Skip to content
You are not logged in |Login  

LEADER 00000cam a2200613Ma 4500 
001    ocn441807841 
003    OCoLC 
005    20160527040834.1 
006    m     o  d         
007    cr zn||||||||| 
008    060322s2006    ne ab   ob    001 0 eng d 
019    154085252|a313357654|a648301986|a824969653 
020    0080480403|q(electronic book) 
020    9780080480404|q(electronic book) 
020    9780750679503|q(hardcover ;|qalkaline paper) 
020    0750679506|q(hardcover ;|qalkaline paper) 
020    |z0750679506|q(Cloth) 
035    (OCoLC)441807841|z(OCoLC)154085252|z(OCoLC)313357654
       |z(OCoLC)648301986|z(OCoLC)824969653 
037    CL0500000183|bSafari Books Online 
040    MERUC|beng|epn|cMERUC|dOCLCQ|dIUL|dE7B|dIDEBK|dN$T|dYDXCP
       |dTEX|dSHH|dOCLCQ|dUMI|dDEBSZ|dOCLCQ|dOCLCF 
049    RIDW 
050  4 HV8073|b.S39 2006eb 
072  7 LAW|x041000|2bisacsh 
082 04 363.25|222 
090    HV8073|b.S39 2006eb 
100 1  Sennewald, Charles A.,|d1931-|0https://id.loc.gov/
       authorities/names/n78016509 
245 14 The process of investigation :|bconcepts and strategies 
       for investigators in the private sector /|cCharles A. 
       Sennewald, John K. Tsukayama ; with contributions by David
       E. Zulawski and Douglas E. Wicklander. 
250    3rd ed. 
264  1 Amsterdam ;|aBoston :|bButterworth-Heinemann/Elsevier,
       |c[2006] 
264  4 |c©2006 
300    1 online resource (viii, 332 pages) :|billustrations, map 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file|2rdaft 
504    Includes bibliographical references (pages 317-319) and 
       index. 
505 0  Cover -- Front Cover -- Title Page -- Copyright Page -- 
       Table of Contents -- Preface -- Acknowledgments -- I. 
       FUNDAMENTALS OF SECURITY INVESTIGATION -- Chapter 1: The 
       Investigative Process -- Chapter 2: A Comparison of Public
       and Private Sectors -- Chapter 3: Qualities of the 
       Investigator -- Chapter 4: Managing the Investigative 
       Function -- II. METHODS OF SECURITY INVESTIGATION -- 
       Chapter 5: Undercover Investigations -- Chapter 6: 
       Surveillance -- Chapter 7: Background Investigations -- 
       Chapter 8: Discovering Covert Crimes -- III. BUILDING A 
       CASE -- Chapter 9: Interviews and Interrogations -- 
       Chapter 10: An Overview of the Interview and Interrogation
       Process -- Chapter 11: Evidence -- Chapter 12: Written 
       Statements, Admissions, and Confessions -- Chapter 13: The
       Use of Informants -- Chapter 14: Report Writing and Note 
       Taking -- IV. APPLYING INVESTIGATIVE STRATEGIES -- Chapter
       15: Problems Arise: The What of Investigation -- Chapter 
       16: Crime and Solution: The How of Investigation -- 
       Chapter 17: Identifying Suspects: The Who of Investigation
       -- Chapter 18: Finding Information: The Where of 
       Investigation -- Chapter 19: The Time Factor: The When of 
       Investigation -- Chapter 20: Establishing Motive: The Why 
       of Investigation -- V. TECHNOLOGICAL AND SPECIALIZED 
       INVESTIGATIVE TECHNIQUES -- Chapter 21: Imagery -- Chapter
       22: Computers in Private Sector Investigations -- Chapter 
       23: Targeted Violence Investigations -- Sources -- Index -
       - Last Page. 
520    A valuable handbook for investigators working in the 
       private sector. 
588 0  Print version record. 
590    eBooks on EBSCOhost|bEBSCO eBook Subscription Academic 
       Collection - North America 
650  0 Criminal investigation.|0https://id.loc.gov/authorities/
       subjects/sh85034045 
650  0 Detectives.|0https://id.loc.gov/authorities/subjects/
       sh85037288 
650  7 Criminal investigation.|2fast|0https://id.worldcat.org/
       fast/883201 
650  7 Detectives.|2fast|0https://id.worldcat.org/fast/891581 
655  4 Electronic books. 
700 1  Tsukayama, John K.|0https://id.loc.gov/authorities/names/
       n00103241 
776 08 |iPrint version:|aSennewald, Charles A., 1931-|tProcess of
       investigation.|b3rd ed.|dAmsterdam ; Boston : Butterworth-
       Heinemann/Elsevier, ©2006|w(DLC)  2006009668 
856 40 |uhttps://rider.idm.oclc.org/login?url=http://
       search.ebscohost.com/login.aspx?direct=true&scope=site&
       db=nlebk&AN=196325|zOnline eBook. Access restricted to 
       current Rider University students, faculty, and staff. 
856 42 |3Instructions for reading/downloading this eBook|uhttp://
       guides.rider.edu/ebooks/ebsco 
901    MARCIVE 20231220 
948    |d201606016|cEBSCO|tebscoebooksacademic|lridw 
994    92|bRID