![](images/graphics/blank.gif)
The Crime Book
-
This book analyses the life histories of Jamaican men involved in the UK drugs trade, including wholesalers, street dealers, specialist cooks, cutters, and growers. Employing a life history approach, their autobiographical accounts are examined to provide an in-depth and unique insight of their journeys into drugs and crime.
190p
vimeyers
29-05-2024
4
2
Download
-
Ebook "Enemy at the water cooler - Real-life stories of insider threats & enterprise security management countermeasures" presents the following content: Part I background on cyber crime, insider threats, and ESM; part II real life case studies; part III the extensibility of ESM.
285p
zizaybay1103
29-05-2024
2
2
Download
-
A comprehensive and easy-to-read introduction to the work of the modern forensic laboratory. The authors explain in simple language the capabilities and limitations of modern forensic laboratory procedures, techniques, analyses, and interpretations. Here, the interested reader will find an understandable and fascinating introduction to the complex worlds of forensic serology DNA, chemistry, crime reconstruction, digital evidence, explosives, arson, fingerprints, firearms, tool marks, odontology, and pathology.
307p
vimeyers
29-05-2024
2
2
Download
-
This volume focuses on the risks associated with doing business in nondomestic markets, with particular, although not exclusive, application for US and UK companies. The authors are well qualified to write on this topic since they are executives in Merchant International Group (MIG), a firm that specializes in providing information and intelligence regarding risk to companies considering investments and operations in nondomestic markets.
315p
vimeyers
29-05-2024
2
1
Download
-
Ebook "Forensic computer crime investigation" includes contents: Chapter 1: computer crime and the electronic crime scene; chapter 2: the digital investigative unit: staffing, training, and issues; chapter 3: criminal investigation analysis and behavior: characteristics of computer criminals; chapter 4: investigative strategy and utilities; chapter 5: computer forensics & investigation: the training organization; chapter 6: internet crimes against children; chapter 7: challenges to digital forensic evidence; chapter 8: strategic aspects in international forensics; chapter 9: cyber terrorism...
338p
longtimenosee05
31-03-2024
3
0
Download
-
This book, Handbook of digital and multimedia forensic evidence, was put together with the intent to be that reference. It can serve as a foundation and guide for (a) students considering a career in this field, (b) the law enforcement investigator assigned to work cybercrimes, (c) establishing training programs for forensic examiners, (d) the IT professional, (e) the veteran forensic examiner, and (f) the prosecutor faced with litigating cybercrime cases brought before a trier of fact.
147p
longtimenosee05
31-03-2024
2
0
Download
-
Ebook "Investigating computer-related crime: Handbook for corporate investigators" includes contents: Section 1 - the nature of cyber crime, section 2 - investigating cyber crime, section 3 - preparing for cyber crime, section 4 - using the forensic utilities, appendix a - introduction to denial of service attacks, appendix b - technical report 540-96.
295p
longtimenosee05
31-03-2024
3
0
Download
-
In ebook Computer & intrusion forensics: Part 1, the following content will be discussed: Chapter 1 computer crime, computer forensics, and computer security; chapter 2 current practice; chapter 3 computer forensics in law enforcement and national security.
196p
longtimenosee05
31-03-2024
0
0
Download
-
In this part, the following content will be discussed: Chapter 1: the initial contact, chapter 2: client site arrival, chapter 3: evidence collection procedures, chapter 4: evidence collection and analysis tools, chapter 5: password recovery, chapter 6: questions and answers by subject area, chapter 7: recommended reference materials, chapter 8: case study.
132p
longtimenosee05
31-03-2024
3
0
Download
-
In this part, the following content will be discussed: Appendix A: Glossary, Appendix B: Port numbers used by malicious trojan horse programs, Appendix C: Attack signatures, Appendix D: UNIX/Linux commands, Appendix E: Cisco PIX firewall commands, Appendix F: Discovering unauthorized access to your computer, Appendix G: U.S. Department of justice search and seizure guidelines.
199p
longtimenosee05
31-03-2024
2
0
Download
-
Ebook "Polymers on the crime scene: Forensic analysis of polymeric trace evidence" approaches the analysis of forensic contact traces from a polymer science perspective. The development of characterization methods of new or unusual traces and the improvement of existing protocols is described. The book starts with a general introduction to polymers and the issues related to transfer, persistence and recovery of polymeric traces.
364p
tudohanhtau1006
29-03-2024
1
1
Download
-
Part 2 book "Wildlife necropsy and forensics" includes content: Forensic analysis of wildlife crimes, forensic necropsy, examination of the wounds, types of firearms and terminology, poisoning, record keeping, wildlife crime investigation.
249p
muasambanhan05
22-01-2024
3
2
Download
-
Part 1 book "Veterinary forensics - Investigation, evidence collection, and expert testimony" includes content: An introduction to animal abuse and associated human behaviors, crime scene investigation, videography, bloodstain pattern analysis, forensic physical examination of the cat and dog, forensic physical examination of large animals, the forensic necropsy.
239p
muasambanhan02
18-12-2023
1
0
Download
-
Part 1 book "Veterinary forensic pathology" includes content: Medicolegal investigation; crime scene findings and the identification, collection, and preservation of evidence; performing the forensic necropsy; postmortem changes and estimating the postmortem interval.
70p
muasambanhan02
18-12-2023
5
3
Download
-
Continued part 1, part 2 of ebook "Fraud auditing and forensic accounting (4th edition)" provides readers with contents including: fraud detection; fraud response; computer crime; fraud and the accounting information system; gathering evidence; cyber forensics; obtaining and evaluating nonfinancial evidence in a fraud examination;...
173p
tuongnhuoclan
27-11-2023
6
4
Download
-
Part 1 book "Veterinary forensic medicine and forensic sciences" includes content: Crime scene investigation, general principles of veterinary forensic sciences and medicine, humane law enforcement from initial report to final appeal, animal genetic evidence and dna analysis, forensic entomology, animal sexual abuse, blunt force trauma, sharp force trauma, gunshot wounds and wound ballistics, the forensic necropsy.
220p
oursky09
08-11-2023
3
2
Download
-
Continued part 1, part 2 of ebook "Corporations, crime and accountability" provides readers with contents including: Chapter 5 - Making the buck stop; Chapter 6 - Assessing the accountability model; Chapter 7 - The possibility of responsibility for corporate crime;...
147p
mocthanhdao0210
19-11-2023
6
5
Download
-
In ebook "Criminal justice and taxation" Peter Alldridge considers the development of the offences and the relationship between tax evasion offences and other criminal offences; the relevant rules of evidence; prosecution structures, decision-making processes, and alternatives to prosecution. Specific topics include offshore evasion and the relationship of tax evasion with other crimes and aspects of the criminal justice system.
257p
loivantrinh
29-10-2023
8
4
Download
-
Part 1 of ebook "Understanding personal security and risk: A guide for business travelers" provides readers with contents including: Chapter 1 - Important personal security concepts; Chapter 2 - Personal security principles; Chapter 3 - When travel plans go sideways; Chapter 4 - Kidnapping; Chapter 5 - Patterns of threat in the environment;...
159p
dangsovu
20-10-2023
8
6
Download
-
Continued part 1, part 2 of ebook "Understanding personal security and risk: A guide for business travelers" provides readers with contents including: Chapter 6 - Hotel and residential security; Chapter 7 - Cybersecurity on the road; Chapter 8 - Shopping malls, sports stadiums, theaters; Chapter 9 - Risk assessment for personal security; Chapter 10 - Personal security and transportation; Chapter 11 - Managing your team’s personal security;...
130p
dangsovu
20-10-2023
6
5
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)