![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Science & Mathematics > Science: general issues > Forensic science
The role of a forensic science defence expert is often referred to by those working for the police/state/government forensic labs as being on the 'dark side.'In Joining the Dark Side, author David Schudel outlines the evolution of a fascinating career that starts out in the dark side and looks at what problems can appear in forensic cases. The book delves into the problems inherent to forensic science, in particular cognitive bias and scientific philosophy. It also looks at the emotional impact and specific challenges behind forensic science and provides the reader with some sage advice on giving evidence in Court.
The role of a forensic science defence expert is often referred to by those working for the police/state/government forensic labs as being on the 'dark side.'In Joining the Dark Side, author David Schudel outlines the evolution of a fascinating career that starts out in the dark side and looks at what problems can appear in forensic cases. The book delves into the problems inherent to forensic science, in particular cognitive bias and scientific philosophy. It also looks at the emotional impact and specific challenges behind forensic science and provides the reader with some sage advice on giving evidence in Court.
Anabolic Steroid Abuse in Public Safety Personnel: A Forensic Manual provides readers with information on both the history and overwhelming evidence relating to steroid abuse in the law enforcement subculture. The text raises awareness regarding the pervasiveness of the problem that has grown into a systemic and nationwide phenomenon, and then addresses the consequences of anabolic steroid abuse on individual health, agency liability, and public safety. Particular attention is paid to forensic issues, including investigative, evidentiary, and legal concerns, facilitating just and lawful outcomes when these crimes are suspected or exposed.
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, 2nd Edition, describes clearly and simply how crime clusters and other intelligence can be used to deploy security resources most effectively. Rather than being reactive, security agencies can anticipate and prevent crime through the appropriate application of data mining and the use of standard computer programs. Data Mining and Predictive Analysis offers a clear, practical starting point for professionals who need to use data mining in homeland security, security analysis, and operational law enforcement settings. This revised text highlights new and emerging technology, discusses the importance of analytic context for ensuring successful implementation of advanced analytics in the operational setting, and covers new analytic service delivery models that increase ease of use and access to high-end technology and analytic capabilities. The use of predictive analytics in intelligence and security analysis enables the development of meaningful, information based tactics, strategy, and policy decisions in the operational public safety and security environment.
This book analyses the usefulness of terrorist profiling utilised by law enforcement officers as a pre-emptive means to assist them in the detection, prevention and deterrence of terrorism and/or its preparatory activities. It explores two main themes arising from the phenomenon of terrorist profiling: the lawfulness of terrorist profiling and the utility of profiling. These two themes are explored in three separate parts. Firstly, the book begins by drawing upon human rights concerns arising from the use of terrorist profiling by law enforcement officers. Secondly, an analytical framework capable of making determinations on the usefulness of terrorist profiling. This framework develops a profiling spectrum that ranges from formal and informal manifestations of terrorist profiling that forms the basis for evaluating its usefulness. Finally, the book presents an examination of various manifestations of terrorist profiling by separating the analysis of the 'construction' of profiles on the one hand, from their 'application,' on the other, so as to be able to identify and examine profiling's usefulness as a technique to assist law enforcement officers make predictions about likely offender characteristics. This book ultimately concludes that terrorist profiling should only be conducted by undertaking a systematic assessment of the construction of profiles separate from the application of profiles whilst simultaneously taking into account fundamental human rights concerns with the practice of terrorist profiling. The work will be an essential resource for academics, law enforcement officers and lawyers in the disciplines of law, criminology, human rights, criminal justice and policing. As the book engages with terrorist profiling, it will also be of interest to those engaged in the psychology of terrorism.
Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas. KEY FEATURES * Discusses the prominence of cyber security in human life * Discusses the significance of cyber security in the post-COVID-19 world * Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors * Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment * Offers understanding of the impact of big data breaches and future trends in data security This book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain.
