Private Security and the Investigative Process, 3rd Edition

Book description

Detailing best practices and trade secrets for private sector security investigations, Private Security and the Investigative Process, Third Edition provides complete coverage of the investigative process. Fully updated, this edition covers emerging technology, revised legal and practical considerations for conducting interviews, and new infor

Table of contents

  1. Front cover
  2. Contents (1/2)
  3. Contents (2/2)
  4. Preface
  5. Chapter 1. Introduction to the Private Security Industry and the Investigative Process (1/4)
  6. Chapter 1. Introduction to the Private Security Industry and the Investigative Process (2/4)
  7. Chapter 1. Introduction to the Private Security Industry and the Investigative Process (3/4)
  8. Chapter 1. Introduction to the Private Security Industry and the Investigative Process (4/4)
  9. Chapter 2. General Characteristics of a Competent Investigator (1/4)
  10. Chapter 2. General Characteristics of a Competent Investigator (2/4)
  11. Chapter 2. General Characteristics of a Competent Investigator (3/4)
  12. Chapter 2. General Characteristics of a Competent Investigator (4/4)
  13. Chapter 3. Initial Interview and Case Evaluation (1/7)
  14. Chapter 3. Initial Interview and Case Evaluation (2/7)
  15. Chapter 3. Initial Interview and Case Evaluation (3/7)
  16. Chapter 3. Initial Interview and Case Evaluation (4/7)
  17. Chapter 3. Initial Interview and Case Evaluation (5/7)
  18. Chapter 3. Initial Interview and Case Evaluation (6/7)
  19. Chapter 3. Initial Interview and Case Evaluation (7/7)
  20. Chapter 4. Witnesses (1/4)
  21. Chapter 4. Witnesses (2/4)
  22. Chapter 4. Witnesses (3/4)
  23. Chapter 4. Witnesses (4/4)
  24. Chapter 5. Collection of Information (1/5)
  25. Chapter 5. Collection of Information (2/5)
  26. Chapter 5. Collection of Information (3/5)
  27. Chapter 5. Collection of Information (4/5)
  28. Chapter 5. Collection of Information (5/5)
  29. Chapter 6. Collection of Evidence and Preservation of the Scene (1/12)
  30. Chapter 6. Collection of Evidence and Preservation of the Scene (2/12)
  31. Chapter 6. Collection of Evidence and Preservation of the Scene (3/12)
  32. Chapter 6. Collection of Evidence and Preservation of the Scene (4/12)
  33. Chapter 6. Collection of Evidence and Preservation of the Scene (5/12)
  34. Chapter 6. Collection of Evidence and Preservation of the Scene (6/12)
  35. Chapter 6. Collection of Evidence and Preservation of the Scene (7/12)
  36. Chapter 6. Collection of Evidence and Preservation of the Scene (8/12)
  37. Chapter 6. Collection of Evidence and Preservation of the Scene (9/12)
  38. Chapter 6. Collection of Evidence and Preservation of the Scene (10/12)
  39. Chapter 6. Collection of Evidence and Preservation of the Scene (11/12)
  40. Chapter 6. Collection of Evidence and Preservation of the Scene (12/12)
  41. Chapter 7. Surveillance Techniques (1/6)
  42. Chapter 7. Surveillance Techniques (2/6)
  43. Chapter 7. Surveillance Techniques (3/6)
  44. Chapter 7. Surveillance Techniques (4/6)
  45. Chapter 7. Surveillance Techniques (5/6)
  46. Chapter 7. Surveillance Techniques (6/6)
  47. Chapter 8. Report Writing (1/7)
  48. Chapter 8. Report Writing (2/7)
  49. Chapter 8. Report Writing (3/7)
  50. Chapter 8. Report Writing (4/7)
  51. Chapter 8. Report Writing (5/7)
  52. Chapter 8. Report Writing (6/7)
  53. Chapter 8. Report Writing (7/7)
  54. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (1/16)
  55. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (2/16)
  56. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (3/16)
  57. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (4/16)
  58. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (5/16)
  59. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (6/16)
  60. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (7/16)
  61. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (8/16)
  62. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (9/16)
  63. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (10/16)
  64. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (11/16)
  65. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (12/16)
  66. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (13/16)
  67. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (14/16)
  68. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (15/16)
  69. Chapter 9. Investigative Method and Technique: Theft/Property Offenses (16/16)
  70. Chapter 12. The Security Office: Administrative Issues (1/5)
  71. Chapter 12. The Security Office: Administrative Issues (2/5)
  72. Chapter 12. The Security Office: Administrative Issues (3/5)
  73. Chapter 12. The Security Office: Administrative Issues (4/5)
  74. Chapter 12. The Security Office: Administrative Issues (5/5)
  75. Index
  76. Back cover

Product information

  • Title: Private Security and the Investigative Process, 3rd Edition
  • Author(s): Charles P. Nemeth, Lisa Dennis
  • Release date: February 2010
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439882658