Diese Studie begeht einen neuen Weg zur Erklärung von Devianz und Gewalt im Jugendalter, indem sie versucht, zwei soziologische Ansätze, die Theorie Sozialer Desintegration und die Control Balance Theory, miteinander zu verknüpfen.
This book brings to life the experiences of children affected by maternal imprisonment, and provides unique, in-depth analysis of judicial thinking on this issue.
Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories.
The Manager's Handbook for Business Security is designed for new or current security managers who want build or enhance their business security programs.
Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.
Whether you are a business owner, department manager, or even a concerned employee, Workplace Security Essentials will show you how to improve workplace safety and security using real-life examples and step-by-step instructions.
Building on the foundation of the previous five editions, Hospital and Healthcare Security, 6th Edition includes new and updated chapters to reflect the current state of healthcare security, particularly in data security and patient privacy, patient-generated violence, and emergency preparedness and management.
Personal Identification: Modern Development and Security Implications, Second Edition explains how personal identification - and REAL ID - became part of the American fabric along with their past century's historical ID development.
CyberMedics: Navigating AI and Security in the Medical Field is a comprehensive exploration of the transformative role of artificial intelligence (AI) in healthcare and the critical importance of securing medical data in an increasingly digital world.
Das Thema Kinderschutz wird in diesem Band multiperspektivisch auf Ebene der Prävention, des Kinderschutzes per se und der Kinderrechte betrachtet und diskutiert.
This book describes how young Black men on a disadvantaged housing estate in London navigate the estate's expectations for their behaviour as they operate within a street code that endorses violence, knife-carrying and challenging masculinity.
The Handbooks of Homeland Security Handbook is a convenient, one-stop reference and guide to the latest regulations and developments in all things relevant to the homeland security and defense domain.
The Handbooks of Homeland Security Handbook is a convenient, one-stop reference and guide to the latest regulations and developments in all things relevant to the homeland security and defense domain.
The book provides a pentapartite theoretical analysis of socio-economic factors as the grand basis for the evolution of Boko Haram terrorism in Nigeria.
The book provides a pentapartite theoretical analysis of socio-economic factors as the grand basis for the evolution of Boko Haram terrorism in Nigeria.
Bringing together a range of perspectives, this book establishes a criminology of the domestic, paying particular attention to emerging spatial and relational reconfigurations.
Bringing together a range of perspectives, this book establishes a criminology of the domestic, paying particular attention to emerging spatial and relational reconfigurations.
The mass graves from our long human history of genocide, massacres, and violent conflict form an underground map of atrocity that stretches across the planet's surface.
The Analysis of Burned Human Remains, Second Edition, provides a primary source for osteologists and the medical/legal community for the understanding of burned bone remains in forensic or archaeological contexts.
Strategic Leadership in Digital Evidence: What Executives Need to Know provides leaders with broad knowledge and understanding of practical concepts in digital evidence, along with its impact on investigations.
The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace.
Advanced Topics in Forensic DNA Typing: Interpretation builds upon the previous two editions of John Butler's internationally acclaimed Forensic DNA Typing textbook with forensic DNA analysts as its primary audience.
Keeping Religious Institutions Secure explores the unique vulnerabilities that churches, synagogues, and mosques face in regards to security, making them attractive to criminals who see them as easy targets.
Trends of Environmental Forensics in Pakistan covers a variety of topics, including discussions on alterations in soil chemistry that are related to the malicious effects of pesticides, variations in biosphere and hydrosphere due to deviating toxicological responses, evidence and datasets to highlight potential crimes, and the advent of biological warfare and its effects across the globe, and exclusively in Pakistan.
Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don't have the resources to hire an in-house security staff.
Interpreting Bone Lesions and Pathology for Forensic Practice presents a concise description of the necessary steps for the differential diagnosis of disease and trauma on skeletal remains.
The first book of its kind, Forensic Medicine in Western Society: A History draws on the most recent developments in the historiography, to provide an overview of the history of forensic medicine in the West from the medieval period to the present day.
This book undertakes an exploratory exercise in decolonizing criminology through engaging postcolonial and postdisciplinary perspectives and methodologies.
'EXCELLENT WRITING AND RESEARCH' - RUTH RENDELLThe Crime Museum of New Scotland Yard - invariably known as 'the Black Museum' - houses a remarkable collection of exhibits, photographs and documents connected with some of the most notorious crimes in this country's history.
This timely, insightful, and data-led book fills a gap in gang scholarship by examining gangs in rural areas, specifically focusing on youth gang activity.
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr.
Information security primarily serves these six distinct purposes-authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation.
Crime prevention that works - the goal of much government and corporate policy - can be difficult to discover amongst obscure and tedious academic texts.