Search:

Dangerous personalities : an FBI profiler shows how to identify and protect yourself from harmful people / by Navarro, Joe,1953-; Poynter, Toni Sciarra.;
Includes bibliographical references (pages 223-237) and index.It's all about me : the narcissistic personality -- Fasten your seat belts : the emotionally unstable personality -- Trust no one and you'll never get hurt : the paranoid personality -- What's mine is mine and what's yours is mine : the predator -- One is bad; two is terrible; three is lethal : combination personalities -- Self-defense against dangerous personalities.Shows readers how to identify the four most common dangerous personalities and analyze how much of a threat each personality can be, and describes how to recover from trauma caused by others with destructive personalities. --Publisher's description.
Subjects: Crime prevention.; Criminals.; Crime.; Psychopaths.; Antisocial personality disorders.;
Available copies: 1 / Total copies: 1
unAPI

Surviving mass victim attacks : what to do when the unthinkable happens / by Jackson, Gary M.;
Includes bibliographical references and index.Understanding past attacks to know how to survive -- Recognize warning signs -- Know how to react when caught in an actual attack -- Surviving by escaping -- Surviving by hiding and staying in place -- Surviving by attacking the attacker: a last resort? -- The need for a personal protection plan -- Your personal security plan: generic information -- Your personal security plan: specific tips -- Surviving with psychological trauma -- How to prevent mass victim attacks -- Successful prevention.While nobody ever dreams they could personally be caught in a situation with mass casualties or injuries due to premeditated or random violence, this guide provides readiness techniques to help avoid becoming a victim in dangerous situations. Includes tips to boost awareness and possibly even stop a violent event before it starts.
Subjects: Violent crimes; Mass murder; Terrorism; Self-defense.; Self-preservation.;
Available copies: 1 / Total copies: 1
unAPI

Crimedotcom : from viruses to vote rigging, how hacking went global / by White, Geoff,(Journalist),author.;
Meet the hackers -- Fall of the Berlin firewall -- Ocean's 11 dot com -- Digital extortion -- Your data for sale -- Beyond the dark web -- The Internet hate machine -- Lights out -- Weaponizing data -- Hack the vote.In this book, investigative journalist Geoff White charts the astonishing development of hacking, from its conception in the United States' hippy tech community in the 1970s, through its childhood among the ruins of the Eastern Bloc, to its coming of age as one of the most dangerous and pervasive threats to our connected world. He takes us inside the workings of real-life cybercrimes, drawing on interviews with those behind the most devastating hacks and revealing how the tactics employed by high-tech crooks to make millions are being harnessed by nation states to target voters, cripple power networks, and even prepare for cyber-war
Subjects: Computer crimes.; Computer security.; Computer crimes; Internet.;
Available copies: 1 / Total copies: 1
unAPI

The collapse of American criminal justice / by Stuntz, William J.;
Includes bibliographical references and index.Introduction: the rule of too much law -- Crime and punishment -- Two migrations -- "The wolf by the ear" -- The past -- Ideals and institutions -- The Fourteenth Amendment's failed promise -- Criminal justice in the gilded age -- A culture war and its aftermath -- Constitutional law's rise, three roads not taken -- Earl Warren's errors -- The rise and fall of crime, the fall and rise of criminal punishment -- The future -- Fixing a broken system -- Epilogue: taming the wolf -- Note on sources and citation form.The rule of law has vanished in America's criminal justice system. Prosecutors now decide whom to punish and how severely. Almost no one accused of a crime will ever face a jury. Inconsistent policing, rampant plea bargaining, overcrowded courtrooms, and ever more draconian sentencing have produced a gigantic prison population, with black citizens the primary defendants and victims of crime. In this passionately argued book, the leading criminal law scholar of his generation looks to history for the roots of these problems -- and for their solutions. The Collapse of American Criminal Justice takes us deep into the dramatic history of American crime -- bar fights in nineteenth-century Chicago, New Orleans bordellos, Prohibition, and decades of murderous lynching. Digging into these crimes and the strategies that attempted to control them, Stuntz reveals the costs of abandoning local democratic control. The system has become more centralized, with state legislators and federal judges given increasing power. The liberal Warren Supreme Court's emphasis on procedures, not equity, joined hands with conservative insistence on severe punishment to create a system that is both harsh and ineffective. What would get us out of this Kafkaesque world? More trials with local juries; laws that accurately define what prosecutors seek to punish; and an equal protection guarantee like the one that died in the 1870s, to make prosecution and punishment less discriminatory. Above all, Stuntz eloquently argues, Americans need to remember again that criminal punishment is a necessary but terrible tool, to use effectively, and sparingly. - Publisher.
Subjects: Crime prevention; Criminal justice, Administration of;
© c2011., Belknap Press of Harvard University Press,
Available copies: 1 / Total copies: 1
unAPI

