You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption- which could bring any business to it's knees- has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting market. Security consulting often involves conducting in depth security surveys so businesses will k...
Effective Interviewing and Interrogation Techniques, Second Edition, is completely revised and updated so as to cover all the information a student needs to know to obtain answers from a witness, a victim, or a suspect and how to interpret these answers with the utmost accuracy. Building on the previous edition's ground-breaking search for truth in criminal and non-criminal investigations, this book contains five new chapters which include coverage of false confessions, interviewing the mentally challenged, and the ethics of interrogation in a post 9/11 world. This new edition includes highly illustrated chapters with topics ranging from the psycho-physiological basis of the forensic assessm...
The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the fie...
The Rape Investigation Handbook is the first practical and hands-on manual written by sex crime investigators and forensic scientists, providing students with first-hand insight into the work of these professionals. It is the only comprehensive reference available on the investigation of sexual assault and rape. It includes extensive accounts of perpetrators, victims, and other rape case evidence for identification of incidents of rape. The key feature of this text is a thorough overview of the investigative and forensic processes related to sex crime investigation. It takes the reader through investigative and forensic processes in a logical sequence, showing how investigations of rape and ...
The classic book The Art of War (or as it is sometimes translated, The Art of Strategy) by Sun Tzu is often used to illustrate principles that can apply to the management of business environments. The Art of War for Security Managers is the first book to apply the time-honored principles of Sun Tzu's theories of conflict to contemporary organizational security.Corporate leaders have a responsibility to make rational choices that maximize return on investment. The author posits that while conflict is inevitable, it need not be costly. The result is an efficient framework for understanding and dealing with conflict while minimizing costly protracted battles, focusing specifically on the crucial tasks a security manager must carry out in a 21st century organization.* Includes an appendix with job aids the security manager can use in day-to-day workplace situations* Provides readers with a framework for adapting Sun Tzu's theories of conflict within their own organizations* From an author who routinely packs the room at his conference presentations
Closed circuit television (CCTV) is experiencing a leap in technology using digital techniques, networking and the Internet. The new edition of this high-level professional reference retains the particulars that made the first edition a success, including the details of CCD cameras, lenses, coaxial cables, fiber-optics, and system design, but it is expanded to cover all video compression techniques used in the ever increasing assortment of digital video recorders (DVRs) available on the market today. This new edition of the book CCTV demystifies DVR technology. It also serves to clarify the technology of data networking. The theoretical section explains the various compression techniques. Networking is also a new and unknown area for many CCTV installers and this is explained in a brand new section. - New edition more accessible
Forensic Neuropathology provides superior visual examples of the more commonly encountered conditions in forensic neuropathology and answers questions that arise regarding neuropathological findings. The work includes values for frequently-encountered clinical assessments, and contains a more comprehensive summary of aging/dating of various neuropathological processes than is available in any other single current source. General pathology residents, forensic pathology and neuropathology fellows, and general pathologists and clinicians involved in referred cases will find this book extremely useful, as will individuals in allied fields such as law enforcement officers and attorneys. Forensic ...
Now in its third edition, Criminal Profiling is established as an industry standard text. It moves evidence-based criminal profiling into a full embrace of the scientific method with respect to examining and interpreting behavioral evidence. If focuses on criminal profiling as an investigative and forensic process, helping to solve crime through an honest understanding of the nature and behavior of the most violent criminals. Throughout the text, the author outlines specific principles and practice standards for Behavioral Evidence Analysis, focusing on the application of theory and method to real cases. Criminal Profiling, Third Edition, is an ideal companion for students and professionals ...
Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing the best possible security while saving millions in improved operations efficiency. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, thereby saving a company both time and money.Integrated Security Systems Design is arranged to go from the str...
Forensic Pathology is a comprehensive reference that uses a case-oriented format to address, explain and guide the reader through the varied topics encountered by forensic pathologists. Developed in response to a severe void in the literature, the book addresses topics ranging from medicolegal investigation of death to death scene investigation, forensic autopsy, and artifacts of resuscitation as well as complications of medical therapy, forensic osteology, forensic odontology, forensic photography, and death certification. The book includes various types of cases, including sudden natural death, asphyxia, motor vehicle collisions, death in custody, child abuse and elder abuse, acute psychia...