Forensic science is in crisis and at a cross-roads. Movies and television dramas depict forensic heroes with high-tech tools and dazzling intellects who-inside an hour, notwithstanding commercials-piece together past-event puzzles from crime scenes and autopsies. Likewise, Sherlock Holmes-the iconic fictional detective, and the invention of forensic doctor Sir Arthur Conan Doyle-is held up as a paragon of forensic and scientific inspiration-does not "reason forward" as most people do, but "reasons backwards." Put more plainly, rather than learning the train of events and seeing whether the resultant clues match those events, Holmes determines what happened in the past by looking at the clues. Impressive and infallible as this technique appears to be-it must be recognized that infallibility lies only in works of fiction. Reasoning backward does not work in real life: reality is far less tidy. In courtrooms everywhere, innocent people pay the price of life imitating art, of science following detective fiction. In particular, this book looks at the long and disastrous shadow cast by that icon of deductive reasoning, Sherlock Holmes. In The Sherlock Effect, author Dr. Thomas W. Young shows why this Sherlock-Holmes-style reasoning does not work and, furthermore, how it can-and has led-to wrongful convictions. Dr. Alan Moritz, one of the early pioneers of forensic pathology in the United States, warned his colleagues in the 1950's about making the Sherlock Holmes error. Little did Moritz realize how widespread the problem would eventually become, involving physicians in all other specialties of medicine and not just forensic pathologists. Dr. Young traces back how this situation evolved, looking back over the history of forensic medicine, revealing the chilling degree to which forensic experts fail us every day. While Dr. Young did not want to be the one to write this book, he has felt compelled in the interest of science and truth. This book is measured, well-reasoned, accessible, insightful, and-above all-compelling. As such, it is a must-read treatise for forensic doctors, forensic practitioners and students, judges, lawyers adjudicating cases in court, and anyone with an interest in forensic science.
Although serial offenders have been a recognized problem in society for centuries, only recently have the complexities of these individuals come to light. Serial Offenders: Current Thought, Recent Findings presents current and inclusive information on serial offending in a clear and straightforward manner. Citing numerous case examples, this book will provide forensic psychologists and psychologists, as well as criminologists, social workers and corrections officials with relevant and informative data. Author Louis B. Schlesinger presents current thinking on serial offenders in the first of three parts contained in the text. In Part I, he covers serial homicide, child molestation, rape, arson, and the nonviolent serial offender, while offering new information and perspectives on these traditional problems. Part II reverses thought, and takes a look at recent clinical and research findings. From profiling by law-enforcement and health-care workers to the neurobiological approach to understanding why people continually commit these crimes, Part II delves beyond right and wrong to illuminate and identify the many shades of gray. Part III focuses on the unusual aspects of serial offending and on special populations of offenders. From infantophilia to serial offending by females, adolescents and members of the clergy, Schlesinger provides insight into a world that few have witnessed in such a comprehensive manner.
Portrays material through multidisciplinary lens of psychology, criminal justice, law, and security Provides consistent, practical information about online criminals and victims Compares online to offline versions of the same crime Discusses adequacy of current laws for prosecuting cybercriminals Considers elements of the online environment that foster criminal activity Describes social engineering techniques Considers the role of intimate partner violence in cybercrimes Reviews 21st century skills needed to educate and protect potential targets
The Sudarium of Oviedo throws new light on the last hours of Jesus of Nazareth. It provides a better understanding of the gospel John 20:5-7 and some characteristics of the Shroud of Turin that explain since when the use of the Sudarium is known. During the past few decades, those interested in the Shroud of Turin have also been eager to know what this book reveals about the Sudarium of Oviedo, because it reinforces the possibility that both cloths were used on the same Man. This book presents to English-speaking readers the research on the Sudarium of Oviedo, most of which has only been available in Spanish so far. It includes a thorough critical analysis and new unpublished studies. The bloodstained cloth is claimed to be a relic of Christ. This text discusses its trace through history, the many tests performed directly on it or on its samples, its devotional value, and its comparison with the Shroud of Turin.
Unleashing the Art of Digital Forensics is intended to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector. Key Features: * Discusses the recent advancements in Digital Forensics and Cybersecurity * Reviews detailed applications of Digital Forensics for real-life problems * Addresses the challenges related to implementation of Digital Forensics and Anti-Forensic approaches * Includes case studies that will be helpful for researchers * Offers both quantitative and qualitative research articles, conceptual papers, review papers, etc. * Identifies the future scope of research in the field of Digital Forensics and Cybersecurity. This book is aimed primarily at and will be beneficial to graduates, postgraduates, and researchers in Digital Forensics and Cybersecurity.
