Private Security: An Introduction to Principles and Practice, Second Edition explains foundational security principles-defining terms and outlining the increasing scope of security in daily life-while reflecting current practices of private security as an industry and profession.
The case studies provided in Case Studies for Advances in Paleoimaging will provide the reader with real-world scenarios and case examples that will help prepare researchers to discover new ways to apply the various modalities associated with the technology.
The case studies provided in Case Studies for Advances in Paleoimaging will provide the reader with real-world scenarios and case examples that will help prepare researchers to discover new ways to apply the various modalities associated with the technology.
This book provides an ethnography of street-level policing in the United States and offers an analysis with valuable lessons for today's law enforcement officers.
This book provides an ethnography of street-level policing in the United States and offers an analysis with valuable lessons for today's law enforcement officers.
This book examines how class shapes interactions between professionals, parents, and young people in the youth justice system, utilising a mix of contemporary social theory and a wealth of empirical material.
This book examines how class shapes interactions between professionals, parents, and young people in the youth justice system, utilising a mix of contemporary social theory and a wealth of empirical material.
This book contributes to the literature on organized crime by providing a detailed account of the various nuances of what happens when criminal organizations misuse or penetrate legitimate businesses.
This book contributes to the literature on organized crime by providing a detailed account of the various nuances of what happens when criminal organizations misuse or penetrate legitimate businesses.
This edited collection illuminates the weaknesses and strengths of crime reporting across a wide range of countries, with a focus on democratic countries in which the police bear some accountability to citizens.
This edited collection illuminates the weaknesses and strengths of crime reporting across a wide range of countries, with a focus on democratic countries in which the police bear some accountability to citizens.
Introduction to Intelligence Studies (third edition) provides an overview of the US intelligence community, to include its history, organization, and function.
Introduction to Intelligence Studies (third edition) provides an overview of the US intelligence community, to include its history, organization, and function.
First published in 1992, Crime, Criminal Justice and the Probation Service is a thought-provoking analysis of the role of the probation service in developing an integrated system of criminal justice.
First published in 1992, Crime, Criminal Justice and the Probation Service is a thought-provoking analysis of the role of the probation service in developing an integrated system of criminal justice.
Homicide: Towards a Deeper Understanding offers an in-depth analysis into the phenomenon of homicide, examining different types of homicide and how these types have changed over time.
Homicide: Towards a Deeper Understanding offers an in-depth analysis into the phenomenon of homicide, examining different types of homicide and how these types have changed over time.
People working in our cyber world have access to a wide range of information including sensitive personal or corporate information which increases the risk to it.
People working in our cyber world have access to a wide range of information including sensitive personal or corporate information which increases the risk to it.
Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition.
Transhumanism, Artificial Intelligence, the Cloud, Robotics, Electromagnetic Fields, Intelligence Communities, Rail Transportation, Open-Source Intelligence (OSINT)-all this and more is discussed in Cyber Crime Investigator's Field Guide, Third Edition.
Think Like a Terrorist to Combat Terrorism and Radicalization in Prison provides guidelines for hardening facilities, training staff, preparing for radicalized-terrorist inmates' incarceration, and monitoring these inmates after their release.
Think Like a Terrorist to Combat Terrorism and Radicalization in Prison provides guidelines for hardening facilities, training staff, preparing for radicalized-terrorist inmates' incarceration, and monitoring these inmates after their release.
Machine Learning for Criminology and Crime Research: At the Crossroads reviews the roots of the intersection between machine learning, artificial intelligence (AI), and research on crime; examines the current state of the art in this area of scholarly inquiry; and discusses future perspectives that may emerge from this relationship.
Machine Learning for Criminology and Crime Research: At the Crossroads reviews the roots of the intersection between machine learning, artificial intelligence (AI), and research on crime; examines the current state of the art in this area of scholarly inquiry; and discusses future perspectives that may emerge from this relationship.
Taking Intelligence to the Next Level: Advanced Intelligence Analysis Methodologies Using Real-World Business, Crime, Military, and Terrorism Examples examines intelligence gathering and analysis and the significance of these programs.
Taking Intelligence to the Next Level: Advanced Intelligence Analysis Methodologies Using Real-World Business, Crime, Military, and Terrorism Examples examines intelligence gathering and analysis and the significance of these programs.
In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, 'Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.
In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, 'Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.
Public Corruption in the United States provides a comprehensive view of public corruption, including discussion on its types, methods, trends, challenges, and overall impact.
Public Corruption in the United States provides a comprehensive view of public corruption, including discussion on its types, methods, trends, challenges, and overall impact.
This book is a critical summary and exegesis of the work of Nicole Rafter, who was a leading scholar of the history of biological theories of crime causation as well as a profound theorist of the role of history within criminology.
Homicide Case Studies is a first-of-its-kind text, offering readers more than 30 case studies drawn from real-world homicide cases that include the often-overlooked context and complexities faced by victims, offenders, law enforcement, attorneys, jurors, and correctional personnel.
Homicide Case Studies is a first-of-its-kind text, offering readers more than 30 case studies drawn from real-world homicide cases that include the often-overlooked context and complexities faced by victims, offenders, law enforcement, attorneys, jurors, and correctional personnel.