Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Continue readingThis book is the second volume in the anual series produced by the International Federation for Information Processing (IFIP) ...
Continue readingAdvances in Digital Forensics IV describes original research results and innovative applications in the emerging discipline ...
Continue readingThis book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
Continue readingThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information ...
Continue readingThis book delves into the widely held belief that the 21st century will be the "Asian Century" by examining the Asia's ...
Continue readingThe book includes a legal overview of European asylum determination procedures, followed by sections on the diverse actors ...
Continue readingThis book examines everyday practices in an asylum administration. Asylum decisions are often criticised as being ‘subjective’ ...
Continue readingBlood Traces provides an authoritative resource that reviews many of the aspects of the interpretation of blood traces that ...
Continue readingBorders, Mobility and Technologies of Control provides a model of criminological inquiry that is global in scope, constructionist ...
Continue readingThis book provides the most in-depth study of capital punishment in Scotland between the mid-eighteenth and early nineteenth ...
Continue readingThis edited collection explores the background and implementation of the Nordic Barnahus (or 'Children's House') model ...
Continue readingThis Brief presents new approaches and innovative challenges to address bringing technology into community-oriented policing ...
Continue readingThe book examines how we might develop a more socially just psychological theory and practice, which is both systems work ...
Continue readingThis book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, ...
Continue readingSecurity is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent ...
Continue readingThe comparative study documented here was supported by the Fritz-Thyssen Foundation and the European Commission. It examined ...
Continue readingThis brief sheds light on evolving drug markets and the county lines phenomenon in the British context. Drawing upon empirical ...
Continue readingThis paper presents a comprehensive crime detection system that uses a combination of hardware and software to monitor homes ...
Continue readingCrimean-Congo hemorrhagic fever (CCHF) is a tick-borne disease associated with severe hemorrhagic manifestations. CCHF has ...
Continue reading