Search ResultsElectronic Resources 
by
Haag, Michael G., author.
ScienceDirect https://www.sciencedirect.com/science/book/9780123822413
Format:
Excerpt:
reconstruction of events based on crime scene evidence, and the subsequent analysis of that evidence. The use and
by
Davis, Lois M.
Format:
Excerpt:
quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention
by
Farr, Vanessa.
Format:
Excerpt:
, destabilization, insecurity and crime in the build-up to war, in wartime and in the aftermath of violent conflict
by
Epstein, Richard A., 1927-
ScienceDirect http://www.sciencedirect.com/science/book/9780123749406
Format:
Excerpt:
a vice, a crime, a business, a pleasure, a type of magic, a disease, a folly, a weakness, a form of
by
Cunningham, Wendy V.
Format:
Excerpt:
: joblessness and job turnover -- Risky sexual behavior -- Crime and violence -- Substance use -- Identifying
by
Norwitz, Jeffrey H., editor.
Format:
Excerpt:
Countering the Terror-Crime Nexus / Russell D. Howard and Colleen M. Traughber -- Shari'a Financing and the
by
Burgess, Christopher.
ScienceDirect https://www.sciencedirect.com/science/book/9781597492553
Format:
Excerpt:
, Counterfeiting and Organized Crime Target Business; Intellectual Property; Virtual Roundtable on Intellectual
by
Cross, Michael, 1965-
ScienceDirect https://www.sciencedirect.com/science/book/9781597492768
Format:
Excerpt:
behavior that is as much a threat to the online community as "traditional" crime is to the neighborhoods in
by
Long, Johnny.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490818
Format:
Excerpt:
. Readers will be amazed at how Knuth, law enforcement, and organized crime twist and torque everything from
by
Wonder, Anita Y.
Format:
Excerpt:
execution -- 15. Lack of the crime lab involvement -- 16. On duty officer involved shooting -- 17. Three
by
Crowley, Paul.
ScienceDirect https://www.sciencedirect.com/science/book/9781597491280
Format:
Excerpt:
of a crime. These tools can be applied in both the public and private sectors. Armed with this
by
Maynor, David.
ScienceDirect http://www.sciencedirect.com/science/book/9781597490566
Format:
Excerpt:
, instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and

Select an Action





