Practical Bomb Scene Investigation, Third Edition: Edition 3

CRC Press
Free sample

Now in its Third Edition, Practical Bomb Scene Investigation explores the investigative process that improvised explosive device (IED) specialists undertake at the scene of an explosion. Providing easy-to-understand, step-by-step procedures for managing and processing a bomb scene, it enables investigators to find the evidence and then make sense of what is found. The book is not only a roadmap on how to find and collect evidence and assess the scene, but also provides instruction on identifying the bombmaker's signature through latent print, DNA, explosive residue, metallurgical, and toolmark examination and forensic analysis.
Read more

About the author

James T. Thurman

has worked in the explosives field for more than 30 years, first as a U.S. Army bomb disposal technician and then as a special agent with the FBI. He continues to lecture and provide training on the methods of bomb scene investigation and explosives avoidance to domestic and international training schools and audiences. He is currently a professor at the Eastern Kentucky University, teaching a unique academic program on fire, arson, and explosion investigation. He holds a BA from Eastern Kentucky University and an MS Degree in Forensic Science from the George Washington University.
Read more
Loading...

Additional Information

Publisher
CRC Press
Read more
Published on
Apr 7, 2017
Read more
Pages
532
Read more
ISBN
9781351857611
Read more
Language
English
Read more
Genres
Law / Forensic Science
Political Science / Terrorism
Read more
Content Protection
This content is DRM protected.
Read more
Read Aloud
Available on Android devices
Read more
Eligible for Family Library

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but dont know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.
Val McDermid is one of the finest crime writers we have, whose novels have captivated millions of readers worldwide with their riveting narratives of characters who solve complex crimes and confront unimaginable evil. In the course of researching her bestselling novels McDermid has become familiar with every branch of forensics, and now she uncovers the history of this science, real-world murders and the people who must solve them.

The dead talk—to the right listener. They can tell us all about themselves: where they came from, how they lived, how they died, and, of course, who killed them. Forensic scientists can unlock the mysteries of the past and help serve justice using the messages left by a corpse, a crime scene, or the faintest of human traces. Forensics draws on interviews with some of these top-level professionals, ground-breaking research, and McDermid’s own original interviews and firsthand experience on scene with top forensic scientists.

Along the way, McDermid discovers how maggots collected from a corpse can help determine one’s time of death; how a DNA trace a millionth the size of a grain of salt can be used to convict a killer; and how a team of young Argentine scientists led by a maverick American anthropologist were able to uncover the victims of a genocide. It’s a journey that will take McDermid to war zones, fire scenes, and autopsy suites, and bring her into contact with both extraordinary bravery and wickedness, as she traces the history of forensics from its earliest beginnings to the cutting-edge science of the modern day.
Digital Evidence and Computer Crime, Third Edition, provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation.

It offers a thorough explanation of how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In particular, it addresses the abuse of computer networks as well as privacy and security issues on computer networks.

This updated edition is organized into five parts. Part 1 is about digital forensics and covers topics ranging from the use of digital evidence in the courtroom to cybercrime law. Part 2 explores topics such as how digital investigations are conducted, handling a digital crime scene, and investigative reconstruction with digital evidence. Part 3 deals with apprehending offenders, whereas Part 4 focuses on the use of computers in digital investigation. The book concludes with Part 5, which includes the application of forensic science to networks.

New to this edition are updated information on dedicated to networked Windows, Unix, and Macintosh computers, as well as Personal Digital Assistants; coverage of developments in related technology and tools; updated language for search warrant and coverage of legal developments in the US impacting computer forensics; and discussion of legislation from other countries to provide international scope. There are detailed case examples that demonstrate key concepts and give students a practical/applied understanding of the topics, along with ancillary materials that include an Instructor's Manual and PowerPoint slides.

This book will prove valuable to computer forensic students and professionals, lawyers, law enforcement, and government agencies (IRS, FBI, CIA, CCIPS, etc.).

Named The 2011 Best Digital Forensics Book by InfoSec ReviewsProvides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence Features coverage of the abuse of computer networks and privacy and security issues on computer networks
From TV’s CSI to bestsellers by Patricia Cornwell and Kathy Reichs, interest in forensics is at an all-time high. Now one of our most respected forensic pathologists gives a behind-the-scenes look at eleven of his most notorious cases, cracked by scientific analysis and Sherlock Holmesian deduction.

As chief medical examiner of Rockland County, New York, for almost thirty-five years, Dr. Frederick Zugibe literally wrote the book on the subject—his widely used textbook is considered the definitive text. Over the years he has pioneered countless innovations, including the invention of a formula to soften mummified fingers—enabling fingerprinting, and thus identification, of a long-deceased victim. He has appeared as an expert hundreds of times in the media and in the courtroom—and not once has a jury failed to accept his testimony over opposing expert witnesses. And now, in Dissecting Death, he has opened the door to the world of forensic pathology in all its gruesome and fascinating mystery.

Dr. Zugibe takes us through the process all good pathologists follow, using eleven of his most challenging cases. With him, we visit the often grisly—though sometimes shockingly banal—crime scene. We inspect the body, palpate the wounds, search for clues in the hair and skin. We employ ultraviolet light, strange measuring devices, optical instruments. We see how a forensic pathologist determines the hour of death, the type of weapon used, the killer’s escape route. And then we enter the lab, the world of high-tech criminal detection: DNA testing, fingerprinting, gunshot patterns, dental patterns, X-rays.

But not every case ends in a conviction, and in a closing chapter Dr. Zugibe examines some recent high-profile cases in which blunders led to killers going free, either because the wrong party was brought to trial or because the evidence presented didn’t do the trick—including Jon-Benet Ramsey’s murder and, of course, the O.J. Simpson trial.
©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.