Crime scene management : scene specific methods / / edited by Raul Sutton, Keith Trueman, Christopher Moran |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Chichester, [England] : , : Wiley, , 2017 |
Descrizione fisica | 1 online resource (331 pages) : illustrations |
Disciplina | 363.25/2 |
Soggetto topico |
Crime scene searches
Forensic sciences |
Soggetto genere / forma | Electronic books. |
ISBN | 1-119-18091-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910466120703321 |
Chichester, [England] : , : Wiley, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Crime scene staging : investigating suspect misdirection of the crime scene / / by Arthur S. Chancellor and Grant D. Graham |
Autore | Chancellor Arthur S. |
Pubbl/distr/stampa | Springfield, Illinois : , : Charles C. Thomas Publisher, Ltd, , 2017 |
Descrizione fisica | 1 online resource (371 pages) |
Disciplina | 363.25/2 |
Collana | American Series in Law Enforcement Investigations |
Soggetto topico |
Crime scene searches
Crime scenes Criminal investigation |
ISBN | 0-398-09140-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910154674603321 |
Chancellor Arthur S. | ||
Springfield, Illinois : , : Charles C. Thomas Publisher, Ltd, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The crisis of Britain's surveillance state : security, law enforcement, and the intelligence war in cyberspace / / Musa Khan Jalalzai |
Autore | Jalālza 'ī Mūsá Khān |
Pubbl/distr/stampa | New York : , : Algora Publishing, , 2014 |
Descrizione fisica | 1 online resource (244 p.) |
Disciplina | 363.25/2 |
Soggetto topico |
Electronic surveillance - Great Britain
Terrorism - Great Britain - Prevention |
Soggetto genere / forma | Electronic books. |
ISBN | 1-62894-080-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Introduction; Chapter 1. Britain's Incoherent Approach to National Security; apter 2. The Crisis of State and Security; Chapter 3. Metropolitan Police: Fixing the Window; Chapter 4. Racism, and the Police Department; Chapter 5. Discrimination, Criminal Gangs and Corruption in Borough Councils; Chapter 6. Extremism and Social Stratification; Chapter 7. How NHS Doctors Kill Patients through Liverpool Care Pathway in Britain's Hospitals; Chapter 8. Sectarian Conflict in Northern Ireland; Protestants and Catholics: Segregation ; Chapter 9. Intelligence and Surveillance Mechanisms
Chapter 10. Intelligence War in Cyberspace: The Art of Fighting without FightingChapter 11. The Politics of Intelligence Surveillance in Britain; Chapter 12. Intelligence Cooperation in Afghanistan; Chapter 13. Britain and the Prospect of Nuclear Jihad; Postscript; Appendix 1. The Good Friday Agreement, 10 April 1998; Appendix 2. Five Eyes Intelligence Alliance; Bibliography |
Record Nr. | UNINA-9910465428003321 |
Jalālza 'ī Mūsá Khān | ||
New York : , : Algora Publishing, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The crisis of Britain's surveillance state : security, law enforcement, and the intelligence war in cyberspace / / Musa Khan Jalalzai |
Autore | Jalālza 'ī Mūsá Khān |
Pubbl/distr/stampa | New York : , : Algora Publishing, , 2014 |
Descrizione fisica | 1 online resource (244 p.) |
Disciplina | 363.25/2 |
Soggetto topico |
Electronic surveillance - Great Britain
Terrorism - Great Britain - Prevention |
