1. Integrating a usable security protocol into user authentication services design process. (2018) Authors: Seffah, Ahmed; Braz, Christina; Naqvi, Syed Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Color atlas of forensic toolmark identification. (©2011) Other Names: Petraco, Nicholas Record Type: Book Extent: 1 online resource (xviii, 159 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Forensic identification and criminal justice : forensic science, justice, and risk /: forensic science, justice, and risk. (2013) Other Names: McCartney, Carole Record Type: Book Extent: 1 online resource (270 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Advances in forensic human identification. (©2014) Other Names: Mallett, Xanthé; Blythe, Teri; Berry, Rachel Record Type: Book Extent: 1 online resource (xxv, 438 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Forensic handwriting identification : fundamentals, concepts and principals /: fundamentals, concepts and principals. (2015) Authors: Morris, Ron (Ronald N.) Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Forensic human identification : an introduction /: an introduction. (©2007) Other Names: Thompson, Timothy James Upton; Black, Sue M; British Association for Human Identification. Record Type: Book Extent: 1 online resource (518 pages, [8] pages of plates), illustrations (some color), color map View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Postmortem fingerprinting and unidentified human remains. (2014) Authors: Mulawka, Marzena Editors: Miller, Larry, 1953 August 26 Record Type: Book Extent: 1 online resource (132 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Introduction to certificateless cryptography. (2016) Authors: Xiong, Hu; Qin, Zhen, 1982-; Vasilakos, Athanasios Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Utilizing forensic technologies for unidentified human remains : death investigation resources, strategies, and disconnects /: death investigation resources, strategies, and disconnects. (2015) Authors: Adams, George W, 1947- Record Type: Book Extent: 1 online resource, illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