The second edition of Practical Aviation Security is a complete guide to the aviation security system, from crucial historical events to the policies, policymakers, and major terrorist and criminal acts that have shaped the procedures in use today.
Cargo Theft, Loss Prevention, and Supply Chain Security outlines steps for identifying the weakest links in the supply chain and customizing a security program to help you prevent thefts and recover losses.
Crime Reconstruction, Second Edition is an updated guide to the interpretation of physical evidence, written for the advanced student of forensic science, the practicing forensic generalist and those with multiple forensic specialists.
It seems that every day there's a new story about a security lapse, emergency lock-down, or violent act taking place at a school somewhere in the United States.
Introduction to Criminalistics covers the basics of Criminalistics in a textbook for a one or two semester course, with the intention of preparing the student for a future in forensic science.
This book offers a critical and empirical examination of gang life, using an intersectional framework considering race, class, gender, and other characteristics.
Retail Crime, Security, and Loss Prevention is destined to become the "e;go to"e; source of crime- and loss prevention- related information in the retail industry.
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.
High-Security Mechanical Locks comprehensively surveys and explains the highly technical area of high security locks in a way that is accessible to a wide audience.
In the field of forensics, there is a critical need for genetic tests that can function in a predictive or inferential sense, before suspects have been identified, and/or for crimes for which DNA evidence exists but eye-witnesses do not.
This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company.
In Bloodstain Pattern Evidence, the concepts introduced in the author's first book, Blood Dynamics, are updated and applied to provide essential answers in the resolution of actual crimes.
Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization.
Because the investigation of cold cases is usually an arduous and time-consuming task, most law enforcement agencies in the United States are not able to dedicate the resources necessary to support the cold case investigation process.
Insecure Digital Frontiers is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize.
This book provides an original theoretically and empirically grounded analysis of regulatory enforcement activism in post-crises periods and the ensuing regulatory interactions.
Aligning information security to the goals and strategies of the business is paramount for ensuring risks are addressed, without an abundance of negative impacts to the company.
Insecure Digital Frontiers is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize.
This book adds to global knowledge of pathways out of crime (desistance) by exploring the desistance narratives of 15 women with histories of imprisonment in Aotearoa New Zealand (10 of whom identify as Maori, New Zealand's Indigenous population).
Now more than ever, the criminal justice system, and the programs, policies, and practices within it, are subject to increased public scrutiny, due to well-founded concerns over effectiveness, fairness, and potential unintended consequences.
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities brings together a collection of chapters that explore the intersection of cybersecurity, data science, and sustainable development across key sectors: healthcare, education, industry, cities, and communities.
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze: Insights and Humor on the Digital Frontier offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity.
Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century.
Guard Force Management looks at the contract guard force as a business and demonstrates how current management techniques can be used to improve efficiency and increase profitability.
Crime Laboratory Management is the first book to address the unique operational, administrative, and political issues involved in managing a forensic laboratory.
Vulnerability Assessment of Physical Protection Systems guides the reader through the topic of physical security with a unique, detailed and scientific approach.
Intruder Alarms provides a definitive and fully up-to-date guide to the specification, systems design, integration, installation and maintenance of intruder alarm systems.
Focusing on the lives of first- and second-generation British Pakistani young adult men and those approaching middle age who offend or have offended and the experiences of their fathers bringing them up in a de-industrialised city, this book examines the influence of social relations on their moves toward and away from crime, particularly the impact of father-son relationships.
The Art of Investigation Revisited: Practical Tips from the Experts examines the qual- ities required to be a professional, thorough, and effective investigator and is a follow up to the authors' highly touted book, The Art of Investigation (2019).
A one-stop resource for understanding historical and contemporary perspectives on ideological extremism in law enforcement, as well as its wider impacts on American society.
The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace.
Bringing together perspectives from academics, practitioners, campaigners, and activists, this book explores the victimology of disability hate crime (DHC).
The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape.
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools, and offensive security use cases offering readers a comprehensive understanding of its history, structure, and the illicit activities that transpire within its hidden corridors using Dark Web-AI-Offensive tactics.
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools, and offensive security use cases offering readers a comprehensive understanding of its history, structure, and the illicit activities that transpire within its hidden corridors using Dark Web-AI-Offensive tactics.