This edited book provides a comprehensive survey of the modern state of the art in forensic linguistics. Part I of the book focuses on the role of the linguist as an expert witness in common law and civil law jurisdictions, the relation of expert witnesses and lawyers, ethics standards, and courtroom interaction. Part II deals with some of the major areas of expertise of forensic linguistics as the scientific study of language as evidence, namely authorship identification, speaker identification, text authentication, deception and lie detection, plagiarism detection, and cyber language crimes. This book is intended to be used as a reference for academics, students and practitioners of Linguistics, Forensic Linguistics, Law, Criminology, and Forensic Psychology, among other disciplines.
Though polygraph has been the mainstay for government and police departments since World War II, it has undergone substantial transformation in recent years. Fundamentals of Polygraph Practice bridges the gap between the outmoded practices and today's validated testing and analysis protocols. The goal of this reference is to thoroughly and concisely describe the evidence-based practices of polygraphy. Coverage will include: psychophysiology, testing techniques, data collection, data analysis, ethics, polygraph law, alternate technologies and much more. This text addresses the foundational needs of polygraph students, and is written to be useful and accessible to attorneys, forensic scientists, consumers of polygraph services, and the general public.
Forensic Chemistry is the first publication to provide coordinated expert content from world-renowned leading authorities in forensic chemistry. Covering the range of forensic chemistry, this volume in the Advanced Forensic Science Series provides up-to-date scientific learning on drugs, fire debris, explosives, instrumental methods, interpretation, and more. Technical information, written with the degreed professional in mind, brings established methods together with newer approaches to build a comprehensive knowledge base for the student and practitioner alike. Like each volume in the Advanced Forensic Science Series, review and discussion questions allow the text to be used in classrooms, training programs, and numerous other applications. Sections on fundamentals of forensic science, history, safety, and professional issues provide context and consistency in support of the forensic enterprise. Forensic Chemistry sets a new standard for reference and learning texts in modern forensic science.
Forensic Investigation of Clandestine Laboratories, Second Edition is fully updated to address all aspects of the forensic investigation of clandestine laboratories. While, the first edition focused on the domestic clandestine manufacture of contraband substances, this edition expands the scope to more fully address the clandestine manufacture of explosives that have become a threat that is global in nature. In clandestine laboratory operations, equipment is often simple, household chemical products are utilized, and the education of the operators basic. In fact, most of the time these elements individually are perfectly legal to sell and possess. However, the combination of all these elements is what becomes the scene of illicit activity and a criminal operation. In response to the increase in use of homemade explosive mixtures by terrorists, both domestically and internationally, the section clandestine manufacture of explosives is greatly enhanced. Topics are presented in a manner which, while detailed, will not compromise the tactics, techniques, or procedures utilized by law enforcement and military personnel in their ability to combat the clandestine manufacture of contraband substances and the battle against domestic and international terrorism. Key features: * Examines tell-tale signs to look for in recognizing a clandestine lab * Outlines how to safely process the site of a clandestine lab * Details how to analyze collected evidence in the examination laboratory * Provides guidelines as to what to derive from the physical evidence * Offers specific tactics to effectively present the opinions associated with evidence that has been collected during the investigation in a written report, military style briefing or to a jury in a legal proceeding. Forensic Investigation of Clandestine Laboratories, Second Edition guides the reader through the process of recognizing these illegal manufacturing operations. Then it examines the methods as to how to compile the volume of associated evidence into a package that can be presented in a court of law, or to military commanders for decisive action. It is an invaluable resource, that will prove useful to chemistry lab technicians, forensic investigators, fire and first responder professionals, military personnel, police investigative agencies and narcotics units, and lawyer trying cases involving clandestine labs.
