Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Subject
Library
1565 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Haag, Michael G., author.
      Format: 
      Excerpt: 
      reconstruction of events based on crime scene evidence, and the subsequent analysis of that evidence. The use and
      by 
      Davis, Lois M.
      Format: 
      Excerpt: 
      quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention
      by 
      Farr, Vanessa.
      Format: 
      Excerpt: 
      , destabilization, insecurity and crime in the build-up to war, in wartime and in the aftermath of violent conflict
      by 
      Epstein, Richard A., 1927-
      Format: 
      Excerpt: 
      a vice, a crime, a business, a pleasure, a type of magic, a disease, a folly, a weakness, a form of
      by 
      Cunningham, Wendy V.
      Format: 
      Excerpt: 
      : joblessness and job turnover -- Risky sexual behavior -- Crime and violence -- Substance use -- Identifying
      by 
      Norwitz, Jeffrey H., editor.
      Format: 
      Excerpt: 
      Countering the Terror-Crime Nexus / Russell D. Howard and Colleen M. Traughber -- Shari'a Financing and the
      by 
      Burgess, Christopher.
      Format: 
      Excerpt: 
      , Counterfeiting and Organized Crime Target Business; Intellectual Property; Virtual Roundtable on Intellectual
      by 
      Cross, Michael, 1965-
      Format: 
      Excerpt: 
      behavior that is as much a threat to the online community as "traditional" crime is to the neighborhoods in
      by 
      Long, Johnny.
      Format: 
      Excerpt: 
      . Readers will be amazed at how Knuth, law enforcement, and organized crime twist and torque everything from
      by 
      Crowley, Paul.
      Format: 
      Excerpt: 
      of a crime. These tools can be applied in both the public and private sectors. Armed with this
      by 
      Maynor, David.
      Format: 
      Excerpt: 
      , instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and