ISBN | 1-62894-080-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Introduction; Chapter 1. Britain's Incoherent Approach to National Security; apter 2. The Crisis of State and Security; Chapter 3. Metropolitan Police: Fixing the Window; Chapter 4. Racism, and the Police Department; Chapter 5. Discrimination, Criminal Gangs and Corruption in Borough Councils; Chapter 6. Extremism and Social Stratification; Chapter 7. How NHS Doctors Kill Patients through Liverpool Care Pathway in Britain's Hospitals; Chapter 8. Sectarian Conflict in Northern Ireland; Protestants and Catholics: Segregation ; Chapter 9. Intelligence and Surveillance Mechanisms
Chapter 10. Intelligence War in Cyberspace: The Art of Fighting without FightingChapter 11. The Politics of Intelligence Surveillance in Britain; Chapter 12. Intelligence Cooperation in Afghanistan; Chapter 13. Britain and the Prospect of Nuclear Jihad; Postscript; Appendix 1. The Good Friday Agreement, 10 April 1998; Appendix 2. Five Eyes Intelligence Alliance; Bibliography |
Record Nr. | UNINA-9910786891603321 |
Jalālza 'ī Mūsá Khān | ||
New York : , : Algora Publishing, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The crisis of Britain's surveillance state : security, law enforcement, and the intelligence war in cyberspace / / Musa Khan Jalalzai |
Autore | Jalālza 'ī Mūsá Khān |
Pubbl/distr/stampa | New York : , : Algora Publishing, , 2014 |
Descrizione fisica | 1 online resource (244 p.) |
Disciplina | 363.25/2 |
Soggetto topico |
Electronic surveillance - Great Britain
Terrorism - Great Britain - Prevention |
ISBN | 1-62894-080-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Introduction; Chapter 1. Britain's Incoherent Approach to National Security; apter 2. The Crisis of State and Security; Chapter 3. Metropolitan Police: Fixing the Window; Chapter 4. Racism, and the Police Department; Chapter 5. Discrimination, Criminal Gangs and Corruption in Borough Councils; Chapter 6. Extremism and Social Stratification; Chapter 7. How NHS Doctors Kill Patients through Liverpool Care Pathway in Britain's Hospitals; Chapter 8. Sectarian Conflict in Northern Ireland; Protestants and Catholics: Segregation ; Chapter 9. Intelligence and Surveillance Mechanisms
Chapter 10. Intelligence War in Cyberspace: The Art of Fighting without FightingChapter 11. The Politics of Intelligence Surveillance in Britain; Chapter 12. Intelligence Cooperation in Afghanistan; Chapter 13. Britain and the Prospect of Nuclear Jihad; Postscript; Appendix 1. The Good Friday Agreement, 10 April 1998; Appendix 2. Five Eyes Intelligence Alliance; Bibliography |
Record Nr. | UNINA-9910811914303321 |
Jalālza 'ī Mūsá Khān | ||
New York : , : Algora Publishing, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Forensic photography : a practitioner's guide / / Nick Marsh |
Autore | Marsh Nick (Nicholas) |
Pubbl/distr/stampa | Chichester, England : , : Wiley Blackwell, , 2014 |
Descrizione fisica | 392 pages |
Disciplina | 363.25/2 |
Soggetto topico |
Legal photography
Photography - Digital techniques |
ISBN |
1-118-85275-3
