Forensic Science Laboratory Benchmarking: The FORESIGHT Manual takes a step-by-step instructional approach to utilizing FORESIGHT data, detailing how labs can participate in the process to improve efficiencies.
Over the past four decades the fear of crime has become an increasingly significant concern for criminologists, victimologists, policy makers, politicians, police, the media and the general public.
Featuring a brand-new introduction by the author, this New York Times bestseller presents an inside expos of mob boss Sam Giancanatalented businessman, Las Vegas entrepreneur, ruthless killer, and outside player for the CIAs dirtiest deeds.
Adolescent Forensic Psychiatry discusses a broad range of issues based around the psychiatric needs of adolescents and how these relate to offending behaviour.
The Media and Austerity examines the role of the news media in communicating and critiquing economic and social austerity measures in Europe since 2010.
Policy Networks in Criminal Justice is a comprehensive and challenging collection of studies on the workings of pressure groups in criminal justice and the articulation of pressure group politics and criminal justice policymaking.
In 2003, an FBI-led task force known as Operation Fly Trap attempted to dismantle a significant drug network in two Bloods-controlled, African American neighborhoods in Los Angeles.
Forensic Taphonomy and Ecology of North American Scavengers compiles research on vertebrate scavenging behavior from numerous academic fields, including ecology and forensic anthropology.
Now in its fifteenth edition, this well-respected and highly regarded book covers all areas of law and legal procedure which are of interest to police officers.
Forensic DNA Applications: An Interdisciplinary Perspective, Second Edition is fully updated to outline the latest advances in forensic DNA testing techniques and applications.
This book provides hands-on guidance for researchers and practitioners in criminal justice and criminology to perform statistical analyses and data visualization in the free and open-source software R.
A timely publication providing coverage of radio resource management, mobility management and standardization in heterogeneous cellular networks The topic of heterogeneous cellular networks has gained momentum in industry and the research community, attracting the attention of standardization bodies such as 3GPP LTE and IEEE 802.
Counterterrorism: Reassessing the Policy Response promotes a more nuanced understanding of the effectiveness of current counterterrorism practices and the need for reform.
This book addresses the question of how researchers can conduct independent, ethical research on mal-, mis- and disinformation in a rapidly changing and hostile data environment.
A History of Rwanda: From the Monarchy to Post-genocidal Justice provides a complete history of Rwanda, from the precolonial abanyiginya kingdom, through the German and Belgian colonial periods and subsequent independence, and then the devastating 1994 genocide and reconstruction, right up to the modern day.
The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike.
CTPED and Traditional Security Countermeasures: 150 Things You Should Know is a handy reference for both seasoned professionals and those just starting out in security and law enforcement.
This textbook addresses existing gaps in police research, education, and training, and provides guidance on how to respond to and address the vulnerability that arises in policing practice.
Freedom of Information: A Practical Guide for UK Journalists is written to inform, instruct and inspire journalists on the investigative possibilities offered by the Freedom of Information Act.
Written from an operator s viewpoint, HSPA Performance and Evolution explores the lessons learned and techniques developed for optimally deploying HSPA (High Speed Packet Access).
This inspiring book addresses a topic that is far too often ignored or disregarded by sci-tech librarians: Exactly how do scientists and engineers really discover, select, and use the countless information and communications resources available to them when conducting research?