The future of violence : robots and germs, hackers and drones : confronting a new age of threat / by Wittes, Benjamin.; Blum, Gabriella.;
"From drone warfare in the Middle East to the NSA digital spying, the U.S. government has harnessed the power of cutting-edge technology to terrible effect. But what happens when ordinary people have the same tools at their fingertips? Benjamin Wittes and Gabriella Blum reveal that this new world is nearly upon us. Soon, our neighbors will be building armed drones capable of firing a million rounds a minute and cooking powerful viruses based on recipes found online. These new technologies will threaten not only our lives but the very foundation of the modern nation state. Wittes and Blum counterintuitively argue that only by increasing surveillance and security efforts will national governments be able to protect their citizens. The Future of Violence is at once an account of these terrifying new threats and an authoritative blueprint for how we must adapt to survive."--"The ability to inflict pain and suffering on large groups of people is no longer limited to the nation-state. New technologies are putting enormous power into the hands of individuals across the world--a shift that, for all its sunny possibilities, entails enormous risk for all of us, and may even challenge the principles on which the modern nation state is founded. In short, if our national governments can no longer protect us from harm, they will lose their legitimacy. Detailing the challenges that states face in this new world, legal scholars Benjamin Wittes and Gabriella Blum controversially argue in [Title TK] that national governments must expand their security efforts to protect the lives and liberty of their citizens. Wittes and Blum show how advances in cybertechnology, biotechnology, and robotics mean that more people than ever before have access to technologies--from drones to computer networks and biological data--that could possibly be used to extort or attack states and private citizens. Security, too, is no longer only under governmental purview, as private companies or organizations control many of these technologies: internet service providers in the case of cyber terrorism and digital crime, or academic institutions and individual researchers and publishers in the case of potentially harmful biotechnologies. As Wittes and Blum show, these changes could undermine the social contract that binds citizens to their governments"--Includes bibliographical references (pages 269-307) and index.The distribution of offensive capability -- The distribution of vulnerability -- The distribution of defense -- Technology, states, and the social order -- Rethinking privacy, liberty, and security -- Rethinking legal jurisdiction and the boundaries of sovereignty -- The security of platforms and the future of surveillance -- Options for domestic governance -- Options for international governance.
Subjects: National security.; Security, International.; Internal security.; Technology; Information technology; Civil rights.; Violence; Crime prevention.;
Available copies: 1 / Total copies: 1
unAPI

Criminal justice at the crossroads : transforming crime and punishment / by Kelly, W. R.(William Robert),1950-;
Includes bibliographical references (pages 343-387) and index.Acknowledgments -- Introduction -- U.S. criminal justice policy, 1960-2013 -- Crime control : what have we accomplished? -- The scientific case for alternatives to crime control : evidence-based practices and where neurocognitive implications take us from here -- Sentencing reform reconsidered -- Diversion and problem-solving courts -- Community supervision -- Recalibrating drug control policy -- Cost-effectiveness -- Conclusions -- Works cited -- Index.In this book, William R. Kelly discusses the policy, process, and funding innovations and priorities that the United States needs to effectively reduce crime, recidivism, victimization, and the cost of law enforcement. He recommends proactive, evidence-based interventions to address criminogenic behavior; collaborative decision making from a variety of professions and disciplines; and innovative alternatives to incarceration, such as problem-solving courts and probation. -- from back cover.
Subjects: Criminal justice, Administration of; Criminals; Recidivism; Crime;
Available copies: 1 / Total copies: 1
unAPI

How to be safe : protect yourself, your home, your family, and your business from crime / by Lipman, Ira A.;
Security in your home -- Doors and windows -- Household security -- Alarm systems -- Your telephone -- Service employees and invited strangers -- Lighting your home -- Outside security -- Vacations and special occasions -- Tips for apartment and condo dwellers -- Security away from home -- Car safety -- Security on the streets -- Security while shopping -- Security on the job -- Security when you travel -- Moving to another community -- Family security -- Family violence -- Security for infants and young children -- Security for older children and teenagers -- Cyber crime -- Community security -- Neighborhood crime prevention -- School and campus security -- Security in hospitals and nursing homes -- Senior victims of crime -- Consumer fraud, con artists, and con games -- Investment fraud -- Protection from violent crimes -- Rape, sexual harassment, and stalking -- Hate crimes, kidnapping, and murder -- Terrorism -- The criminal justice system.Explains how to protect one's home, family, and property and how to steer clear of computer and high-tech crime; investment and white-collar crime; and terrorism, bombs and bomb threats, in a book that also details safety measures for weddings, funerals,holidays, and emergency situations.
Subjects: Safety education.; Dwellings; Crime prevention.; Preparedness.; Self-protective behavior.;
© 2011., Reader's Digest Association,
Available copies: 1 / Total copies: 1
unAPI

Glock : the rise of America's gun / by Barrett, Paul(Paul M.);
Includes bibliographical references (p. [279]-280) and index.Shootout in Miami -- "Pistol of the future" -- "One ugly adn all-business-looking piece of self-defense hardware" -- "Plastic perfection" -- "Hijacker's special" -- "Super gun" -- Going Hollywood -- The mark of Cain -- "Copy the motherfucker" -- Massacre in Killeen -- Lawyers, guns, and money -- "Ka-boom" -- Pocket rockets -- "My way" -- Glock culture -- Glock goes to the White House -- An assassin's attack -- "Monopoly money" -- The impact of the Austrian pistol: good for America?Traces the story of the American gun market as reflected by an Austrian six-cylinder revolver, tracing how it has become a weapon of choice on both sides of the law, in the entertainment industry, and among Second Amendment enthusiasts.
Subjects: Glock Gesellschaft; Glock pistols; Firearms and crime; Firearms;
© c2013., Broadway Books,
Available copies: 1 / Total copies: 1
unAPI