This book provides an expert introduction to audio forensics, an essential specialty in modern forensic science, equipping readers with the fundamental background necessary to understand and participate in this exciting and important field of study. Modern audio forensic analysis combines skills in digital signal processing, the physics of sound propagation, acoustical phonetics, audio engineering, and many other fields. Scientists and engineers who work in the field of audio forensics are called upon to address issues of authenticity, quality enhancement, and signal interpretation for audio evidence that is important to a criminal law enforcement investigation, an accident investigation board, or an official civil inquiry. Expertise in audio forensics has never been more important. In addition to routine recordings from emergency call centers and police radio dispatchers, inexpensive portable audio/video recording systems are now in widespread use. Forensic evidence from the scene of a civil or criminal incident increasingly involves dashboard recorders in police cars, vest-pocket personal recorders worn by law enforcement officers, smart phone recordings from bystanders, and security surveillance systems in public areas and businesses. Utilizing new research findings and both historical and contemporary casework examples, this book blends audio forensic theory and practice in an informative and readable manner suitable for any scientifically-literate reader. Extensive examples, supplementary material, and authoritative references are also included for those who are interested in delving deeper into the field.
Addresses simple to advance microscopy techniques for the effective analyses of trace evidence Pairs chapters on a particular type of microscopy, explaining it fully, before delving into specific usage for forensic applications Presents theories and as well as the real-world applications outlining current standards and best practices Provides numerous micro-photographs from authors' and editors' collections, including graphical representations and flow charts to clearly illustrate concepts
Addresses simple to advance microscopy techniques for the effective analyses of trace evidence Pairs chapters on a particular type of microscopy, explaining it fully, before delving into specific usage for forensic applications Presents theories and as well as the real-world applications outlining current standards and best practices Provides numerous micro-photographs from authors' and editors' collections, including graphical representations and flow charts to clearly illustrate concepts
Digital forensics plays a crucial role in identifying, analysing, and presenting cyber threats as evidence in a court of law. Artificial intelligence, particularly machine learning and deep learning, enables automation of the digital investigation process. This book provides an in-depth look at the fundamental and advanced methods in digital forensics. It also discusses how machine learning and deep learning algorithms can be used to detect and investigate cybercrimes. This book demonstrates digital forensics and cyber-investigating techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record and GUID Partition Table as part of the investigative process. It also covers cyberattack analysis in Windows, Linux, and network systems using virtual machines in real-world scenarios. Digital Forensics in the Era of Artificial Intelligence will be helpful for those interested in digital forensics and using machine learning techniques in the investigation of cyberattacks and the detection of evidence in cybercrimes.
Report Writing for Crime Scene Investigators provides students with the tools to write effective crime scene reports. Students looking to break into the field of crime scene investigations often take courses in report writing but the textbooks available are commonly geared toward general law enforcement and first responders. However, none of the books on the market focus on the craft of effective, informative writing with graphic crime scene-specific considerations in mind. While falling under law enforcement's purview, crime scene investigations fall within the forensic science field, and, as such, the reporting required is more technical and often more scientific in nature than the average police report. Due to the lack of published resources and guidance in this critical area, there is no standard that currently exists for vital function within crime scene and investigative circles-and often the subject is given short shrift. This creates wide discrepancies among what students are being taught. This book is the first of its kind to provide students, and those professionals and agencies in need of a "blueprint," with a resource to teach them the various types of reports-and how to refer to scenarios and specific types of evidence-to ensure that the report holds up under the process of an investigation and for use within the courts. Key features: Outlines the key distinctions between police-style reports and crime scene-style reports and writing Explains how to clearly and accurately provide an accounting and description of a variety of evidence recovered from a scene Details how to best organize the report in a logical manner and sequence, including the various components of the crime scene report Presents an explanation of the information that should be included in the report, and the rationale behind its importance, for testimonial purposes Report Writing for Crime Scene Investigators provides to the reader the fundamentals of effective report writing for the active field Crime Scene Investigator. Coverage includes the necessary steps to thoroughly document scenes and evidence-from the time the CSI receives the call until the time the CSI testifies in court. In addition to the student market, the book will be a welcome resource for professional crime scene investigators, attorneys, and as a reference and standard for professional training programs.
