This text is an accessible, student-friendly introduction to the wide range of mathematical and statistical tools needed by the forensic scientist in the analysis, interpretation and presentation of experimental measurements.
Third edition of this best-selling guide to IMS: fully revised, and updated with brand new material The IMS (IP Multimedia Subsystem) is the technology that merges the Internet with the cellular world.
The updated second edition of Handbook of Firearms and Ballistics includes recent developed analytical techniques and methodologies with a more comprehensive glossary, additional material, and new case studies.
Contributions from Finn Trosby, Kevin Holley, Ian Harris Written to celebrate the 25th anniversary of SMS standardization by the people who produced the standards, Short Message Service (SMS): The Creation of Personal Text Messaging, describes the development of the SMS standard and its ongoing evolution.
Get the expert guidance you need to begin building native applications for Apple's new iPhone 3G as well as the iPod Touch Apple's iPhone is the hottest mobile device on the planet.
This comprehensive volume deciphers investigative process and practice, providing an authoritative insight into key debates and contemporary issues in crime investigations Provides critical examination of investigative practice by focusing on the key issues and debates underpinned by academic literature on crime investigation Outlines the theoretical explanations that provide an understanding of crime investigation and the context in which investigators operate Illustrates the practical relevance of theoretical contributions to crime investigation Places clear emphasis on the multi-disciplinary nature of crime investigation
A one-of-a-kind resource walking you through one complete fraud investigation, from the original tip to conviction in court Anatomy of a Fraud Investigation is an engrossing read and a valuable resource for fraud investigators, auditors, or anyone who suspects fraud may be occuring in their organizations and is unsure as to how to act.
A one-of-a-kind resource walking you through one complete fraud investigation, from the original tip to conviction in court Anatomy of a Fraud Investigation is an engrossing read and a valuable resource for fraud investigators, auditors, or anyone who suspects fraud may be occuring in their organizations and is unsure as to how to act.
"e;The new era of powerful, mobile computing and sensing devices having ever larger memories and personal databases brings to light a number of difficult problems in software, interface design, search, organization of information, and methods for inferring context and for sharing personal content The authors have done an admirable job at describing the problems and opportunities and, as such, this book should be on the shelves of researchers struggling to make these mobile devices truly valuable to the ever expanding number of their users.
A must-have reference for every business professional, Forensic Accounting and Fraud Investigation for Non-Experts, Second Edition is a necessary tool for those interested in understanding how financial fraud occurs and what to do when you find or suspect it within your organization.
Would your company be prepared in the event of: * Computer-driven espionage * A devastating virus attack * A hacker's unauthorized access * A breach of data security?
Get the latest tools in fraud auditing and get rid of fraud in your organization With the responsibility of detecting and preventing fraud placed directly on the accounting profession, you are responsible for recognizing fraud and learning the tools and strategies necessary to stop it.
Based on the authors' experiences in developing and teaching Symbian OS, this practical guide is perfect for programmers and provides a series of example-based scenarios that show how to develop Symbian applications.
Introduction to Statistics for Forensic Scientists is an essential introduction to the subject, gently guiding the reader through the key statistical techniques used to evaluate various types of forensic evidence.
The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds, Second Edition is an updated version of the best-selling guide to this exciting technology that will merge the Internet with the cellular world, ensuring the availability of Internet technologies such as the web, email, instant messaging, presence and videoconferencing nearly everywhere.
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.
This comprehensive resource contains a detailed methodology for assessing, analyzing and optimizing End-to-End Service Performance under different cellular technologies (GPRS, EDGE, WCDMA and CDMA2000).
Crisis Negotiations: Managing Critical Incidents and Hostage Situations in Law Enforcement and Corrections, the sixth edition, is an invaluable resource for mitigating, managing, or responding to high-risk negotiation incidents.
Crisis Negotiations: Managing Critical Incidents and Hostage Situations in Law Enforcement and Corrections, the sixth edition, is an invaluable resource for mitigating, managing, or responding to high-risk negotiation incidents.
Revised and expanded to reflect the most recent innovations in the field, The Scientific Examination of Documents, Fourth Edition is a handy, accessible volume detailing current best-practices for forensic document examination.
Revised and expanded to reflect the most recent innovations in the field, The Scientific Examination of Documents, Fourth Edition is a handy, accessible volume detailing current best-practices for forensic document examination.
The increased militarization of the police in the United States has been a topic of controversy for decades, brought to the public eye in notable events such as the Los Angeles Police Department's use of battering rams in the 1980s and the siege of the Weaver family at Ruby Ridge, Idaho, in the 1990s, among others.
The increased militarization of the police in the United States has been a topic of controversy for decades, brought to the public eye in notable events such as the Los Angeles Police Department's use of battering rams in the 1980s and the siege of the Weaver family at Ruby Ridge, Idaho, in the 1990s, among others.
Challenging Organized Crime in the Western Hemisphere: A Game of Moves and Countermoves takes the unusual approach of exploring and describing how organized crime groups develop their capacities in response to heightened powers of law enforcement; and how law enforcement in turn responds, creating an ongoing dynamic interaction.
Challenging Organized Crime in the Western Hemisphere: A Game of Moves and Countermoves takes the unusual approach of exploring and describing how organized crime groups develop their capacities in response to heightened powers of law enforcement; and how law enforcement in turn responds, creating an ongoing dynamic interaction.
Evidence-Based Practice (EBP) has over the last decade made an increasing mark in several fields, notably health and medicine, education and social welfare.
Evidence-Based Practice (EBP) has over the last decade made an increasing mark in several fields, notably health and medicine, education and social welfare.
Adopting a case-based approach, Global Financial Investigations introduces the fascinating world of forensic accounting and investigating transnational financial crimes, providing an overview of core concepts and current industry trends, together with practical guidance to equip readers with the knowledge required to combat complex financial crimes.