UCL Explore, the library catalogue, is the principal tool to find books, journals and other materials (either in print or in electronic format) held in UCL libraries.
E-books can be accessed through Explore on any device, from anywhere and at any time.
On UCL Explore, you can look at the results of your search to quickly discover if a book is available in print or/and online: View Online means that the book is available electronically, while Available means that the book is available in print. In some cases a book is available both in print and online.
Books for Security and Crime Science are for the most part located in the Main Library (Wilkins Building). They are part of the Law Collection in the Donaldson Reading Room (LAW H section).
You may also find materials of relevance in other UCL Libraries, such as the Science Library (Watson Building, Malet Place).
You can use our Click and Collect service to reserve books from any library and have them delivered to your library of choice for collection. Alternatively, if you need a chapter or section of a book, use our Scan and Send service to receive extracts via email
If a book location is listed as Stores, the item is kept in storage off-campus and you will need to place a request for the item.
Click the links below to learn more.
Check out our Explore guide to find out more about how to use Explore for your research.
Is there a book or resource you would like to see in our collection? Perhaps you've noticed something missing on your reading list?
Please send Anna an email or fill out our suggestion form.
Why Would Feminists Trust the Police? traces the history of British feminism’s alliances and struggles with the law and its enforcers. Drawing on the legacy of Black British feminism, Leah Cowan reminds us of the vibrant and creative alternatives envisioned by those who have long known the truth: the police aren’t feminist, and the law does not keep women safe.
With constantly evolving cyber threats, developing a cybersecurity incident response capability to identify and contain threats is indispensable for any organisation regardless of its size. This book covers theoretical concepts and a variety of real-life scenarios that will help you to apply these concepts within an organisation.
Based on extensive input from technical and legal experts, this publication sets forth security management as an essential tool to verify that personnel, procedures and equipment operate interdependently and in an integrated manner, and that the leadership and personnel responsible for security demonstrate the highest commitment towards promoting a robust nuclear security culture within the organization.
This book presents state-of-the art explanations for detective control-based security and protection of digital signal processing (DSP) and machine learning coprocessors against hardware threats. Such threats include intellectual property (IP) abuse and misuse, for example, fraudulent claims of IP ownership and IP piracy. DSP coprocessors such as finite impulse response filters, image processing filters, discrete Fourier transform, and JPEG compression hardware are extensively utilized in several real-life applications.
A complete guide to the aviation security system, from crucial historical events to the policies, policymakers, and major terrorist and criminal acts that have shaped the procedures in use today, as well as the cutting edge technologies that are shaping the future. This text equips readers working in airport security or other aviation management roles with the knowledge to implement effective security programs, meet international guidelines, and responsibly protect facilities or organisations of any size.
Following the failed 2016 coup, the Turkish AKP government implemented sweeping powers against some 152,000 of its citizens. These 'emergency decreed' were dismissed from their positions and banned for life from public service, their citizenship rights revoked, Seçkin Sertdemir argues these individuals were rendered into a state of 'civic death'. This study considers how these authoritarian securitisation methods took shape, shedding light on the lived experiences of targeted people.
Professional penetration testing: creating and learning in a hacking lab walks the reader through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization.
Communal disputes over local issues such as land use, cattle herding, and access to scarce resources are a leading cause of conflict across the world. In the coming decades, climate change, forced migration, and violent extremism will exacerbate such disputes in places that are ill equipped to handle them. This book examines the conditions under which international interventions mitigate communal violence, arguing that civilian perceptions of impartiality, driven primarily by the legacies of colonialism, shape interveners' ability to manage local disputes.
This book discusses the impact of the COVID-19 pandemic and the Russian invasion of Ukraine on the European Union’s climate and energy policy. The book analyses whether the COVID-19 pandemic and the Russian invasion of Ukraine has contributed to greater unity, decarbonisation, and security of energy supply, and if not, whether these crises prompted member states to turn inwards and opt for national solutions to climate and energy challenges.
Taking a critical approach, this book advances understanding of the social, legal and ethical aspects of digitalisation in law enforcement and the reliance on data-driven tools to predict and prevent crime. It shows how the proliferation of data analytics challenges citizens’ rights, at a time when what counts as ‘safety’ or ‘policing’ is being fundamentally transformed.
This book provides a roadmap for research in cybersecurity law and policy, covering critical topics such as autonomous systems, geopolitics, internet governance, national security, terrorism, space cybersecurity, data privacy, and cloud computing. It explores understanding and applying cybersecurity concepts, the normative frameworks in Internet governance, geopolitical shifts driven by digital technology, and the legal challenges of autonomous systems.
Covering everything from the foundational aspects of AI, Blockchain, and Quantum Computing to their integration and future applications, this book delivers a forward-looking view. Real-world case studies; critical analyses of ethical, legal, and societal implications; and hands-on exercises enrich the reader’s understanding, making complex theories accessible and actionable.
Securing Integrated Transportation Networks provides a comprehensive look at multimodal transportation security―its dynamics, evolving threats, and technology advances that enhance operational security and related infrastructure protection and hardening, as well as the regulatory environment. As threats are evolving, so is the technology used in enhancing transportation security, operational procedures, and regulations.
There are three main themes in this anthology. First, warfare and neocolonial economy internationally steer the Arctic regions toward war preparations. Second, expanded Humanist security is more important in an Arctic context. A third way between Capitalism and Etatism based on an indigenous philosophy to the traditional ways of life can be transformed into a modernized participatory and self-managed new traditional economy.
A comprehensive guide to medical device secure lifecycle management. Readers gain insight into the security aspects of every phase of the product lifecycle, including concept, design, implementation, supply chain, manufacturing, postmarket surveillance, maintenance, updates, and end of life. Learn how to mitigate or completely avoid common cybersecurity vulnerabilities introduced during development and production.
What might it mean to read international law as queer, even as it (re)installs exclusionary gendered, sexualized, and racialized configurations of (il)legality? How might queering complicate international law’s exclusionary and subversive discourses of gender, sexuality, and violence? This book engages queer, feminist, and postcolonial approaches to international law and international relations to address these questions and their implications for contemporary practices of international law.
Ecoviolence, defined broadly as the intersection between human-human exploitation and the destruction of nature, is one of the defining features of our time. This book collects ten case studies examining the intersection between the exploitation of human beings and environmental harm. Topics discussed include the wildlife trade, ecoviolence at sea, human trafficking induced by extreme weather events, and the confluence of drug cartels and environmental destruction.