Search alternatives:
line » live

1
Published 2018
Oxford University Press
...Development and life-course criminology...

2
by Krausz, Michael
Published 2010
IT Governance Pub.
... number of real-life stories of information security incidents and breaches. It is a 'first line...

3
by Mathews, Donald G.
Published 2018
Cambridge University Press
...Southern States / Religious life and customs...

4
by Eski, Yarin
Published 2023
Palgrave Macmillan
Table of Contents: ... species and our extinction -- 2. Circles of life, death and rebirth: Previous mass extinctions, human-like...

5
by Durrant, Russil
Published 2024
Palgrave Macmillan
Table of Contents: ...: An historical overview -- 3 So many species: The nature and scope of invertebrate life and the biodiversity...

6
by Gideon, Lior
Published 2010
Springer New York
Table of Contents: ...Theoretical Framework -- Getting Substance Abusers to Talk -- There Is No Place Like Home—Family...

7
by DeLisi, Matt
Published 2023
Palgrave Macmillan
...This book revisits the life and crimes of Ted Bundy. It seeks to reconcile the contradictions...

8
by Vaughan, Liam, Finch, Gavin
Published 2017
John Wiley & Sons
Table of Contents: ... in the life -- Buy the cash boys a curry! -- Anything with four legs -- No one's clean-clean -- The sheep...

9
by Jakobsen, Adam Tilmar
Published 2024
Wiley
... people often think about high-tech crimes like ransomware, DDoS, or BEC. However, it extends beyond...

10
by Oppenheimer, Jerry
Published 2009
Wiley
Table of Contents: ... versus the SEC -- Life inside the Madoff piggy bank, flashing the plastic, and losing the farm -- A...

11
by Hesketh, Ian, Cooper, Cary L.
Published 2023
Palgrave Macmillan
... life as a police officer or member of police support staff. With a focus on the modern working...

12
by Johansen, Gerard
Published 2017
Packt Publishing

13
Published 2023
Palgrave Macmillan
Table of Contents: ... and creativity -- 24 Insight through experience: Who decides what positive practice looks like? -- 25 Faith Based...

14
by Cox, Dennis W.
Published 2014
Wiley
Table of Contents: ... Line of Defence; 3.4.2 The Second Line of Defence; 3.4.4 Risk Assessment and Management; 3.4.5 Policies...

15
by Bautista, Wilson
Published 2018
Packt Publishing
Table of Contents: ... Configuration Management -- Data Exposure and Sharing -- Prelude -- integrating like services -- Integrating...