All too often, police called to the scene of a water-related death may consider it an accidental drowning before they even arrive. But the investigation of these types of deaths requires the same careful and thorough documentation as in other potentially non-natural deaths and these efforts must be carried through all stages of investigation....
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...
This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic...
Jack the Ripper and legacy codebases have more in common than you'd think. Inspired by forensic psychology methods, you'll learn strategies to predict the future of your codebase, assess refactoring direction, and understand how your team influences the design. With its unique blend of forensic psychology and code analysis, this book...
The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements “traditional” scientific...
Personality Disorder (PD) is one of the most difficult psychological conditions to classify and treat and in the past literature on the subject has tended to neglect the invaluable viewpoint of sufferers themselves. Drawing on extensive research carried out in conjunction with service users, Heather Castillo seeks to adjust this imbalance and...
A comprehensive review of the science of drug testing in all its aspects, placing emphasis on technologies that use body fluids other than urine for determining the presence of drugs of abuse. The authors discuss the various body fluid specimens suitable for testing for illicit drugs-particularly saliva, sweat, and hair-describe the...
Advanced Crime Scene Photography developed over time and out of my
experiences as a crime scene investigator with a large metropolitan police
department. Like any major city, violent crime is prevalent, offering numerous
opportunities to utilize the different skills and techniques learned and
evolved through numerous schools, scene...
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use...
As the number of forensic science and forensic chemistry degree programs has increased over the last few years, Forensic Chemistry was the first book to specifically address this rapidly growing field. It introduces the principal areas of study from the perspective of analytical chemistry, addressing the legal context in which forensic...