{"id":8370,"date":"2013-06-24T05:13:43","date_gmt":"2013-06-24T08:13:43","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=8370"},"modified":"2014-02-05T23:31:19","modified_gmt":"2014-02-06T02:31:19","slug":"private-security-and-the-investigative-process","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/private-security-and-the-investigative-process\/","title":{"rendered":"Private Security and the Investigative Process"},"content":{"rendered":"<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-8371\" alt=\"Private Security and the Investigative Process\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2013\/06\/private-security-and-the-investigative-process.jpg\" width=\"145\" height=\"212\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2013\/06\/private-security-and-the-investigative-process.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2013\/06\/private-security-and-the-investigative-process-102x150.jpg 102w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/><span style=\"color: #003366;\">Charles P. Nemeth<\/span><\/strong><\/p>\n<p><span style=\"color: #003366;\"><strong>Auerbach Publications<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Descripci\u00f3n:<\/strong><\/span> Detailing best practices and trade secrets for private sector security investigations, Private Security and the Investigative Process, Third Edition provides complete coverage of the investigative process. Fully updated, this edition covers emerging technology, revised legal and practical considerations for conducting interviews, and new information on case evaluation.<\/p>\n<p>Written by a recognized expert in security, criminal justice, ethics, and the law\u2014with over three decades of experience\u2014the updated edition of this popular text covers concepts and techniques that can be applied to a variety of investigations including fraud, insurance, private, and criminal. It details the collection and preservation of evidence, the handling of witnesses, surveillance techniques, background investigations, and report writing. This new edition includes:<\/p>\n<ul>\n<li>More than 80 new or updated forms, checklists, charts, and illustrations;<\/li>\n<li>Updated proprietary information from Pinkerton, Wackenhut, and other leading security companies;<\/li>\n<li>Increased emphasis on software and technological support products;<\/li>\n<li>A closer examination of periodical literature and government publications.<\/li>\n<\/ul>\n<p>Authoritative, yet accessible, this book is an important reference for private investigators and security professionals. Complete with numerous forms, checklists, and web exercises, it provides the tools and understanding required to conduct investigations that are professional, ethical, and effective.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Charles P. Nemeth Auerbach Publications Descripci\u00f3n: Detailing best practices and trade secrets for private sector security investigations, Private Security and the Investigative Process, Third Edition provides complete coverage of the investigative process. Fully updated, this edition covers emerging technology, revised legal and practical considerations for conducting interviews, and new information on case evaluation. Written by a recognized expert in security, criminal justice, ethics, and the law\u2014with over three decades of&hellip; <\/p>\n","protected":false},"author":3,"featured_media":8371,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,15,23,6],"tags":[],"class_list":["post-8370","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-fraude-e-investigacao","category-gestao-da-seguranca-empresarial","category-livros"],"views":230,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/8370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=8370"}],"version-history":[{"count":3,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/8370\/revisions"}],"predecessor-version":[{"id":9983,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/8370\/revisions\/9983"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/8371"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=8370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=8370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=8370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}