Forensic Engineering Investigation is a compendium of the investigative methodologies used by engineers and scientific investigators to evaluate some of the more common types of failures and catastrophic events.
Sudden Unexpected Death in Epilepsy: Mechanisms and New Methods for Analyzing Risks builds on earlier works focusing on the clinical problem of sudden unexpected death in epilepsy (SUDEP).
Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandestine investigations.
As drug trafficking and the abuse of illicit drugs continue to inflict untold harm upon our society, it is clear that a global initiative and an intense domestic strategy are vital to address the sophisticated drug trafficking organizations (DTOs) that are prevalent in many regions.
In modern industrial societies, the demand for policing services frequently exceeds the current and foreseeable availability of public policing resources.
The Terrorists of Iraq: Inside the Strategy and Tactics of the Iraq Insurgency 2003-2014, Second Edition is a highly detailed and exhaustive history and analysis of terror groups that both formed the Iraq insurgency and led to the rise of the Islamic State of Iraq and Syria (ISIS).
Bringing a unique rural lens to the analysis of dark tourism in Australia, this book covers a range of sites including convict museums, sites of serial killings and colonial violence, ghost tours and the emerging tourism of bushfire sites.
This edited collection discusses the rule of law in the Amazon and the capabilities of the region's sovereign states to police their territory considering security matters.
This book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments.
Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition explores the background and history of al-Qaeda, covers recent developments, and explains how, why, and where the al-Qaeda network is expanding.
Every year, esteemed scholars and practitioners meet at the International Police Executive Symposium to discuss contemporary issues in policing and share ideas about effective strategies in their jurisdictions.
Expanding on ideas proposed by leading thinkers throughout the history of forensic science, Principles and Practice of Criminalistics: The Profession of Forensic Science outlines a logical framework for the examination of physical evidence in a criminalistics laboratory.
Enterprise Fortress is a comprehensive guide to building secure and resilient enterprise architectures, aimed at professionals navigating the complex world of cybersecurity.
This book offers a concise and authoritative overview of the full scope of crime prevention, including foundations, theory, application, and techniques.
The first volume of the Trends in Corrections: Interviews with Corrections Leaders Around the World series introduced readers to the great diversity that exists cross-culturally in the political, social, and economic context of the correctional system.
Nonproliferation Issues for Weapons of Mass Destruction provides an understanding of WMD proliferation risks by bridging complex technical and political issues.
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience.
In an era where vehicular networks and Location-Based Services (LBS) are rapidly expanding, safeguarding location privacy has become a critical challenge.
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations.
While increasing attention has been directed to the legal and criminological aspects of situational crime prevention, focused ethical discussion of the measures involved has been notable by its absence.
This essential resource offers extensive updates on the leading Supreme Court cases impacting law enforcement in the United States, creating a must-have reference for police officers to stay up-to-date and have a strong understanding of the law and their function within it.
One of the most elusive pursuits in the study of organized crime is developing a definition, description, or conceptual model that captures its complexity, diversity, and ever-changing nature.
In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape.
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity.
This edited collection discusses the rule of law in the Amazon and the capabilities of the region's sovereign states to police their territory considering security matters.
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity.
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience.
Offender profiling has been developing slowly as a possible investigative tool since 1841 and the publication of Edgar Allen Poe's The Murder in the Rue Morgue.
The Unmaking of Crime documents the pathways of offenders reforming their journey and desisting from crime, and assesses the opportunities and limitations of the criminal justice system in aiding this process.
While increasing attention has been directed to the legal and criminological aspects of situational crime prevention, focused ethical discussion of the measures involved has been notable by its absence.