Cyber warfare : a reference handbook / by Springer, Paul J.;
Includes bibliographical references and index.Background and history -- Problems, controversies, and solutions -- Perspectives -- Profiles -- Documents -- Resources -- Chronology.:1. Background and history. Information as a tool of war ; The role of communications in modern warfare ; Early attempts at encryption ; Direct observation techniques ; The creation of cyberspace ; The cyber attacks begin ; Cyber enabling in the nuclear Middle East ; Preparations for infrastructure cyber attacks ; Russian hacktivists and national pride ; The Chinese approact to irregular warfare ; The current state of cyber war -- 2. Problems, controversies, and solutions : Is a cyber war possible? ; Cyber as a military domain ; Cyber strategy ; Instruments of national power ; Cyber crime, cyber espionage, cyberterrorism ; The problem of attribution ; People and paranoia ; Cyber ethics -- 3. Perspectives : Escalation in cyberspace: Martin Libicki ; Training tomorrow's cyber warriors: Nicholas Michael Sambaluk ; Cyber warfare in the professional military education system: S. Michael Pavelec ; Waging e-jihad: Heidi L. Dexter ; The relationship between space and cyber assets: Brian Tannehill -- 4. Profiles. :Alexander, Keith B. ; Alperovitch, Dmitri ; Anonymous ; Carpenter, Shawn ; Carr, Jeffrey ; Clarke, Richard Alan ; Defense Advanced Research Projects Agency (DARPA) ; Defense Information Systems Agency (U.S.) ; FireEye, Inc. ; Google, Inc. ; Hayden, Michael ; Kaspersky, Yevgeniy "Eugene" Valentinovich ; Libicki, Martin ; Mandiant ; McAfee, Inc. ; Microsoft Corporation ; Mitnick, Kevin ; National Security Agency ; NATO Cooperative Cyber Defence Centre of Excellence ; People's Liberation Army Unit 61398 (China) ; Qiao Liang and Wang Xiangsui ; RAND Corporation ; Rogers, Michael S. ; Russian Business Network (RBN) ; Snowden, Edward ; Symantec Corporation ; Syrian Electronic Army ; Tenenbaum, Ehud "Udi" ; U.S. Cyber Command ; WikiLeaks -- 5. Documents : Excerpts from the North Atlantic Treaty (1949) ; Remarks of President Barack Obama on securing the nation's cyber infrastructure, Washington, D.C., May 29, 2009 ; Excerpts of Secretary of State Hillary Clinton on Internet freedom, Washington, D.C., January 21, 2010 ; Excerpts from the Tallinn Manual on the International Law Applicable to Cyber Warfare, Draft, NATO Cooperative Cyber Defence Centre of Excellence, 2010 ; Excerpts of "International Strategy for Cyberspace," May 2011 ; Excerpts of Secretary of Defense Leon Panetta on Cybersecurity, October 11, 2012 ; Excerpts from U.S. Department of Defense, Defense Science Board, Task Force Report: "Resilient military systems and the advanced cyber threat," January 2013 ; Statement of General Keith B. Alexander, Commander, United States Cyber Command, before the Senate Committee on Armed Services, March 12, 2013 -- 7. Chronology."Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. And, as the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat--from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats. This essential reference--the only one of its kind to include an overview of other cyber warfare literature--emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors; as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers."--Publisher website.
Subjects: Cyberspace operations (Military science); Cyberspace; Cyberterrorism; Computer crimes;
Available copies: 1 / Total copies: 1
unAPI

Teaching fear : how we learn to fear crime and why it matters / by Rader, Nicole E.,author.;
Includes bibliographical references (pages 183-197) and index.Where do lessons of "stranger danger" and safety come from--and do they apply differently for women? A gender-fear paradox shows that although women are less likely to be victims of most crimes (sexual assault aside), their fear of crime is greater. Moreover, girls and women--especially White women--are taught to fear the wrong things and given impossible tools to prevent victimization. In Teaching Fear, Nicole Rader zooms in on the social learning process, tracing the ways that families, schools, and the media have become obsessed with crime myths, especially regarding girls and women. Based on in-depth research and family studies, Rader reveals the dubious and dangerous origins of many of the most prominent safety guidelines that teach young girls to be more afraid of crime. These guidelines carry over to adulthood, influencing women's behaviors and the way they order their worlds, with dangerous consequences. As women teach their learned behavior and conditioned fear to others, gendered crime myths are recirculated from generation to generation, making them a staple in our society. Teaching Fear includes suggestions for taking precautionary measures and crime prevention strategies. Rader also provides guidance for instilling safety values and demonstrating how we can "teach fear better" to break this cycle and truly create greater security.
Subjects: Fear of crime; Crime; Women; Women; Children;
Available copies: 1 / Total copies: 1
unAPI