1-118-85274-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Forensic Photography; Contents; Foreword; Preface; Reference; Acknowledgements; About the Companion Website; 1 Image Processing; 1.1 Introduction; 1.2 The digital image; 1.3 Image acquisition; 1.4 Colour images; 1.5 The imaging chain and workflow; 1.6 White balance; 1.7 Image histogram; 1.7.1 Levels and grey-picker tools; 1.8 Image processing terminology; 1.9 Digital image processing operations; 1.9.1 Image cropping; 1.9.2 Image resampling (resizing); 1.9.3 Image flipping and rotation; 1.9.4 Linear scales; 1.10 Classes of operations; 1.10.1 Point processing; 1.10.2 Addition
1.10.3 Subtraction1.10.4 Multiplication and division; 1.10.5 The bad news: artefacts; 1.10.6 The good news: versatility; 1.11 Noise reduction; 1.12 Sharpening filters; 1.13 History log; 1.14 Layers; 1.14.1 Adjustment layers and layer masks; 1.14.2 Composite images; 1.15 Bit depth and dynamic range; 1.16 File formats; 1.17 Image compression; 1.18 Image processing at image capture; 1.19 Properties of common formats; 1.20 Image archiving and the audit trail; 1.20.1 Best practice and the audit trail; 1.21 Printing images; 1.22 Image storage; 1.23 Summary; 2 Cameras and Lenses; 2.1 Overview 2.2 Cameras2.3 Exposure; 2.4 ISOs; 2.5 The shutter; 2.6 F-stops and apertures; 2.7 So what is the correct exposure?; 2.8 Metering modes; 2.8.1 Measuring the light; 2.8.2 Camera meters; 2.8.3 Incident light meters; 2.9 Getting the right exposure; 2.10 Dynamic range; 2.11 Depth of field and focus; 2.11.1 Lens choice; 2.11.2 Distance to the subject; 2.11.3 The rule of thirds; 2.11.4 Focus; 2.11.5 Manual focus; 2.12 Lenses; 2.12.1 Focal lengths; Reference; 3 The Use of Flash; 3.1 How does it work?; 3.2 Guide numbers; 3.2.1 What is the guide number?; 3.3 Flash modes; 3.3.1 Manual mode 3.4 The inverse square law (ISL)3.4.1 The ISL (long version); 3.4.2 The ISL short version; 3.4.3 Automatic; 3.4.4 Through The Lens metered flash (TTL); 3.4.5 Other settings; 3.5 The practical application of flash; 3.5.1 Flash only; 3.5.2 Open flash; 3.5.3 Fill in flash; 3.6 Types of flash; 3.6.1 Hammerhead units; 3.6.2 Ring flash; 3.6.3 Semi ring flashes; 3.6.4 Studio flash; 4 Crime Scene Photography; 4.1 Overview; 4.1.1 What are we being asked to photograph?; 4.1.2 When do I take photographs?; 4.1.3 How will I take the photographs?; 4.2 Personal protective equipment (PPE) 4.2.1 Stepping plates4.3 The generics of scene photography; 4.3.1 Sunshine; 4.3.2 Rain; 4.3.3 Wind; 4.3.4 Fog; 4.3.5 Snow; 4.3.6 Cold; 4.4 Photographic equipment; 4.5 Composition; 4.5.1 Interiors; 4.6 Specific types of scenes; 4.6.1 Motor vehicles; 4.6.2 Assault victims; 4.6.3 Prisoners; 4.6.4 Property; 4.6.5 Fire damaged scenes; 4.6.6 RTC (Road Traffic Collisions); 4.6.7 Homicides and postmortems (PM); 4.7 Appendix 1: Trouble-shooting; References; 5 Light as a Forensic Photographers Tool; 5.1 Overview of alternative light sources (ALS); 5.2 The Electromagnetic Spectrum (EMS) 5.3 Fluorescence |
Record Nr. | UNINA-9910132175203321 |
Marsh Nick (Nicholas) | ||
Chichester, England : , : Wiley Blackwell, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Forensic radio survey techniques for cell site analysis / / Joseph Hoy, Forensic Analytics Ltd., UK |
Autore | Hoy Joseph |
Pubbl/distr/stampa | Chichester, West, Sussex, United Kingdom : , : Wiley, , 2015 |
Descrizione fisica | 1 online resource (401 p.) |
Disciplina | 363.25/2 |
Soggetto topico |
Mobile device forensics
Electronic evidence Computer networks Electronics in criminal investigation |
ISBN |
1-118-92575-0
1-118-92576-9 1-118-92574-2 |
