Bio-Privacy : Privacy Regulations and the Challenge of Biometrics provides an in-depth consideration of the legal issues posed by the use of biometric technology.
Considering the danger that both organised crime and terrorism currently pose to the world, the collusion between these two phenomena is of urgent con..
The aim of this book is to bring together findings from case studies of community-based crime control in England as a means of examining the prospects..
The aim of this book is to bring together findings from case studies of community-based crime control in England as a means of examining the prospects..
Bio-Privacy : Privacy Regulations and the Challenge of Biometrics provides an in-depth consideration of the legal issues posed by the use of biometri..
The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its beginnings to modern uses..
Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Fiel..
Surveillance has a high profile in security contexts – it is also increasingly central to organizational life: personal information is valued commerci..
This book provides an in-depth and critical analysis of police brutality and the killing of unarmed black males in the United States of America. It al..
Considering the danger that both organised crime and terrorism currently pose to the world, the collusion between these two phenomena is of urgent con..
This book considers certain key counter-terrorist measures used as part of the legal response to the "war on terror" post- 9/11, the use of technology..
Using three topics in criminology, this book describes how to reduce and respond to crime without reliance on the conventional criminal justice practi..