This edited collection by internationally recognized authors provides essays on police behavior in the categories of police administration, police operations, and combating specific crimes.
This edited collection by internationally recognized authors provides essays on police behavior in the categories of police administration, police operations, and combating specific crimes.
This collection critically explores the use of financial technology (FinTech) and artificial intelligence (AI) in the financial sector and discusses effective regulation and the prevention of crime.
This collection critically explores the use of financial technology (FinTech) and artificial intelligence (AI) in the financial sector and discusses effective regulation and the prevention of crime.
Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas, Second Edition was written for one primary purpose: to keep people alive by introducing them to private security detail tactics and techniques.
Security Operations: An Introduction to Planning and Conducting Private Security Details for High-Risk Areas, Second Edition was written for one primary purpose: to keep people alive by introducing them to private security detail tactics and techniques.
Origins of Terrorism: The Rise of the World's Most Formidable Terrorist Groups examines the roots of Islamic terrorism, it's history, and some of the foundational figures in prominent terrorist organizations.
Origins of Terrorism: The Rise of the World's Most Formidable Terrorist Groups examines the roots of Islamic terrorism, it's history, and some of the foundational figures in prominent terrorist organizations.
The Sex Offender Register examines the origins, history, structure and legalities of the UK sex offender register, and explores how political and public opinion has influenced the direction the policy of registration has taken.
The Sex Offender Register examines the origins, history, structure and legalities of the UK sex offender register, and explores how political and public opinion has influenced the direction the policy of registration has taken.
Crime and Intelligence Analysis: An Integrated Real-Time Approach, 2nd Edition, covers everything crime analysts and tactical analysts need to know to be successful.
Crime and Intelligence Analysis: An Integrated Real-Time Approach, 2nd Edition, covers everything crime analysts and tactical analysts need to know to be successful.
This book analytically reviews the impact of the global anti-money laundering and counter-terrorist financing (AML/CFT) framework on the compliance trajectory of a number of jurisdictions to this framework.
This book analytically reviews the impact of the global anti-money laundering and counter-terrorist financing (AML/CFT) framework on the compliance trajectory of a number of jurisdictions to this framework.
This book analyses the usefulness of terrorist profiling utilised by law enforcement officers as a pre-emptive means to assist them in the detection, prevention and deterrence of terrorism and/or its preparatory activities.
This book analyses the usefulness of terrorist profiling utilised by law enforcement officers as a pre-emptive means to assist them in the detection, prevention and deterrence of terrorism and/or its preparatory activities.
Although the literature and cultural practices of the South Asian region demonstrate a rich understanding of criminology, this handbook is the first to focus on crime, criminal justice, and victimization in Afghanistan, Bangladesh, Bhutan, India, Maldives, Nepal, Pakistan, and Sri Lanka.
This book maps the problems and possibilities of the policies and practices designed to tackle violence against women in the domestic sphere over the last 40 years.
This new work explores the growth of information and communication technologies with an emphasis on cyber-physical systems and security management of these systems.
This new work explores the growth of information and communication technologies with an emphasis on cyber-physical systems and security management of these systems.
Agent-Based Modelling for Criminological Theory Testing and Development addresses the question whether and how we can use simulation methods in order to test criminological theories, and if they fail to be corroborated, how we can use simulation to mend and further develop theories.
Agent-Based Modelling for Criminological Theory Testing and Development addresses the question whether and how we can use simulation methods in order to test criminological theories, and if they fail to be corroborated, how we can use simulation to mend and further develop theories.
Although the literature and cultural practices of the South Asian region demonstrate a rich understanding of criminology, this handbook is the first to focus on crime, criminal justice, and victimization in Afghanistan, Bangladesh, Bhutan, India, Maldives, Nepal, Pakistan, and Sri Lanka.
Policing Suspicion is an innovative examination of policing practices and the impact of these on patterns of arrest and prosecution in London, 1780-1850.
Policing Suspicion is an innovative examination of policing practices and the impact of these on patterns of arrest and prosecution in London, 1780-1850.
Active Shooter Response Training: Lone Wolf to Coordinated Attack, Second Edition, provides expanded and updated training for police and security officers who must respond to an active shooter situation.
Active Shooter Response Training: Lone Wolf to Coordinated Attack, Second Edition, provides expanded and updated training for police and security officers who must respond to an active shooter situation.
This book explores misdemeanor courts in the United States by focusing on the processing of misdemeanor crimes and the resultant consequences of conviction, such as loss of employment and housing, the imposition of significant fines, and loss of liberty-all amounting to the criminalization of poverty that happens in many U.
This book explores misdemeanor courts in the United States by focusing on the processing of misdemeanor crimes and the resultant consequences of conviction, such as loss of employment and housing, the imposition of significant fines, and loss of liberty-all amounting to the criminalization of poverty that happens in many U.
This book approaches the gun control debate by asking what it takes to achieve acceptance of, and compliance with, gun control regulations in a community thought to be opposed and resistant.
Crime Prevention: Approaches, Practices, and Evaluations, Eleventh Edition, meets the needs of students and instructors for engaging, evidence-based, impartial coverage of interventions that can reduce or prevent deviance.
Crime Prevention: Approaches, Practices, and Evaluations, Eleventh Edition, meets the needs of students and instructors for engaging, evidence-based, impartial coverage of interventions that can reduce or prevent deviance.
Including a peer-support workbook with exercises, this book demonstrates the therapeutic value of art practice, both inside and outside institutions, as a more humane approach for children and adolescents affected by mass incarceration.
In 2007, Estonia faced a series of cyberattacks on its cyber infrastructure, which caused widespread damage to the country's economy, politics, and security.