business functions throughout an entire value chain. Readers will learn a whole new security management philosophy, as explained through domestic and international examples and case studies ranging from major retailers such as Home Depot to shipping giants such as Maersk and FedEx. This book also looks ahead to future developments and "best practices" for the future. If you're charged with making or evaluating transportation security decisions, you'll find the tools you need to succeed -- and prosper -- with the Total Security Management approach.

  • Explains globalization's impact on transportation networks
  • Creates a framework for realizing a return on security investments by integrating it as a core business process
  • Details how transportation firms, investors, and insurance companies can measure and reward smart security practices that protect a firm's fixed assets, assets in transit, brand equity and goodwill, and human capital

Luke Ritter is the CEO of Trident Global Partners and a specialist in commercial and military transportation operations and logistics. Following graduation from the U.S. Naval Academy and service in the Navy, he managed intermodal railroad and trucking operations for a container line, and provided transportation security technology solutions to government and commercial clients while working for a systems integrator. Mr. Ritter is a part-time instructor at the U.S. Merchant Marine Academy's Global Maritime and TransportationSchool, and serves as a contributing scholar at the Heritage Foundation.

J. Michael Barrett is a terrorism and homeland security expert with an extensive background in military intelligence and national security. A former Fulbright Scholar to Ankara, Turkey, Mr. Barrett is currently a Fellow in Homeland Security at the Manhattan Institute and the President of Counterpoint Assessments, a terrorism preparedness and risk mitigation firm. He previously served as Senior Analyst for the War on Terrorism Branch of the Office of the Chairman of the Joint Chiefs of Staff and as Lead Intelligence Officer for the Special Operations/Combating Terrorism Office of the Assistant Secretary of Defense. He has published numerous newspaper and journal articles and has been interviewed dozens of times on television and radio, including ABC, NBC, FOX News, FRONTLINE, New York Public Radio, Bill O’Reilly’s The Radio Factor, and The Canadian Broadcasting Company.

Rosalyn Wilson is Manager at Reality Based IT Services, Ltd. [RBIS], an information technology security firm and subsidiary of SYS Technologies. With more than 25 years of transportation and logistics experience focusing on identifying and analyzing key industry issues and trends, she is also an independent consultant and Director of the Delaney Center for Logistics Innovation. Mrs. Wilson served in various capacities for more than 11 years at the Association of American Railroads AAR. She is the author of the State of Logistics Report, an annual benchmark for U.S. logistics activity and was the author of Transportation in America, an annual compendium of transportation statistics.



Table of Contents:

Preface

Introduction

Chapter 1: Global Trade and Total Security Management

Chapter 2: The Total Security Management Framework

Chapter 3: Creating Value: The Case for TSM

Chapter 4: The Risk Management Approach to TSM

Chapter 5: Securing Fixed Assets

Chapter 6: Securing Assets in Transit

Chapter 7: Securing Brand Equity and Goodwill

Chapter 8: Securing Human Capital

Chapter 9: TSM and Business Continuity Planning

Chapter 10: The End of the beginning

Appendix A: Risk and Vulnerability Assessment Report Template

Appendix B: Sample Value Chain Security Procedures for Chemical Firms

Appendix C: Seven Signs of Possible Terrorist Activity

Appendix D: Sample Procedures for Handling Suspicious Packages

Appendix E: Total Security Management Glossary

No comments: