Recursos Electrónicos
Para conocer toda la oferta para ti, revisa el video: ABC de fuentes de información para Ciencia Forense.
ACCESO
Los libros aquí listados podrán ser consultados en las computadoras de RedUNAM mediante los hipervículos o mediante la búsqueda en LIBRUNAM.
Para la consulta fuera de RedUNAM se podrá usar la clave de acceso remoto, para lo cual se recomienda consultar los documentos “Acceso Remoto a la Biblioteca Médica Digital” y “Preguntas Frecuentes sobre el Acceso Remoto a la Biblioteca Médica Digital“.
LINEAMIENTOS Y REGLAMENTOS DE LA LCF
SOFTWARE PARA LA COMUNIDAD
La UNAM cuenta con acuerdos con programadores y empresas para que su comunidad utilice de modo legal una gran variedad de programas de computo. Universitario, ingresa a cualquiera de los siguientes portales, busca la herramienta que necesitas, descargarla y úsala:
- TIC-UNAM (Servicios para público en general y de la UNAM)
- Tienda de software de la UNAM (Herramientas variadas: virtualizadores, programación, edición de imágenes, antivirus, etc.)
ENCICLOPEDIAS
- Encyclopedia of Forensic Sciences (Second Edition)
- Encyclopedia of Forensic and Legal Medicine
- Ashraf Mozayani y Carla Noziglia (ed.), The Forensic Laboratory Handbook Procedures and Practice (Springer).
- Gerben Bruinsma, David Weisburd (ed.), Encyclopedia of Criminology and Criminal Justice (Springer)
LIBROS
- Introduction to Forensic Psychology
- Ethics in Forensic Science *
- Research Methods in Human Skeletal Biology *
- Handbook of Loss Prevention and Crime Prevention
- Introduction to Crime Scene Photography *
- Forensic DNA Biology *
- Introduction to Criminal Justice
- Reaffirming Rehabilitation
- Social Media Investigation for Law Enforcement
- Developments in Handwriting and Signature Identification in the Digital Age *
- The Basics of Digital Forensics *
- Windows Forensic Analysis Toolkit *
- Security and Loss Prevention
- Practical Aviation Security *
- Security Science
- CCTV
- Ethical Justice *
- Strategic Intelligence Management
- Kidnapping
- Forensic Fraud
- Forensic Victimology *
- Homicide Investigation Field Guide *
- Crisis Management at the Speed of the Internet
- Bring Your Own Device (BYOD) to Work
- International Security Programs Benchmark Report
- From One Winning Career to the Next
- X-Ways Forensics Practitioner’s Guide
- From the Files of a Security Expert Witness
- Crime Prevention Through Environmental Design
- Business Continuity
- Nine Practices of the Successful Security Leader
- Domestic Violence Spills Over into the Workplace
- Establishing the Value of All-Hazards Risk Mitigation
- Managing Risks in Business
- The Compliance Response to Misconduct Allegations
- The Future of the Arab Spring
- The Benefits and Security Risks of Web-Based Applications for Business
- Corporate Security Organizational Structure, Cost of Services and Staffing Benchmark
- Personnel Protection: Concepts of Executive Security
- Personnel Protection: Aircraft Security
- Personnel Protection: Advance Procedures
- Media Exposure and Risk
- Building a Security Measures and Metrics Program
- Aligning Security Services with Business Objectives
- Conflict Management for Security Professionals
- Personal Safety and Security Playbook
- Physical Security Strategy and Process Playbook
- Personnel Protection: Executive Worksite Security
- Personnel Protection: Security Personnel
- Personnel Protection: Executive Compensation and Fringe Benefits
- Bringing a Corporate Security Culture to Life
- Information Protection Playbook
- Influencing Enterprise Risk Mitigation
- Workplace Security Playbook
- Forensic Investigation of Sex Crimes and Sexual Offenders *
- Feminist Theory, Crime, and Social Justice
- Professional Misconduct against Juveniles in Correctional Treatment Settings
- Profiling and Serial Crime
- Crime Scene Investigation
- Success as an Online Student
- Homegrown Violent Extremism
- Alternate Light Source Imaging
- Placing the Suspect Behind the Keyboard
- Unified Communications Forensics