Reference Hub2
Crime Prevention Technologies and Applications for Advancing Criminal Investigation

Crime Prevention Technologies and Applications for Advancing Criminal Investigation

Copyright: © 2012 |Pages: 348
ISBN13: 9781466617582|ISBN10: 1466617586|EISBN13: 9781466617599
DOI: 10.4018/978-1-4666-1758-2
Cite Book Cite Book

MLA

Li, Chang-Tsun, and Anthony T.S. Ho, editors. Crime Prevention Technologies and Applications for Advancing Criminal Investigation. IGI Global, 2012. https://doi.org/10.4018/978-1-4666-1758-2

APA

Li, C. & Ho, A. T. (Eds.). (2012). Crime Prevention Technologies and Applications for Advancing Criminal Investigation. IGI Global. https://doi.org/10.4018/978-1-4666-1758-2

Chicago

Li, Chang-Tsun, and Anthony T.S. Ho, eds. Crime Prevention Technologies and Applications for Advancing Criminal Investigation. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-1758-2

Export Reference

Mendeley
Favorite Full-Book Download

The tools of crime constantly evolve, and law enforcement and forensic investigators must understand advanced forensic techniques to ensure that the most complete evidence is brought to trial. Paramount also the need for investigators to ensure that evidence adheres to the boundaries of the legal system, a place where policy often lags behind new innovations.

Crime Prevention Technologies and Applications for Advancing Criminal Investigation addresses the use of electronic devices and software for crime prevention, investigation, and the application of a broad spectrum of sciences to answer questions of interest to the legal system. This book fosters a forum for advancing research and development of the theory and practice of digital crime prevention and forensics.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Multimedia Forensics Based on Intrinsic Data
This content has been removed at the discretion of the publisher and the editors.
Multimedia Security Based on Extrinsic Data
This content has been removed at the discretion of the publisher and the editors.
Applications of Cryptography in Digital Forensics
This content has been removed at the discretion of the publisher and the editors.
Applications of Pattern Recognition and Signal Processing Techniques to Digital Forensics
This content has been removed at the discretion of the publisher and the editors.
Chapter 5
Digital Evidence  (pages 215-215)
Digital Evidence
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.