1
by Shavers, Brett
Published 2013
Syngress
Table of Contents: ...1.2.11 Missing Evidence1.2.12 Bomb Threats by E-mail; 1.2.13 ID the Suspect; 1.2.14 Online...

2
by Pierson, Lillian
Published 2015
John Wiley and Sons, Inc.
Table of Contents: ... -- Using data science to describe and predict criminal activity -- Part VI, The part of tens: Ten...

3
by Tou, Julius T.
Published 1974
Springer US
Table of Contents: ... Grammar -- 5. Applications in Information Science -- 6. Summary and Conclusions -- References...

4
by Forthofer, Ronald
Published 1981
Springer US
Subjects: ...Humanities and Social Sciences...

5
by Valcik, Nicolas A., Tracy, Paul E.
Published 2013
CRC Press/Taylor & Francis, Taylor and Francis, an imprint of Routledge
Table of Contents: ... Failure -- chapter 9 Case Studies: Disasters from Criminal or Terrorist Acts--Bombings -- chapter 10 Case...

6
by Sun, Peiliang
Published 2022
Springer Nature Singapore
... and other management modes brought about by strengthening the police with science and technology, deepen...

7
Published 2018
Springer International Publishing
Table of Contents: ... in -- Chapter 3. PEVNET: A Framework for Visualization of Criminal Networks -- Chapter 4. Effective Customer...