Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don't have the resources to hire an in-house security staff.
The Analysis of Burned Human Remains, Second Edition, provides a primary source for osteologists and the medical/legal community for the understanding of burned bone remains in forensic or archaeological contexts.
The Manager's Handbook for Business Security is designed for new or current security managers who want build or enhance their business security programs.
Building on the foundation of the previous five editions, Hospital and Healthcare Security, 6th Edition includes new and updated chapters to reflect the current state of healthcare security, particularly in data security and patient privacy, patient-generated violence, and emergency preparedness and management.
Workplace Security Playbook: The New Manager's Guide to Security Risk is a set of comprehensive risk management guidelines for companies that have other business functions coordinating security.
Whether you are a business owner, department manager, or even a concerned employee, Workplace Security Essentials will show you how to improve workplace safety and security using real-life examples and step-by-step instructions.
Bloodstain Patterns: Identification, Interpretation and Application combines material from Blood Dynamics (2001) and Bloodstain Pattern Evidence (2007) with updated case work and scientific advances from medical and hard sciences.
It seems that every day there's a new story about a security lapse, emergency lock-down, or violent act taking place at a school somewhere in the United States.
Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.
Advanced Topics in Forensic DNA Typing: Interpretation builds upon the previous two editions of John Butler's internationally acclaimed Forensic DNA Typing textbook with forensic DNA analysts as its primary audience.
Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories.
The second edition of Practical Aviation Security is a complete guide to the aviation security system, from crucial historical events to the policies, policymakers, and major terrorist and criminal acts that have shaped the procedures in use today.
Cargo Theft, Loss Prevention, and Supply Chain Security outlines steps for identifying the weakest links in the supply chain and customizing a security program to help you prevent thefts and recover losses.
Crime Reconstruction, Second Edition is an updated guide to the interpretation of physical evidence, written for the advanced student of forensic science, the practicing forensic generalist and those with multiple forensic specialists.
It seems that every day there's a new story about a security lapse, emergency lock-down, or violent act taking place at a school somewhere in the United States.
Introduction to Criminalistics covers the basics of Criminalistics in a textbook for a one or two semester course, with the intention of preparing the student for a future in forensic science.
This book offers a critical and empirical examination of gang life, using an intersectional framework considering race, class, gender, and other characteristics.
Retail Crime, Security, and Loss Prevention is destined to become the "e;go to"e; source of crime- and loss prevention- related information in the retail industry.
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.
High-Security Mechanical Locks comprehensively surveys and explains the highly technical area of high security locks in a way that is accessible to a wide audience.
In the field of forensics, there is a critical need for genetic tests that can function in a predictive or inferential sense, before suspects have been identified, and/or for crimes for which DNA evidence exists but eye-witnesses do not.
This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company.
In Bloodstain Pattern Evidence, the concepts introduced in the author's first book, Blood Dynamics, are updated and applied to provide essential answers in the resolution of actual crimes.
Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization.
Because the investigation of cold cases is usually an arduous and time-consuming task, most law enforcement agencies in the United States are not able to dedicate the resources necessary to support the cold case investigation process.
Insecure Digital Frontiers is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize.
This book provides an original theoretically and empirically grounded analysis of regulatory enforcement activism in post-crises periods and the ensuing regulatory interactions.
Aligning information security to the goals and strategies of the business is paramount for ensuring risks are addressed, without an abundance of negative impacts to the company.
Insecure Digital Frontiers is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize.
This book adds to global knowledge of pathways out of crime (desistance) by exploring the desistance narratives of 15 women with histories of imprisonment in Aotearoa New Zealand (10 of whom identify as Maori, New Zealand's Indigenous population).
Now more than ever, the criminal justice system, and the programs, policies, and practices within it, are subject to increased public scrutiny, due to well-founded concerns over effectiveness, fairness, and potential unintended consequences.
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities brings together a collection of chapters that explore the intersection of cybersecurity, data science, and sustainable development across key sectors: healthcare, education, industry, cities, and communities.
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze: Insights and Humor on the Digital Frontier offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity.
Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century.