Reflecting the recent completion of LTE's specification, the new edition of this bestseller has been fully updated to provide a complete picture of the LTE system.
Death Investigation: A Field Guide, Second Edition is updated and expanded to include a chronological analysis of the death scene investigative process from the first notification to the autopsy and final report.
The ability to thoroughly and accurately photograph a crime scene is a mandate for all investigators, regardless of the time of day, weather conditions, or confines within which a piece of evidence is concealed.
The ability to thoroughly and accurately photograph a crime scene is a mandate for all investigators, regardless of the time of day, weather conditions, or confines within which a piece of evidence is concealed.
Introduction to Criminalistics covers the basics of Criminalistics in a textbook for a one or two semester course, with the intention of preparing the student for a future in forensic science.
While there is no such thing as a perfect match in the field of forensic comparative science, Forensic Comparative Science: Qualitative Quantitative Source Determination of Unique Impressions, Images, and Objects provides the experience, understanding, and judgment, necessary for concluding whether two unique images share common origin from a unique and persistent source.
A British detective superintendent recounts a remarkable ten-year investigation, and other compelling murder cases he worked in his long police career.
Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field.
Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation.
Police Intelligence: Totality of Circumstances is an essential resource and is designed for any individual who may encounter the field of criminal justice, whether the person is a police chief who oversees the department's standard operating procedures, a police officer who enforces the law, a civilian who is expected to follow the law, a lawyer who may challenge an action in court, or a judge who will interpret the law.
Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today.
Forensic Science Laboratory Benchmarking: The FORESIGHT Manual takes a step-by-step instructional approach to utilizing FORESIGHT data, detailing how labs can participate in the process to improve efficiencies.
Forensic Science Laboratory Benchmarking: The FORESIGHT Manual takes a step-by-step instructional approach to utilizing FORESIGHT data, detailing how labs can participate in the process to improve efficiencies.
With the ever-increasing threat of cyber-attacks, especially as the COVID-19 pandemic helped to ramp up the use of digital communications technology, there is a continued need to find new ways to maintain and improve cybersecurity.
With the ever-increasing threat of cyber-attacks, especially as the COVID-19 pandemic helped to ramp up the use of digital communications technology, there is a continued need to find new ways to maintain and improve cybersecurity.
A Litigator's Guide to DNA educates both criminal law students and forensic science students about all aspects of the use of DNA evidence in criminal and civil trials.
Forensic Art Essentials teaches artists to extract information from a witness or victim about a face they have seen, and produce an image good enough to lead detectives to the criminal being described.
The study of fire debris analysis is vital to the function of all fire investigations, and, as such, Fire Debris Analysis is an essential resource for fire investigators.
This text provides training on the fundamental tools and methodologies used in active forensic laboratories for the complicated analysis of fire debris and explosives evidence.
The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb.
In the field of forensics, there is a critical need for genetic tests that can function in a predictive or inferential sense, before suspects have been identified, and/or for crimes for which DNA evidence exists but eye-witnesses do not.
Forensic Neuropathology provides superior visual examples of the more commonly encountered conditions in forensic neuropathology and answers questions that arise regarding neuropathological findings.
Most failure or accident investigations begin at the end of the story: after the explosion, after the fire has been extinguished, or after the collapse.
Insecure Digital Frontiers is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize.
The history of computer-aided face recognition dates to the 1960s, yet the problem of automatic face recognition - a task that humans perform routinely and effortlessly in our daily lives - still poses great challenges, especially in unconstrained conditions.
Presenting cutting-edge research and scholarship, this extensive volume covers everything from abstract theorising about the meanings of responsibility and how we blame, to analysing criminal law and justice responses, and factors that impact individual responsibility.
Insecure Digital Frontiers is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize.
Blackstone's Senior Investigating Officers' Handbook is aimed at meeting the reference needs of officers who investigate serious, major, and organised crime.
Private Security and the Law, Third Edition is a textbook analysis of significant practices in the security industry that relate to law, regulation, licensure and constitutional dilemmas according to case and statutory authority.
This book critically assesses legal frameworks involving the bulk processing of personal data, initially collected by the private sector, to predict and prevent crime through advanced profiling technologies.
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities brings together a collection of chapters that explore the intersection of cybersecurity, data science, and sustainable development across key sectors: healthcare, education, industry, cities, and communities.
Psychology and Criminal Justice covers the ways that psychology intersects with the criminal justice system, from explaining criminal behavior to helping improve the three criminal justice pillars of policing, courts, and corrections.
This textbook provides students and law enforcement officers with the fundamentals of the criminal investigation process, from arrival on the scene to trial procedures.
The Mindful Interview Method: Retrieving Cognitive Evidence provides investigators with a proven methodology to gather authentic, reliable information from eyewitnesses to help identify potential suspects.
Wireless Body Area Networks (WBANs) are vulnerable to cyberattacks and security breaches that could unlock the door for cybercriminals to penetrate hospital networks.
Evidence: Law and Context explains the key concepts of evidence law in England and Wales clearly and concisely, set against the backdrop of the broader political and theoretical contexts.
Crime Laboratory Management is the first book to address the unique operational, administrative, and political issues involved in managing a forensic laboratory.