Classificazione | TEC061000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
-- About the Author xvii -- Preface xix -- Acknowledgements xxi -- Glossary xxiii -- 1 Forensic Radio Surveys for Cell Site Analysis 1 -- 1.1 Cell Site Analysis 1 -- 1.2 Forensic Radio Surveying 1 -- 2 Radio Theory 3 -- 2.1 RF Propagation 3 -- 2.2 Carrying Information on a Radio Signal 10 -- 2.3 Radio Spectrum 13 -- 2.4 RF Measurements 16 -- Note 23 -- References 23 -- 3 Wireless Technologies and Deployments 25 -- 3.1 Coordinating Cellular Development 25 -- 3.2 Evolution from 0G to 4G 26 -- 3.3 3GPP Network Types 30 -- 3.4 3GPP2 Network Types 31 -- 3.5 Other Types of Network 32 -- 3.6 Deployed Technologies by Region 34 -- 3.7 Commonly-used Frequency Bands by Region 36 -- References 36 -- 4 Cellular Theory 37 -- 4.1 Pre-cellular Radiotelephone Networks 37 -- 4.2 Radio Cells 38 -- 4.3 Frequency Reuse 40 -- 4.4 Cell Size and Coverage 41 -- 4.5 Duplex Techniques 43 -- 4.6 Multiple Access Techniques 44 -- 4.7 Generic Network Architecture 46 -- 4.8 Mobile Devices 47 -- 4.9 Radio Access Networks 48 -- 4.10 Core Networks 51 -- 4.11 Subscriber and Device Identifiers 52 -- 4.12 Network Databases 57 -- 4.13 Cell Sites 59 -- 4.14 Antennas and Azimuths 66 -- 4.15 Uptilt and Downtilt 68 -- 4.16 Cell Types and Sizes 69 -- 4.17 Cell Site Types and Uses 70 -- 4.18 Single and Multi Frequency Networks 71 -- 4.19 Cell Coverage Concepts 74 -- 4.20 Small Cells and Closed Subscriber Groups 77 -- 4.21 Network Activities 78 -- 4.22 Idle Mode and Connected Mode 83 -- 4.23 Cell Access Control 87 -- 4.24 Location Updating (Idle Mode Mobility) 89 -- 4.25 Handover (Connected Mode Mobility) 91 -- References 92 -- 5 3GPP Network Types 93 -- 5.1 2G GSM Networks 94 -- 5.2 3G UMTS/HSPA Networks 111 -- 5.3 4G LTE Networks 130 -- References 146 -- 6 Other Cellular Network Types 149 -- 6.1 2G IS-95/cdmaOne 149 -- 6.2 3G IS-2000/CDMA2000 1xRTT 150 -- 6.3 3G CDMA2000 EV-DO 163 -- 6.4 Surveying Other Technologies 165 -- References 173 -- 7 Forensic Radio Surveys 175 -- 7.1 Forensic Radio Survey Objectives 175.
7.2 Forensic Radio Survey Terminology 175 -- 7.3 Forensic Radio Survey Types and Techniques 176 -- 7.4 Idle Mode versus Connected Mode Surveys 187 -- 7.5 Additional Survey Techniques 196 -- 7.6 Survey Preparation 201 -- 7.7 Typical Survey Actions and Procedures 205 -- 7.8 Survey Results: Checking and Confirmation 217 -- 7.9 Survey Notes and Progress Maps 220 -- 7.10 Survey Equipment Types 221 -- 7.11 Raw Survey Results 225 -- 7.12 Processing Survey Results 230 -- 7.13 Understanding Survey Results 239 -- 7.14 Storage of Survey Data 245 -- 7.15 Quality and Best Practice 248 / /7.16 Summary of Typical Survey Results 252 -- References 254 -- 8 Cell Site Analysis 255 -- 8.1 Cell Site Concepts 256 -- 8.2 Uses and Limitations of Cell Site Evidence 257 -- 8.3 Regulation of Cell Site Analysis 264 -- 8.4 Components of Cell Site Analysis 265 -- 8.5 Call Detail Records 265 -- 8.6 Sources of Cellular Coverage Data 276 -- 8.7 Forensic Radio Surveys 278 -- 8.8 Cell Site Reports 279 -- 8.9 Call Schedules 285 -- 8.10 Maps and Graphics 286 -- 8.11 Report Checking and Peer Review 289 -- 8.12 Professional and Expert Witnesses 290 -- 8.13 Court Presentations 293 -- References 296 -- 9 Summary and Practical Activities 297 -- 9.1 Radio and Cellular Concepts 297 -- 9.2 Cellular Identifiers 301 -- 9.3 Cellular Network Types 307 -- 9.4 Forensic Radio Surveys 312 -- 9.5 Survey Results: Checking and Confirmation 321 -- 9.6 Survey Notes and Progress Maps 322 -- 9.7 Survey Results 323 -- 9.8 Cell Site Analysis 330 -- 9.9 End-to-End Process 335 -- 9.10 Master List of Events/Locations 336 -- 9.11 Source Files Attribution List 336 -- 9.12 Normalise Call Data into a Standard Format 337 -- 9.13 Create a Master Cell List 344 -- 9.14 Creating a Case Master Map 345 -- 9.15 Compile Radio Survey Summary Tables 347 -- 9.16 Creating Call and Cell Labels 355 -- 9.17 Cell Site Mapping Presentations 358 -- 9.18 Summary 360 -- References 361 -- Index 363. |
Record Nr. | UNINA-9910132309703321 |
Hoy Joseph | ||
Chichester, West, Sussex, United Kingdom : , : Wiley, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Forensic radio survey techniques for cell site analysis / / Joseph Hoy, Forensic Analytics Ltd., UK |
Autore | Hoy Joseph |
Pubbl/distr/stampa | Chichester, West, Sussex, United Kingdom : , : Wiley, , 2015 |
Descrizione fisica | 1 online resource (401 p.) |
Disciplina | 363.25/2 |
Soggetto topico |
Mobile device forensics
Electronic evidence Computer networks Electronics in criminal investigation |
ISBN |
1-118-92575-0
1-118-92576-9 1-118-92574-2 |
Classificazione | TEC061000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
-- About the Author xvii -- Preface xix -- Acknowledgements xxi -- Glossary xxiii -- 1 Forensic Radio Surveys for Cell Site Analysis 1 -- 1.1 Cell Site Analysis 1 -- 1.2 Forensic Radio Surveying 1 -- 2 Radio Theory 3 -- 2.1 RF Propagation 3 -- 2.2 Carrying Information on a Radio Signal 10 -- 2.3 Radio Spectrum 13 -- 2.4 RF Measurements 16 -- Note 23 -- References 23 -- 3 Wireless Technologies and Deployments 25 -- 3.1 Coordinating Cellular Development 25 -- 3.2 Evolution from 0G to 4G 26 -- 3.3 3GPP Network Types 30 -- 3.4 3GPP2 Network Types 31 -- 3.5 Other Types of Network 32 -- 3.6 Deployed Technologies by Region 34 -- 3.7 Commonly-used Frequency Bands by Region 36 -- References 36 -- 4 Cellular Theory 37 -- 4.1 Pre-cellular Radiotelephone Networks 37 -- 4.2 Radio Cells 38 -- 4.3 Frequency Reuse 40 -- 4.4 Cell Size and Coverage 41 -- 4.5 Duplex Techniques 43 -- 4.6 Multiple Access Techniques 44 -- 4.7 Generic Network Architecture 46 -- 4.8 Mobile Devices 47 -- 4.9 Radio Access Networks 48 -- 4.10 Core Networks 51 -- 4.11 Subscriber and Device Identifiers 52 -- 4.12 Network Databases 57 -- 4.13 Cell Sites 59 -- 4.14 Antennas and Azimuths 66 -- 4.15 Uptilt and Downtilt 68 -- 4.16 Cell Types and Sizes 69 -- 4.17 Cell Site Types and Uses 70 -- 4.18 Single and Multi Frequency Networks 71 -- 4.19 Cell Coverage Concepts 74 -- 4.20 Small Cells and Closed Subscriber Groups 77 -- 4.21 Network Activities 78 -- 4.22 Idle Mode and Connected Mode 83 -- 4.23 Cell Access Control 87 -- 4.24 Location Updating (Idle Mode Mobility) 89 -- 4.25 Handover (Connected Mode Mobility) 91 -- References 92 -- 5 3GPP Network Types 93 -- 5.1 2G GSM Networks 94 -- 5.2 3G UMTS/HSPA Networks 111 -- 5.3 4G LTE Networks 130 -- References 146 -- 6 Other Cellular Network Types 149 -- 6.1 2G IS-95/cdmaOne 149 -- 6.2 3G IS-2000/CDMA2000 1xRTT 150 -- 6.3 3G CDMA2000 EV-DO 163 -- 6.4 Surveying Other Technologies 165 -- References 173 -- 7 Forensic Radio Surveys 175 -- 7.1 Forensic Radio Survey Objectives 175.