Report Writing for Crime Scene Investigators provides students with the tools to write effective crime scene reports. Students looking to break into the field of crime scene investigations often take courses in report writing but the textbooks available are commonly geared toward general law enforcement and first responders. However, none of the books on the market focus on the craft of effective, informative writing with graphic crime scene-specific considerations in mind. While falling under law enforcement's purview, crime scene investigations fall within the forensic science field, and, as such, the reporting required is more technical and often more scientific in nature than the average police report. Due to the lack of published resources and guidance in this critical area, there is no standard that currently exists for vital function within crime scene and investigative circles-and often the subject is given short shrift. This creates wide discrepancies among what students are being taught. This book is the first of its kind to provide students, and those professionals and agencies in need of a "blueprint," with a resource to teach them the various types of reports-and how to refer to scenarios and specific types of evidence-to ensure that the report holds up under the process of an investigation and for use within the courts. Key features: Outlines the key distinctions between police-style reports and crime scene-style reports and writing Explains how to clearly and accurately provide an accounting and description of a variety of evidence recovered from a scene Details how to best organize the report in a logical manner and sequence, including the various components of the crime scene report Presents an explanation of the information that should be included in the report, and the rationale behind its importance, for testimonial purposes Report Writing for Crime Scene Investigators provides to the reader the fundamentals of effective report writing for the active field Crime Scene Investigator. Coverage includes the necessary steps to thoroughly document scenes and evidence-from the time the CSI receives the call until the time the CSI testifies in court. In addition to the student market, the book will be a welcome resource for professional crime scene investigators, attorneys, and as a reference and standard for professional training programs.
Includes chapters that provide context for statistical testimony by expert witnesses Includes chapters that describe relevant statistical methodology Includes chapters applying statistical methodology to specific areas of forensic science
Digital forensics plays a crucial role in identifying, analysing, and presenting cyber threats as evidence in a court of law. Artificial intelligence, particularly machine learning and deep learning, enables automation of the digital investigation process. This book provides an in-depth look at the fundamental and advanced methods in digital forensics. It also discusses how machine learning and deep learning algorithms can be used to detect and investigate cybercrimes. This book demonstrates digital forensics and cyber-investigating techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record and GUID Partition Table as part of the investigative process. It also covers cyberattack analysis in Windows, Linux, and network systems using virtual machines in real-world scenarios. Digital Forensics in the Era of Artificial Intelligence will be helpful for those interested in digital forensics and using machine learning techniques in the investigation of cyberattacks and the detection of evidence in cybercrimes.
Human footprints provide some of the most emotive and tangible evidence of our ancestors. They provide evidence of stature, presence, behaviour and in the case of early hominin footprints, evidence with respect to the evolution of human gait and foot anatomy. While human footprint sites are rare in the geological record the number of sites around the World has increased in recent years, along with the analytical tools available for their study. The aim of this book is to provide a definitive review of these recent developments with specific reference to the increased availability of three-dimensional digital elevation models of human tracks at many key sites. The book is divided into eight chapters. Following an introduction the second chapter reviews modern field methods in human ichnology focusing on the development of new analytical tools. The third chapter then reviews the major footprint sites around the World including details on several unpublished examples. Chapters then follow on the role of geology in the formation and preservation of tracks, on the inferences that can be made from human tracks and the final chapter explores the application of this work to forensic science. Audience: This volume will be of interest to researchers and students across a wide range of disciplines - sedimentology, archaeology, forensics and palaeoanthropology.
Unique selling point: * Set up to be used as a college textbook with a complete "Case Study" that involves the use of Python (a very key programming language at this time) Core audience: * Cyber security professionals, college students in a cyber forensics class, and individuals interested in cyber crime Place in the market: * Will build on the success of the previous two editions |
You may like...
Song For Sarah - Lessons From My Mother
Jonathan Jansen, Naomi Jansen
Hardcover
(3)
Conceptualizing Friendship in Time and…
Carla Risseeuw, Marlein van Raalte
Paperback
R2,535
Discovery Miles 25 350
Father involvement in the early years…
Marina A. Adler, Karl Lenz
Hardcover
R2,842
Discovery Miles 28 420
Just Like Family - How Companion Animals…
Andrea Laurent-Simpson
Hardcover
R2,556
Discovery Miles 25 560
Family Matters - Family Cohesion…
Zitha Mokomane, Benjamin Roberts, …
Paperback
Flexible Work and the Family
Anja-Kristin Abendroth, Laura Lukemann
Hardcover
R3,381
Discovery Miles 33 810
Unfamiliar Landscapes - Young People and…
Thomas Aneurin Smith, Hannah Pitt, …
Hardcover
R4,017
Discovery Miles 40 170
|