Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Global Logistics: Transportation in International Supply Chains

Buy

Global logistics entails tradeoffs in facility location, distribution networks, the routing and scheduling of deliveries by different modes of travel (e.g., air, water, truck, rail), procurement, and the overall management of international supply chains. In an increasingly global economy, then, logistics has become a very important matter in the success or failure of an organization. It is an integral part of supply chain management that involves not just operations management considerations, but production engineering and regional science issues as well.

As Director of the prestigious Waterloo Management of Integrated Manufacturing Systems Research Group (WATMIMS), which specializes in logistics and manufacturing, Jim Bookbinder is uniquely qualified to edit a handbook on global logistics. He has aligned a set of prominent contributors for this volume.

The chapters in the Handbook are organized into discrete sections that examine modes; logistics in particular countries; operations within a free-trade zone; innovative features impacting international logistics; case studies of specific companies; and a look toward the future. Contributors are from the Americas, Europe, and Asia, and they push the state of the art in areas such as trade vs. security; border issues; cabotage within NAFTA; Green logistics corridors within the EU; inland ports; direct-to-store considerations; and all the questions that need to be confronted in any given region. This will certainly appeal to researchers and practitioners alike, and could serve as required or supplementary reading in graduate-level logistics courses as well.

(HTML tags aren't allowed.)

Gods and Goddesses in Greek Mythology
Gods and Goddesses in Greek Mythology

The word myth comes from the Greek word mythos, which means “story” or “speech.”1 Myth is often the word used to describe a story that explains events or objects that occur in nature, such as the creation of certain flowers or animals, the location of deserts or oceans, and even the origin and cycle of the seasons....

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Mission-Critical Security Planner: When Hackers Won't Take No for an Answer
Mission-Critical Security Planner: When Hackers Won't Take No for an Answer
All the worksheets and templates you need to create a complete customized security plan that works for your business

Let’s face it: Security is a business problem, not just a technical challenge. Whether hackers simply want to test their skills or steal your data, they can–and will–do incalculable damage to your company. You...


Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

Undue Influence: How the Wall Street Elite Puts the Financial System at Risk
Undue Influence: How the Wall Street Elite Puts the Financial System at Risk
In late 1999, a Republican congressman held a party in Washington
to celebrate the passing of new legislation destined to
have a profound effect on Wall Street and the entire financial
industry in the United States. Despite the date on the law,
the principle upon which it was based actually had been a cornerstone
of the
...
Theory of Computing: A Gentle Introduction
Theory of Computing: A Gentle Introduction

The theory of computing provides students with a background in the fundamentals of computing with which to achieve a deeper understanding of contemporary computing systems. Computers are evolving and developing at a dizzying rate. Yet, the fundamentals of pattern matching and programming language design and implementation have remained...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy