The following links lead to the full text from the respective local libraries:
Alternatively, you can try to access the desired document yourself via your local library catalog.
If you have access problems, please contact us.
92399 results
Sort by:
In: Military Police The Professional Bulletin of the Military Police Corps, 2021 Annual Issue
SSRN
Cover -- Title Page -- Copyright Page -- Contents -- Preface -- List of Contributors -- List of Figures -- List of Tables -- List of Examples -- List of Definitions -- List of Legal Provisions -- List of Equations -- List of Abbreviations -- Chapter 1 Introduction -- 1.1 Introduction -- 1.2 Cybercrime and Cybersecurity -- 1.2.1 Cybercrime -- 1.2.2 Cybercriminals and Threat Actors -- 1.2.3 Cybersecurity -- 1.2.4 Threat Modeling - Cyber Kill Chain and MITRE ATT& -- CK -- 1.3 Cyber Investigations -- 1.3.1 Digital Forensics -- 1.3.2 Digital Evidence -- 1.3.3 Attribution -- 1.3.4 Cyber Threat Intelligence -- 1.3.5 Open-Source Intelligence (OSINT) -- 1.3.6 Operational Avalanche - A Real-World Example -- 1.4 Challenges in Cyber Investigations -- 1.5 Further Reading -- 1.6 Chapter Overview -- 1.7 Comments on Citation and Notation -- 1.8 Exercises -- Chapter 2 Cyber Investigation Process -- 2.1 Introduction -- 2.2 Investigation as Information Work -- 2.3 Developing an Integrated Framework for Cyber Investigations -- 2.4 Principles for the Integrated Cyber Investigation Process (ICIP) -- 2.4.1 Procedure and Policy -- 2.4.2 Planning and Documentation -- 2.4.3 Forming and Testing of Hypotheses -- 2.4.4 The Dynamics of ICIP -- 2.4.5 Principles for Handling Digital Evidence -- 2.4.6 Limitations -- 2.5 ICIP's Procedural Stages -- 2.5.1 Investigation Initiation -- 2.5.2 Modeling -- 2.5.3 Planning and Prioritization -- 2.5.4 Impact and Risk Assessment -- 2.5.5 Action and Collection -- 2.5.6 Analysis and Integration -- 2.5.7 Documentation and Presentation -- 2.5.8 Evaluation -- 2.6 Cognitive and Human Error in Cyber Investigations -- 2.6.1 Cognitive Factors -- 2.6.2 Cognitive Biases -- 2.6.3 Countermeasures -- 2.7 Summary -- 2.8 Exercises -- Chapter 3 Cyber Investigation Law -- 3.1 Cyber Investigation in Context.
In: UCLA Journal of International Law and Foreign Affairs, Volume 14
SSRN
Drawing its numerous examples from Britain and beyond, Archaeological Investigation explores the procedures used in field archaeology travelling over the whole process from discovery to publication. Divided into four parts, it argues for a set of principles in part one, describes work in the field in part two and how to write up in part three. Part four describes the modern world in which all types of archaeologist operate, academic and professional. The central chapter 'Projects Galore' takes the reader on a whirlwind tour through different kinds of investigation inc.
This unique book presents a step-by-step approach to arson investigation. Its design and format make the book a ready reference for the investigator in the field and an excellent text for the classroom instructor. The opening chapter sets forth the author's step-by-step method for investigating arson fires. Then, from various points within this chapter, the reader is directed to following chapters that provide specific, in-depth information on basic fire knowledge, cause and origin of fires, basic electrical knowledge, the automobile fire, the youthful fire setter, the insurance fraud fire, th
In: The Professional Policing Curriculum in Practice
A practical guide to criminal investigation, from inception to conclusion, that matches the requirements of the new pre-join policing qualifications and the national policing curriculum. Suitable for all trainee and student police officers as well as those on criminology courses.
In: Capital & class, Volume 18, Issue 2, p. 130-131
ISSN: 2041-0980
In: Bulletin of the atomic scientists, Volume 23, Issue 5, p. 10-10
ISSN: 1938-3282
In: American political science review, Volume 10, Issue 4, p. 732-735
ISSN: 1537-5943
In: American political science review, Volume 8, Issue 2, p. 238-240
ISSN: 1537-5943
In: Policing: an International Journal Ser. v.4
Cover -- Guest editorial -- The role of detective experience on homicide clearances -- Improving the Clearance of Serious Crime: the case of aggravated assault -- Clearing gang- and drug-involved nonfatal shootings -- Sexual assault investigations and the factors that contribute to a suspect's arrest -- How victim credibility and cooperation influence investigative decision-making: examining DOJ's gender bias principles for investigating domestic and sexual violence -- Triaging online child abuse material: testing a decision support tool to enhance law enforcement and investigative prioritisation -- Hold them or fold them:" evidence-based decisions to discontinue investigations of non-domestic minor violence -- More and better video evidence for police investigations of shootings: Chicago's area technology centers -- Digital media investigators: challenges and opportunities in the use of digital forensics in police investigations in England and Wales -- Effective police investigative practices: an evidence-assessment of the research -- Mosaicking": cross construction, sense-making and methods of police investigation.
Any copyright on this work is most likely expired, given life expectancy and copyright duration at the time of publication, or when rolling copyright occurred (i.e., changes to the legislation extending the copyright term). In case of a takedown request, the depositor requests to be provided with legal documentation from the person/organization instigating the takedown request and to be heard by Zenodo before making a decision about the takedown. ; This file was uploaded by Chris Hartgerink (chris@libscie.org), not the original authors or the publisher. This upload is part of ensuring public access to the public domain. Please see description for legal justification of why this work is (likely to be) in the public domain and it is considered reasonable to be uploaded to Zenodo.
BASE