This book is aimed at a diverse audience including students, researchers, academicians, cybersecurity professionals, IT managers, Metaverse developers, business leaders, policymakers, and tech enthusiasts.
Understanding Victimology: An Active Learning Approach is the only textbook with extensive discussion of both online and offline victimization reinforced by group and individual learning activities.
Understanding Victimology: An Active Learning Approach is the only textbook with extensive discussion of both online and offline victimization reinforced by group and individual learning activities.
This book offers a concise and authoritative overview of the full scope of crime prevention, including foundations, theory, application, and techniques.
This book, Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics, is a comprehensive guide that explores the intricate world of digital security and forensics.
Building on previous work in rural criminology, this book casts a global and comparative look across 19 countries, drawing on themes of crime and victimisation, safety and fear, practices of policing and police trust, and crime prevention practices.
We now live in a pre-crime society, in which information technology strategies and techniques such as predictive policing, actuarial justice and surveillance penology are used to achieve hyper-securitization.
We now live in a pre-crime society, in which information technology strategies and techniques such as predictive policing, actuarial justice and surveillance penology are used to achieve hyper-securitization.
First published in 1908, "e;True Stories of Crime from the District Attorney's Office"e; is a first-hand account of various case files from the New York City District Attorney's office during the late 1890s and early 1900s.
"e;The Felon"e; is a fantastic collection of classic essays on the subject of crime by a variety of authors including criminologists, doctors, criminal psychologists, social workers, and more.
"e;Sensitive security information (SSI) is a category of sensitive but unclassified information under the United States government's information sharing and control rules.
Policing America's Educational Systems, edited by John Harrison Watts, describes methods of policing modern educational settings, covering both K-12 public school and public or private colleges and universities.
The field of threat assessment and the research surrounding it have exploded since the first edition of Threat Assessment and Management Strategies: Identifying the Howlers and Hunters.
The Gang Life: Laugh Now, Cry Later examines the criminal gangster mindset and offers gang prevention strategies, using real-world examples to demonstrate a holistic approach toward combatting this surging societal problem.
In a time when threats against the maritime community have never been greater, Maritime Security: Protection of Marinas, Ports, Small Watercraft, Yachts, and Ships provides a single, comprehensive source of necessary information for understanding and preventing or reducing threats to the maritime community.
In Brazil, where crime is closely associated with social inequality and failure of the criminal justice system, the police are considered by most to be corrupt, inefficient, and violent, especially when occupying poor areas, and they lack the widespread legitimacy enjoyed by police forces in many nations in the northern hemisphere.
This how-to guide covers every aspect of law enforcement training, from training academy administration, to designing curricula, to identifying and utilizing qualified instructors.
Reductions in police department funding have raised the importance of volunteers in enhancing organizational performance, improving community trust and confidence, and at times accomplishing basic tasks to maintain public safety and security.
The proliferation of information systems throughout the criminal justice system has prompted many universities supporting criminal justice programs to add criminal justice information systems technology to their curriculums.
"e;Sensitive security information (SSI) is a category of sensitive but unclassified information under the United States government's information sharing and control rules.
Tradecraft Primer: A Framework for Aspiring Interrogators is a timely and relevant reference manual for a new generation of professionals as we enter a new era in our nation's interrogation programs.
This book addresses the various strategies that are available to police management, such as consolidation, regionalization, and amalgamation of police agencies; new public management (NPM); enhanced performance management; civilianization; and organizational restructuring.
Workplace Violence: Issues in Threat Management defines what workplace violence is, delves into the myths and realities surrounding the topic and provides readers with the latest statistics, thinking, and strategies in the prevention of workplace violence.
Police use of force has been a major concern for police departments and citizens in the United States since the 1840s, when police first started carrying guns.
The field of threat assessment and the research surrounding it have exploded since the first edition of Threat Assessment and Management Strategies: Identifying the Howlers and Hunters.
Police Corruption in the NYPD: From Knapp to Mollen explores how the New York Police Department experienced two major investigations within a quarter of a century.
"e;It is hoped that, through this series, it will be possible to accelerate the process of building knowledge about policing and help bridge the gap between the two worlds the world of police research and police practice.
This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide.
The Terrorists of Iraq: Inside the Strategy and Tactics of the Iraq Insurgency 2003-2014, Second Edition is a highly detailed and exhaustive history and analysis of terror groups that both formed the Iraq insurgency and led to the rise of the Islamic State of Iraq and Syria (ISIS).