An alleged arsonist. A deadly cover-up. Can this K-9 sniff out the truth? Evidence at a fiery car crash leads K-9 officer Nelson Rivers and his accelerant-detection dog, Diesel, to Mia Turner — a woman previously accused of arson. But when a gunman targets Mia during their first meeting, Nelson suspects she might actually be innocent. Only Mia’s hiding something, and Nelson’s been burned before. Can they trust each other to catch a killer…before the threat engulfs them both? Mills & Boon Love Inspired Suspense — Courage. Danger. Faith.
In this tightly plotted debut novel, an unlikely detective, armed only with an umbrella and a singular handbook, must untangle a string of crimes committed in and through people's dreams.
Detection Theory is an introduction to one of the most important tools for analysis of data where choices must be made and performance is not perfect. Originally developed for evaluation of electronic detection, detection theory was adopted by psychologists as a way to understand sensory decision making, then embraced by students of human memory. It has since been utilized in areas as diverse as animal behavior and X-ray diagnosis. This book covers the basic principles of detection theory, with separate initial chapters on measuring detection and evaluating decision criteria. Some other features include: *complete tools for application, including flowcharts, tables, pointers, and software; *student-friendly language; *complete coverage of content area, including both one-dimensional and multidimensional models; *separate, systematic coverage of sensitivity and response bias measurement; *integrated treatment of threshold and nonparametric approaches; *an organized, tutorial level introduction to multidimensional detection theory; *popular discrimination paradigms presented as applications of multidimensional detection theory; and *a new chapter on ideal observers and an updated chapter on adaptive threshold measurement. This up-to-date summary of signal detection theory is both a self-contained reference work for users and a readable text for graduate students and other researchers learning the material either in courses or on their own.
A bomber with a deadly agenda… and a K-9 team determined to catch him. When single mother Zoe Jenkins and her baby are caught in an explosion that destroys her home, she’s saved by FBI special agent Chase Rawlston and his K-9, Dash. But who set the bomb? Fearing that the notorious Rocky Mountain Killer he’s been investigating has the mother and daughter in his sights, Chase takes them under his protection. But can he uncover the killer’s identity before more innocent lives are caught in the crossfire? From Love Inspired Suspense: Courage. Danger. Faith. Mountain Country K-9 Unit Book 1: Baby Protection Mission by Laura Scott Book 2: Her Duty Bound Defender by Sharee Stover Book 3: Chasing Justice by Valerie Hansen Book 4: Crime Scene Secrets by Maggie K. Black Book 5: Montana Abduction Rescue by Jodie Bailey Book 6: Trail of Threats by Jessica R. Patch Book 7: Tracing a Killer by Sharon Dunn Book 8: Search and Detect by Terri Reed
This book focuses on the how-to aspects of K9 explosives detection training. It examines some of the major training systems used by North American police departments, then offers an approach that combines the most effective features of each. Designed to produce handler/dog teams that can conduct searches in any setting and under a variety of conditions, the book emphasises the gradual build-up of learning experiences and ongoing problem-solving. Some problems areas, such as working with other police speciality units, administrative issues, and working with non-police personnel, are also discussed.
“Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.” –Nate Miller, Cofounder, Stratum Security The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field’s leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers. Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today’s new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more. Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includes Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls Implementing IDS/IPS systems that protect wireless data traffic Enhancing your intrusion detection efforts by converging with physical security defenses Identifying attackers’ “geographical fingerprints” and using that information to respond more effectively Visualizing data traffic to identify suspicious patterns more quickly Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives Includes contributions from these leading network security experts: Jeff Forristal, a.k.a. Rain Forest Puppy, senior security professional and creator of libwhisker Seth Fogie, CEO, Airscanner USA; leading-edge mobile security researcher; coauthor of Security Warrior Dr. Sushil Jajodia, Director, Center for Secure Information Systems; founding Editor-in-Chief, Journal of Computer Security Dr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason University Alex Kirk, Member, Sourcefire Vulnerability Research Team
This new edition of the methods and instrumentation used in the detection of ionizing radiation has been revised and updated to reflect recent advances. It covers modern engineering practice, provides useful design information and contains an up-to-date review of the literature.