This book details several important medicinal plants, their occurrence, plant compounds and their chemical structures, and pharmacological properties against various human diseases.
An insightful book presenting cutting-edge information on the newest, most remarkable forensic science and methods used for understanding the criminal mind.
This book provides an essential and critical overview of the most significant issues concerning the domestication of international criminal law, in particular with regard to the implementation of the ICC Statute.
Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent.
Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes.
Combating white-collar crime is a challenge as these criminals are found among the most powerful members of society, including politicians, business executives, and government officials.
A broad understanding of bone and tooth microstructure is necessary for constructing the biological profile of an individual or individuals within a population.
A truly international and multi-disciplinary compendium of current best practices authored by top practitioners from around the world, the book covers current trends and technology advances in the following disciplines within forensic science: bloodstain pattern analysis, forensic photography, ballistics, latent prints, forensic genetics and DNA, questioned documents, forensic toxicology, forensic clinical medicine, forensic pathology, forensic odontology, forensic anthropology, forensic entomology, forensic biometry, forensic psychology and profiling, law comparison and ethics, and much more.
This book critically assesses legal frameworks involving the bulk processing of personal data, initially collected by the private sector, to predict and prevent crime through advanced profiling technologies.
This edited collection by internationally recognized authors provides essays on police behavior in the categories of police administration, police operations, and combating specific crimes.
The Basics of Investigating Forensic Science: A Laboratory Manual, Second Edition presents foundational concepts in forensic science through hands-on laboratory techniques and engaging exercises.
Intended as a companion to the Fundamentals of Forensic DNA Typing volume published in 2009, Advanced Topics in Forensic DNA Typing: Methodology contains 18 chapters with 4 appendices providing up-to-date coverage of essential topics in this important field and citation to more than 2800 articles and internet resources.
Handbook of Loss Prevention and Crime Prevention, Sixth Edition, continues to serve as the preeminent, comprehensive resource for devising practical, modern solutions for securing people and property.
Community Policing: A Contemporary Perspective, 8th Edition, provides comprehensive coverage of the philosophy and organizational strategy that expands the traditional police mandate of fighting crime to include forming partnerships with citizenry that endorse mutual support and participation.
This wide-ranging resource uses evidence-based documentation to examine claims and beliefs - and provide the facts - about sexual assault and harassment and other forms of sexual violence in the United States.
The ability to thoroughly and accurately photograph a crime scene is a mandate for all investigators, regardless of the time of day, weather conditions, or confines within which a piece of evidence is concealed.
Advances in our ability to analyse information from skeletal remains and subsequent developments in the field of forensic anthropology make it possible to identify more victims of homicides, mass-fatality disasters, and genocide.
Now in its second edition, Forensic Investigation of Explosions draws on the editor's 30 years of explosives casework experience, including his work on task forces set up to investigate major explosives incidents.
A practical guide for police, death investigators, and prosecutors, No-Body Homicide Cases: A Practical Guide to Investigating, Prosecuting, and Winning Cases When the Victim is Missing, Second Edition takes an expansive look at both the history of no-body murder cases and the best methods to investigate, solve, and bring them to court.
From the editors of the highly successful LTE for UMTS: Evolution to LTE-Advanced, this new book examines the main technical enhancements brought by LTE-Advanced, thoroughly covering 3GPP Release 10 specifications and the main items in Release 11.
Modeling and Simulation of Computer Networks and Systems: Methodologies and Applications introduces you to a broad array of modeling and simulation issues related to computer networks and systems.
Praise for The Science of Sherlock Holmes"e;Holmes is, first, a great detective, but he has also proven to be a great scientist, whether dabbling with poisons, tobacco ash, or tire marks.
A concise, robust introduction to the various topics covered by the discipline of forensic chemistry The Forensic Chemistry Handbook focuses on topics in each of the major chemistry-related areas of forensic science.
A concise, robust introduction to the various topics covered by the discipline of forensic chemistry The Forensic Chemistry Handbook focuses on topics in each of the major chemistry-related areas of forensic science.
Frequently a substance found at a port of entry, waste site, laboratory triage facility, or even in a hazardous materials emergency will be labeled and purportedly identified.
Dieser Buchtitel ist Teil des Digitalisierungsprojekts Springer Book Archives mit Publikationen, die seit den Anfängen des Verlags von 1842 erschienen sind.
Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices.
Interviewers face a dilemma when questioning children in a forensic context--an inherent mismatch between the needs of the legal system and the capabilities of young children.