According to Pinkerton—the leading provider of risk management services in the world—workplace violence is second only to cybersecurity as the top...
Advanced Topics in Forensic DNA Typing: Interpretation builds upon the previous two editions of John Butler’s internationally acclaimed Forensic DNA...
Alarm Systems and Theft Prevention, Second Edition, recounts the sometimes sad, sometimes humorous, and nearly always unfortunate experiences of...
In Bloodstain Pattern Evidence, the concepts introduced in the author's first book, Blood Dynamics, are updated and applied to provide essential...
Bloodstain Patterns: Identification, Interpretation and Application combines material from Blood Dynamics (2001) and Bloodstain Pattern Evidence...
Cargo Theft, Loss Prevention, and Supply Chain Security outlines steps for identifying the weakest links in the supply chain and customizing a...
A complete reference on CCTV technology Gives practical advice on the proper uses of CCTV to best protect against crime Contains more than 100...
Children are suffering from a hidden epidemic of child abuse and neglect. Every year more than 3 million reports of child abuse are made in the United...
Commingled human remains are encountered in situations ranging from prehistoric ossuaries to recent mass fatality incidents. Commingled Human Remains:...
Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible...