000938769 000__ 01547cam\a2200445Ia\4500 000938769 001__ 938769 000938769 005__ 20230306152000.0 000938769 006__ m\\\\\o\\d\\\\\\\\ 000938769 007__ cr\un\nnnunnun 000938769 008__ 200806s2020\\\\sz\\\\\\o\\\\\001\0\eng\d 000938769 020__ $$a9783030477714$$q(electronic book) 000938769 020__ $$a3030477711$$q(electronic book) 000938769 020__ $$z3030477703 000938769 020__ $$z9783030477707 000938769 0247_ $$a10.1007/978-3-030-47771-4$$2doi 000938769 035__ $$aSP(OCoLC)on1181994582 000938769 035__ $$aSP(OCoLC)1181994582 000938769 040__ $$aYDX$$beng$$cYDX$$dGW5XE 000938769 049__ $$aISEA 000938769 050_4 $$aHM741 000938769 08204 $$a302.3/5$$223 000938769 1001_ $$aBurcher, Morgan. 000938769 24510 $$aSocial network analysis and law enforcement :$$bapplications for intelligence analysis /$$cMorgan Burcher. 000938769 260__ $$aCham, Switzerland :$$bPalgrave Macmillan,$$c2020. 000938769 300__ $$a1 online resource 000938769 336__ $$atext$$btxt$$2rdacontent 000938769 337__ $$acomputer$$bc$$2rdamedia 000938769 338__ $$aonline resource$$bcr$$2rdacarrier 000938769 4901_ $$aCrime prevention and security management 000938769 500__ $$aIncludes index. 000938769 506__ $$aAccess limited to authorized users. 000938769 650_0 $$aSocial sciences$$xNetwork analysis. 000938769 650_0 $$aCriminology. 000938769 650_0 $$aCrime$$xSociological aspects. 000938769 77608 $$iPrint version: $$z3030477703$$z9783030477707$$w(OCoLC)1150976800 000938769 830_0 $$aCrime prevention and security management. 000938769 852__ $$bebk 000938769 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-47771-4$$zOnline Access$$91397441.1 000938769 909CO $$ooai:library.usi.edu:938769$$pGLOBAL_SET 000938769 980__ $$aEBOOK 000938769 980__ $$aBIB 000938769 982__ $$aEbook 000938769 983__ $$aOnline 000938769 994__ $$a92$$bISE