The Process of Investigation: Concepts and Strategies for Investigators in the Private Sector
Autor Charles A. Sennewald, John Tsukayamaen Limba Engleză Hardback – 8 ian 2015
- Teaches the fundamentals of the investigative process and serves as a valuable reference tool for both the student and the professional
- Experienced professionals can brush up on seldom-used specialty skills, and reconsider existing methods and approaches
- Includes a new chapter on discrimination investigations
Preț: 333.80 lei
Preț vechi: 487.92 lei
-32% Nou
Puncte Express: 501
Preț estimativ în valută:
63.89€ • 66.45$ • 53.54£
63.89€ • 66.45$ • 53.54£
Carte tipărită la comandă
Livrare economică 06-20 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780128001660
ISBN-10: 0128001666
Pagini: 368
Dimensiuni: 191 x 235 x 21 mm
Greutate: 0.84 kg
Ediția:Revised
Editura: ELSEVIER SCIENCE
ISBN-10: 0128001666
Pagini: 368
Dimensiuni: 191 x 235 x 21 mm
Greutate: 0.84 kg
Ediția:Revised
Editura: ELSEVIER SCIENCE
Cuprins
PART I. FUNDAMENTALS OF SECURITY INVESTIGATION
Chapter 1. The Investigative Process
Chapter 2. A Comparison of Public and Private Sectors
Chapter 3. Qualities of the Investigator
Chapter 4. Managing the Investigative Function
PART II. METHODS OF SECURITY INVESTIGATION
Chapter 5. Undercover Investigations
Chapter 6. Surveillance
Chapter 7. Background Investigations
Chapter 8. Discovering Covert Crimes
PART III. BUILDING A CASE
Chapter 9. Interviews and Interrogations
Chapter 10. An Overview of the Interview and Interrogation Process
Chapter 11. Evidence
Chapter 12. Written Statements, Admissions, and Confessions
Chapter 13. The Use of Informants
Chapter 14. Report Writing and Note Taking
PART IV. APPLYING INVESTIGATIVE STRATEGIES
Chapter 15. Problems Arise: The What of Investigation
Chapter 16. Crime and Solution: The How of Investigation
Chapter 17. Identifying Suspects: The Who of Investigation
Chapter 18. Finding Information: The Where of Investigation
Chapter 19. The Time Factor: The When of Investigation
Chapter 20. Establishing Motive: The Why of Investigation
PART V.TECHNOLOGICAL AND SPECIALIZED INVESTIGATIVE TECHNIQUES
Chapter 21. Imagery
Chapter 22. Computers in Private Sector Investigations
Chapter 23. Targeted Violence Investigations
Chapter 24. Discrimination Investigations
Chapter 1. The Investigative Process
Chapter 2. A Comparison of Public and Private Sectors
Chapter 3. Qualities of the Investigator
Chapter 4. Managing the Investigative Function
PART II. METHODS OF SECURITY INVESTIGATION
Chapter 5. Undercover Investigations
Chapter 6. Surveillance
Chapter 7. Background Investigations
Chapter 8. Discovering Covert Crimes
PART III. BUILDING A CASE
Chapter 9. Interviews and Interrogations
Chapter 10. An Overview of the Interview and Interrogation Process
Chapter 11. Evidence
Chapter 12. Written Statements, Admissions, and Confessions
Chapter 13. The Use of Informants
Chapter 14. Report Writing and Note Taking
PART IV. APPLYING INVESTIGATIVE STRATEGIES
Chapter 15. Problems Arise: The What of Investigation
Chapter 16. Crime and Solution: The How of Investigation
Chapter 17. Identifying Suspects: The Who of Investigation
Chapter 18. Finding Information: The Where of Investigation
Chapter 19. The Time Factor: The When of Investigation
Chapter 20. Establishing Motive: The Why of Investigation
PART V.TECHNOLOGICAL AND SPECIALIZED INVESTIGATIVE TECHNIQUES
Chapter 21. Imagery
Chapter 22. Computers in Private Sector Investigations
Chapter 23. Targeted Violence Investigations
Chapter 24. Discrimination Investigations
Recenzii
"...has something interesting for all readers who work with investigations or just want to know more about the art and science…it should find a well-deserved place on the investigative professional’s bookshelf." --ASIS Dynamics
"...a venerable guide, newly published...covers a wide variety of principles including methods of investigating, building cases, using resources to plug in facts, and employing technology." --Security Letter
"...a venerable guide, newly published...covers a wide variety of principles including methods of investigating, building cases, using resources to plug in facts, and employing technology." --Security Letter