Book description
Detailing best practices and trade secrets for private sector security investigations, Private Security and the Investigative Process, Third Edition provides complete coverage of the investigative process. Fully updated, this edition covers emerging technology, revised legal and practical considerations for conducting interviews, and new inforTable of contents
- Front cover
- Contents (1/2)
- Contents (2/2)
- Preface
- Chapter 1. Introduction to the Private Security Industry and the Investigative Process (1/4)
- Chapter 1. Introduction to the Private Security Industry and the Investigative Process (2/4)
- Chapter 1. Introduction to the Private Security Industry and the Investigative Process (3/4)
- Chapter 1. Introduction to the Private Security Industry and the Investigative Process (4/4)
- Chapter 2. General Characteristics of a Competent Investigator (1/4)
- Chapter 2. General Characteristics of a Competent Investigator (2/4)
- Chapter 2. General Characteristics of a Competent Investigator (3/4)
- Chapter 2. General Characteristics of a Competent Investigator (4/4)
- Chapter 3. Initial Interview and Case Evaluation (1/7)
- Chapter 3. Initial Interview and Case Evaluation (2/7)
- Chapter 3. Initial Interview and Case Evaluation (3/7)
- Chapter 3. Initial Interview and Case Evaluation (4/7)
- Chapter 3. Initial Interview and Case Evaluation (5/7)
- Chapter 3. Initial Interview and Case Evaluation (6/7)
- Chapter 3. Initial Interview and Case Evaluation (7/7)
- Chapter 4. Witnesses (1/4)
- Chapter 4. Witnesses (2/4)
- Chapter 4. Witnesses (3/4)
- Chapter 4. Witnesses (4/4)
- Chapter 5. Collection of Information (1/5)
- Chapter 5. Collection of Information (2/5)
- Chapter 5. Collection of Information (3/5)
- Chapter 5. Collection of Information (4/5)
- Chapter 5. Collection of Information (5/5)
- Chapter 6. Collection of Evidence and Preservation of the Scene (1/12)
- Chapter 6. Collection of Evidence and Preservation of the Scene (2/12)
- Chapter 6. Collection of Evidence and Preservation of the Scene (3/12)
- Chapter 6. Collection of Evidence and Preservation of the Scene (4/12)
- Chapter 6. Collection of Evidence and Preservation of the Scene (5/12)
- Chapter 6. Collection of Evidence and Preservation of the Scene (6/12)
- Chapter 6. Collection of Evidence and Preservation of the Scene (7/12)
- Chapter 6. Collection of Evidence and Preservation of the Scene (8/12)
- Chapter 6. Collection of Evidence and Preservation of the Scene (9/12)
- Chapter 6. Collection of Evidence and Preservation of the Scene (10/12)
- Chapter 6. Collection of Evidence and Preservation of the Scene (11/12)
- Chapter 6. Collection of Evidence and Preservation of the Scene (12/12)
- Chapter 7. Surveillance Techniques (1/6)
- Chapter 7. Surveillance Techniques (2/6)
- Chapter 7. Surveillance Techniques (3/6)
- Chapter 7. Surveillance Techniques (4/6)
- Chapter 7. Surveillance Techniques (5/6)
- Chapter 7. Surveillance Techniques (6/6)
- Chapter 8. Report Writing (1/7)
- Chapter 8. Report Writing (2/7)
- Chapter 8. Report Writing (3/7)
- Chapter 8. Report Writing (4/7)
- Chapter 8. Report Writing (5/7)
- Chapter 8. Report Writing (6/7)
- Chapter 8. Report Writing (7/7)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (1/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (2/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (3/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (4/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (5/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (6/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (7/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (8/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (9/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (10/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (11/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (12/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (13/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (14/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (15/16)
- Chapter 9. Investigative Method and Technique: Theft/Property Offenses (16/16)
- Chapter 12. The Security Office: Administrative Issues (1/5)
- Chapter 12. The Security Office: Administrative Issues (2/5)
- Chapter 12. The Security Office: Administrative Issues (3/5)
- Chapter 12. The Security Office: Administrative Issues (4/5)
- Chapter 12. The Security Office: Administrative Issues (5/5)
- Index
- Back cover
Product information
- Title: Private Security and the Investigative Process, 3rd Edition
- Author(s):
- Release date: February 2010
- Publisher(s): Auerbach Publications
- ISBN: 9781439882658
You might also like
book
Private Security and the Investigative Process, Fourth Edition, 4th Edition
Private Security and the Investigative Process, Fourth Edition targets those students in the early phases of …
book
Investigator and Fraud Fighter Guidebook: Operation War Stories
Get federal investigative insight and guidance on conducting thorough investigations and case-building The ability to conduct …
book
Cargo Theft, Loss Prevention, and Supply Chain Security
You need to determine your company's risk and mitigate their losses. There's little information out there …
book
The Process of Investigation, 4th Edition
The Process of Investigation, Fourth Edition addresses the needs of today’s private sector investigative professional by …