Abstract

This chapter provides a discussion of the physical and technological security measures employed and in place at and in ports to deny access, and deter, detect, and defend against an attack.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call