Résultats de recherche de titre
Articles 161 à 180 sur 2553
Virtuous Policing: Bridging America's Gulf Between Police and Populace (500 Tips)
Par David G. Bolgiano, L. Morgan Banks III, James M. Patterson. 2016
"It pulls no punches, shuns no controversial topic, and glosses over no issues or problems that beset America‘s law enforcement…
community in our day. For those who may be prone to suspect the motives of these self-confessed lovers of cops and warriors, the title of this book‘should be sufficient to allay such concerns." John C. Hall, Supervisory SpCold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition (Advances in Police Theory and Practice)
Par James M. Adcock, Sarah L. Stein. 2015
Because the investigation of cold cases is usually an arduous and time-consuming task, most law enforcement agencies in the United…
States are not able to dedicate the resources necessary to support the cold case investigation process. However, when those cases are fully pursued and prosecuted, they often result in convictions and lengthy prison terms. Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition saves law enforcement time by providing detailed guidelines for determining if a cold case is solvable, and if so, how to organize, manage, and evaluate the investigation. It also provides techniques for developing investigative strategies to complement the evaluation process and resolve the crime.This second edition features a new revised model and methodology for investigating cold cases suitable for all police and public safety agencies—large or small, domestic or international. This new model is more expeditious and convenient for departments that have less manpower and experience in dealing with cold cases. It emphasizes the prioritization of cold cases based on the availability of physical evidence and the chances of deriving matches from said evidence and an identified person of interest.Additional topics covered in the second edition include: How cases go cold Strategies for creating a cold case unit Cold case investigations in a Dutch educational environment—a chapter written by members of the Dutch Police Academy New forensic science technologies, including DNA, CODIS, and AFIS Case studies demonstrating advances in suspectology Strategies for effective investigative interviewing Challenges posed by staged crime scenes in cold cases How to craft a cold case evaluation report The expert authors of this book maintain The Center for the Resolution of Unresolved Crimes and conduct training and consulting worldwide. Their practical book is designed to help law enforcement agencies resurrect long-forgotten cases, bringing closure to victims and holding accountable those who are responsible. This book is part of the Advances in Police Theory and Practice seriesCognitive Robotics
Par Hooman Samani. 2016
The kimono-clad android robot that recently made its debut as the new greeter at the entrance of Tokyo's Mitsukoshi department…
store is just one example of the rapid advancements being made in the field of robotics.Cognitive robotics is an approach to creating artificial intelligence in robots by enabling them to learn from and respond to real-worlCollaborative Policing: Police, Academics, Professionals, and Communities Working Together for Education, Training, and Program Implementation (Advances in Police Theory and Practice)
Par Peter C. Kratcoski, Maximilian Edelbacher. 2016
"The chapters in this book reveal that police education, training, and practices are now closely tied to collaboration between police,…
academics, professional practitioners, and community agencies, and such collaboration is described and evaluated." Dilip K. Das, PhD, Founding President, International Police Executive Symposium (IPES) and foundingTransportation Systems Security
Par Allan McDougall, Robert Radvanovsky. 2008
Highlighting the importance of transportation to a country‘s infrastructure and survival, Transportation Systems Security presents the strategic and practical considerations…
involved in the implementation of physical, procedural, and managerial safeguards required to keep all modes of transportation up and running during an actual or potentiInteractive Storytelling: Techniques for 21st Century Fiction
Par Andrew Glassner. 2004
We are on the verge of creating an exciting new kind of interactive story form that will involve audiences as…
active participants. This book provides a solid foundation in the fundamentals of classical story structure and classical game structure and explains why it has been surprisingly difficult to bring these two activities together. With this foundation in place, the book presents several ideas for ways to move forward in this appealing quest. The author has a conversational and friendly style, making reading a pleasure.Software Project Management: A Process-Driven Approach
Par Ashfaque Ahmed. 2012
To build reliable, industry-applicable software products, large-scale software project groups must continuously improve software engineering processes to increase product quality,…
facilitate cost reductions, and adhere to tight schedules. Emphasizing the critical components of successful large-scale software projects, Software Project Management: AOrganizations need to constantly innovate and improve products and services to maintain a strong competitive position in the market place.…
The vehicle used by organizations for such constant reinvention is a business transformation program. This book illustrates a tested program management roadmap along with the supporting comprehensive frameworksThe Complete Project Management Office Handbook (ESI International Project Management Series)
Par Gerard M. Hill. 2014
This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the…
realm of project management oversight, control, and support. Illustrating the implications of project management in today’s organizations, The Complete Project Management Office Handbook, Third Edition explains how to use the project management office (PMO) as a business integrator to influence project outcomes in a manner that serves both project and business management interests.Helping you determine if a PMO is right for your organization, this edition presents a five-stage PMO competency continuum to help you understand how to develop PMOs at different competency levels and associated functionalities. It also identifies five progressive PMO development levels to help you identify which level is best for your organization. Updates to this edition include: A refinement of the 20 PMO functions that guide PMO setup and operations A new section that provides an effective evaluation of PMO maturity indicators based on the prescribed 20 PMO functions presented in the handbook A new section on Establishing a Project Management Office that details a comprehensive process for determining the needs, purpose, and functionality for a new PMO Best practices that have cross-industry value and applicability The book includes checklists, detailed process steps, and descriptive guidance for developing PMO functional capability. The up-to-date PMO model defined will not only help you better understand business practices in project management, but will also help you to adapt and integrate those practices into the project management environment in your organization.For anyone associated with start-up and smaller PMOs, the book explains what can be done to create less rigorous PMO functional capabilities. It also includes helpful insights for those who need to specify and demonstrate "quick-wins" and early PMO-based accomplishments in their organization.The world is becoming increasingly mobile. Smartphones and tablets have become more powerful and popular, with many of these devices…
