Keeping Religious Institutions Secure explores the unique vulnerabilities that churches, synagogues, and mosques face in regards to security, making them attractive to criminals who see them as easy targets.
In the past two decades, many prevention and suppression programs have been initiated on a national and local level to combat street gangs--but what do we really know about them?
In recognition of the vital need to protect legitimate facilities from the theft and misuse of dangerous pathogens and toxins, the Laboratory Biosecurity Handbook serves as a guide to the implementation of pathogen protection programs.
We now live in a pre-crime society, in which information technology strategies and techniques such as predictive policing, actuarial justice and surveillance penology are used to achieve hyper-securitization.
Think Like a Terrorist to Combat Terrorism and Radicalization in Prison provides guidelines for hardening facilities, training staff, preparing for radicalized-terrorist inmates' incarceration, and monitoring these inmates after their release.
Investigative Interviewing: Adopting a Forensic Mindset is a straight-forward, practical textbook outlining proper interview planning and techniques, detailing all relevant case law concerning confessions.
The third edition of The Business Response to Misconduct Allegations is a step-by-step guide for what to do-and what not to do-in performing an investigation into claims of employee policy violations.
Whether you are a business owner, department manager, or even a concerned employee, Workplace Security Essentials will show you how to improve workplace safety and security using real-life examples and step-by-step instructions.
Civil Protection and Domestic Security in Contemporary Hybrid Warfare presents a comprehensive approach to civil protection and domestic security in contemporary hybrid armed conflict.
In 2007, Estonia faced a series of cyberattacks on its cyber infrastructure, which caused widespread damage to the country's economy, politics, and security.
Understanding Victimology: An Active Learning Approach is the only textbook with extensive discussion of both online and offline victimization reinforced by group and individual learning activities.
The title of this volume Outlaw Bikers as Organized Crime reluctantly combines two highly contested concepts into a statement that is perhaps disputed even more.
Counterterrorism: Reassessing the Policy Response promotes a more nuanced understanding of the effectiveness of current counterterrorism practices and the need for reform.
Advanced Topics in Forensic DNA Typing: Interpretation builds upon the previous two editions of John Butler's internationally acclaimed Forensic DNA Typing textbook with forensic DNA analysts as its primary audience.
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience.
There is increasing pressure, soon to be legislation, for particular offenders to be given a choice of psychological treatment or imprisonment, even if treatment must sometimes be within special prison hospitals or units for offenders.
Providing an indispensable resource for students investigating sexual harassment in the United States, Sexual Harassment: A Reference Handbook is a comprehensive summary of history, current events, possible solutions, and resources.
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity.
Spätestens seit dem tödlichen Hochgeschwindigkeitsunfall infolge des illegalen Straßenrennens vom Berliner Kurfürstendamm ist das Thema Raserei in die öffentliche Aufmerksamkeit gerückt.
Retail Crime, Security, and Loss Prevention is destined to become the "e;go to"e; source of crime- and loss prevention- related information in the retail industry.
Security Games: Surveillance and Control at Mega-Events addresses the impact of mega-events - such as the Olympic Games and the World Cup - on wider practices of security and surveillance.
In recent years, British drug policy has undergone a transformation: tackling 'drug-driven' crime through criminal justice interventions has arguably become the central priority and focus.
This book analytically reviews the impact of the global anti-money laundering and counter-terrorist financing (AML/CFT) framework on the compliance trajectory of a number of jurisdictions to this framework.
Aligning information security to the goals and strategies of the business is paramount for ensuring risks are addressed, without an abundance of negative impacts to the company.
Police Administration, 11th Edition, is a best-selling textbook that examines police administration from multiple perspectives: a systems perspective (emphasizing the interrelatedness among units and organizations); a traditional, structural perspective (administrative principles, management functions, and the importance of written guidelines); a human behavioral perspective (the human element in organizations); and a strategic management perspective (communications and information systems, performance evaluation, strategies and tactics, and prevailing and promising approaches to increasing effectiveness of police agencies).
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
Crime Reconstruction, Second Edition is an updated guide to the interpretation of physical evidence, written for the advanced student of forensic science, the practicing forensic generalist and those with multiple forensic specialists.
Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization.
Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition explores the background and history of al-Qaeda, covers recent developments, and explains how, why, and where the al-Qaeda network is expanding.
Active Shooter Response Training: Lone Wolf to Coordinated Attack, Second Edition, provides expanded and updated training for police and security officers who must respond to an active shooter situation.
Some of the brightest minds in criminology who were nurtured on the strictly environmentalist paradigm of the 20th century have declared that biosocial criminology is the paradigm for the 21st century.
CyberMedics: Navigating AI and Security in the Medical Field is a comprehensive exploration of the transformative role of artificial intelligence (AI) in healthcare and the critical importance of securing medical data in an increasingly digital world.