Concepts and methods for security management along the entire commodity chain, with the aim of identifying and assessing failure risks and damage potential, detecting security gaps at an early stage, recognizing technical and organizational deficits, and identifying potential for the reduction of dependencies from delivery failures.
End users include public authorities, security and emergency services (police, customs, disaster relief, and others) and infrastructure operators (e.g. transport and logistics providers, commercial enterprises, and operators of storage facilities and transportation hubs for goods and commodities).
EDIAUDIT LEARNING EXERCISE : HOW TO ELABORATE INNOVATIVE DESIGN COLLABORATIVE SUPPLY CHAIN SECURING PROCESS USING INTELLIGENT DOCUMENT CONCEPT?
It looks like you have entered an ISBN number. Would you like to search using what you have
entered as an ISBN number?
Searching for Members?
You entered an email address. Would you like to search for members? Click Yes to continue. If no, materials will be displayed first. You can refine your search with the options on the left of the results page.