now containing confidential business, financial, and personal information. This has led to a greater focus on mobile software security. Establishing mobile software security should be of primary concern to every mobilCounterterrorism: Reassessing the Policy Response
Par Benoît Gomis. 2016
Counterterrorism: Reassessing the Policy Response promotes a more nuanced understanding of the effectiveness of current counterterrorism practices and the need…
for reform. It challenges government, media, and academic accounts that exaggerate terrorist threats, particularly in comparison to other threats such as organized crime. Author Beno�Gomis rOfficial ((ISC)2 Press)
Par Steven Hernandez. 2015
HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose…
foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one credential to protect organizations and sensitive patient data against emerging threats and breaches. The Official (ISC)2 (R) Guide to the HCISPPSM CBK (R) is a comprehensive resource that provides an in-depth look at the six domains of the HCISPP Common Body of Knowledge (CBK). This guide covers the diversity of the healthcare industry, the types of technologies and information flows that require various levels of protection, and the exchange of healthcare information within the industry, including relevant regulatory, compliance, and legal requirements. Numerous illustrated examples and tables are included that illustrate key concepts, frameworks, and real-life scenarios. Endorsed by the (ISC)(2) and compiled and reviewed by HCISPPs and (ISC)(2) members, this book brings together a global and thorough perspective on healthcare information security and privacy. Utilize this book as your fundamental study tool in preparation for the HCISPP certification exam.Digital Forensics for Handheld Devices
Par Eamon P. Doherty. 2013
Approximately 80 percent of the worlds population now owns a cell phone, which can hold evidence or contain logs about…
communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital ForensicsKnowledge Management and E-Learning
Par Jay Liebowitz, Michael S. Frank. 2011
The rapidly growing demand for online courses and supporting technology has resulted in a plethora of structural and functional changes…
and challenges for universities and colleges. These changes have led many distance education providers to recognize the value of understanding the fundamental concepts of both e-learning and knowledge management (KGenome Annotation (Chapman & Hall/CRC Computational Biology Series #46)
Par Jung Soh, Paul M.K. Gordon, Christoph W. Sensen. 2013
The success of individualized medicine, advanced crops, and new and sustainable energy sources requires thoroughly annotated genomic information and the…
integration of this information into a coherent model. A thorough overview of this field, Genome Annotation explores automated genome analysis and annotation from its origins to the challenges of next-generation sequencing data analysis.The book initially takes you through the last 16 years since the sequencing of the first complete microbial genome. It explains how current analysis strategies were developed, including sequencing strategies, statistical models, and early annotation systems. The authors then present visualization techniques for displaying integrated results as well as state-of-the-art annotation tools, including MAGPIE, Ensembl, Bluejay, and Galaxy. They also discuss the pipelines for the analysis and annotation of complex, next-generation DNA sequencing data. Each chapter includes references and pointers to relevant tools. As very few existing genome annotation pipelines are capable of dealing with the staggering amount of DNA sequence information, new strategies must be developed to accommodate the needs of today’s genome researchers. Covering this topic in detail, Genome Annotation provides you with the foundation and tools to tackle this challenging and evolving area. Suitable for both students new to the field and professionals who deal with genomic information in their work, the book offers two genome annotation systems on an accompanying downloadable resources.FISMA Principles and Best Practices: Beyond Compliance
Par Patrick D. Howard. 2011
While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements…
have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls. Detailing a proven approPolice Suicide: Is Police Culture Killing Our Officers?
Par Ronald A. Rufo. 2016
There is no question that more police officers die from suicide than those killed in the line of duty. The…
suicide and attempted suicide of police officers is a mental health concern that has been neglected for far too long.Police Suicide: Is Police Culture Killing Our Officers? provides realistic insight into the life of a police officer through aSecuring Systems: Applied Security Architecture and Threat Models
Par Brook S. Schoenfield. 2015
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight…
hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of asSecurity De-Engineering: Solving the Problems in Information Risk Management
Par Ian Tibble. 2012
As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing…
something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is a definitive guide to the current problems iHuman-Computer Etiquette: Cultural Expectations and the Design Implications They Place on Computers and Technology (Supply Chain Integration Modeling, Optimization and Application)
Par Caroline C. Hayes, Christopher A. Miller. 2011
Written by experts from various fields, this edited collection explores a wide range of issues pertaining to how computers evoke…
human social expectations. The book illustrates how socially acceptable conventions can strongly impact the effectiveness of human-computer interactions and how to consider such norms in the design of human-computer inter