7.2 Forensic Radio Survey Terminology 175 -- 7.3 Forensic Radio Survey Types and Techniques 176 -- 7.4 Idle Mode versus Connected Mode Surveys 187 -- 7.5 Additional Survey Techniques 196 -- 7.6 Survey Preparation 201 -- 7.7 Typical Survey Actions and Procedures 205 -- 7.8 Survey Results: Checking and Confirmation 217 -- 7.9 Survey Notes and Progress Maps 220 -- 7.10 Survey Equipment Types 221 -- 7.11 Raw Survey Results 225 -- 7.12 Processing Survey Results 230 -- 7.13 Understanding Survey Results 239 -- 7.14 Storage of Survey Data 245 -- 7.15 Quality and Best Practice 248 / /7.16 Summary of Typical Survey Results 252 -- References 254 -- 8 Cell Site Analysis 255 -- 8.1 Cell Site Concepts 256 -- 8.2 Uses and Limitations of Cell Site Evidence 257 -- 8.3 Regulation of Cell Site Analysis 264 -- 8.4 Components of Cell Site Analysis 265 -- 8.5 Call Detail Records 265 -- 8.6 Sources of Cellular Coverage Data 276 -- 8.7 Forensic Radio Surveys 278 -- 8.8 Cell Site Reports 279 -- 8.9 Call Schedules 285 -- 8.10 Maps and Graphics 286 -- 8.11 Report Checking and Peer Review 289 -- 8.12 Professional and Expert Witnesses 290 -- 8.13 Court Presentations 293 -- References 296 -- 9 Summary and Practical Activities 297 -- 9.1 Radio and Cellular Concepts 297 -- 9.2 Cellular Identifiers 301 -- 9.3 Cellular Network Types 307 -- 9.4 Forensic Radio Surveys 312 -- 9.5 Survey Results: Checking and Confirmation 321 -- 9.6 Survey Notes and Progress Maps 322 -- 9.7 Survey Results 323 -- 9.8 Cell Site Analysis 330 -- 9.9 End-to-End Process 335 -- 9.10 Master List of Events/Locations 336 -- 9.11 Source Files Attribution List 336 -- 9.12 Normalise Call Data into a Standard Format 337 -- 9.13 Create a Master Cell List 344 -- 9.14 Creating a Case Master Map 345 -- 9.15 Compile Radio Survey Summary Tables 347 -- 9.16 Creating Call and Cell Labels 355 -- 9.17 Cell Site Mapping Presentations 358 -- 9.18 Summary 360 -- References 361 -- Index 363. |
Record Nr. | UNINA-9910821405703321 |
Hoy Joseph | ||
Chichester, West, Sussex, United Kingdom : , : Wiley, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The intensification of surveillance [[electronic resource] ] : crime, terrorism and warfare in the information age / / edited by Kirstie Ball and Frank Webster |
Edizione | [1st ed.] |
Pubbl/distr/stampa | London ; ; Sterling, Va., : Pluto Press, c2003 |
Descrizione fisica | vii, 176 p |
Disciplina | 363.25/2 |
Altri autori (Persone) |
BallKirstie
WebsterFrank |
Soggetto topico |
Privacy, Right of
Electronic surveillance - Social aspects Social control War on Terrorism, 2001-2009 |
Soggetto genere / forma | Electronic books. |
ISBN |
1-84964-174-9
0-585-48957-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The intensification of surveillance / Kirstie Ball and Frank Webster -- Surveillance after September 11th / David Lyon -- Data-mining and surveillance in the post 9-11 environment / Oscar Gandy -- Joined-up surveillance? / Charles Raab -- 'They don't even know we're there': the electronic monitoring of offenders in England and Wales / Mike Nellis -- Information warfare, surveillance and human rights / Frank Webster -- Mapping out cybercrimes in a cyberspatial surveillant assemblage / David Wall. |
Record Nr. | UNINA-9910455740603321 |
London ; ; Sterling, Va., : Pluto Press, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The intensification of surveillance [[electronic resource] ] : crime, terrorism and warfare in the information age / / edited by Kirstie Ball and Frank Webster |
Edizione | [1st ed.] |
Pubbl/distr/stampa | London ; ; Sterling, Va., : Pluto Press, c2003 |
Descrizione fisica | vii, 176 p |
Disciplina | 363.25/2 |
Altri autori (Persone) |
BallKirstie
WebsterFrank |
Soggetto topico |
Privacy, Right of
Electronic surveillance - Social aspects Social control War on Terrorism, 2001-2009 |
ISBN |
1-84964-174-9
0-585-48957-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The intensification of surveillance / Kirstie Ball and Frank Webster -- Surveillance after September 11th / David Lyon -- Data-mining and surveillance in the post 9-11 environment / Oscar Gandy -- Joined-up surveillance? / Charles Raab -- 'They don't even know we're there': the electronic monitoring of offenders in England and Wales / Mike Nellis -- Information warfare, surveillance and human rights / Frank Webster -- Mapping out cybercrimes in a cyberspatial surveillant assemblage / David Wall. |
Record Nr. | UNINA-9910780210003321 |
London ; ; Sterling, Va., : Pluto Press, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|