The Praeger Handbook of Victimology



The Praeger Handbook of Victimology
Praeger | English | Pages: 344 | 2009 | ISBN 0313359350 | File type: PDF | 1 mb
The Praeger Handbook of Victimology is the first full-scale reference to encompass the full scope of the discipline of victim studies, marking its evolution from an initial focus on homicide, child abuse, sexual assault, and domestic violence to a more wide-ranging modern interpretation that includes hate crimes, terrorism, and cyber crimes such as online bullying, stalking, and identity theft.

The Praeger Handbook of Victimology offers an up-to-date portrait of its field, including the latest research from criminal justice studies, feminist studies, and other disciplines, as well as the changing views of the victim from law enforcement and the public at large. The nearly 200 alphabetically organized entries cover everything from terminology unique to the field to victimizations relative to specific crimes to the extension of crime victim rights and victim interactions with the criminal justice system. Victims' advocates, legal professionals, students, researchers, or anyone fascinated by the impact of crime on society will find this a uniquely informative resource.


http://uploading.com/files/178cc34m/

http://www.megaupload.com/?d=3ESEGCBC

[Fast Download] The Praeger Handbook of Victimology


Related eBooks:
Human-Computer Interaction and Cybersecurity Handbook (Human Factors and Ergonomics)
From CIA to APT: An Introduction to Cyber Security
Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection
Non-Traditional Security in Asia: Dilemmas in Securitization
Reasonable Cybersecurity for Business Leaders
Securing Cloud Services
Advances in Cryptology - CRYPTO 2018
The Art of Software Security Assessment: Identifying and Preventing Software Vul
InfoSec Career Hacking: Sell Your Skillz, Not Your Soul
Online Health and Safety: From Cyberbullying to Internet Addiction
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.