Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Security Risks in Social Media Technologies

    Safe Practices in Public Service Applications
    • 1st Edition
    • Alan Oxley
    • English
    Security measures can be used by management, IT staff, and users in participatory/collab... service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collab... pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collab... in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.
  • The Metadata Manual

    A Practical Workbook
    • 1st Edition
    • Rebecca Lubas + 2 more
    • English
    Cultural heritage professionals have high levels of training in metadata. However, the institutions in which they practice often depend on support staff, volunteers, and students in order to function. With limited time and funding for training in metadata creation for digital collections, there are often many questions about metadata without a reliable, direct source for answers. The Metadata Manual provides such a resource, answering basic metadata questions that may appear, and exploring metadata from a beginner’s perspective. This title covers metadata basics, XML basics, Dublin Core, VRA Core, and CDWA schemes and provides exercise in the creation of metadata. Finally, the book gives an overview of metadata, including mapping and sharing.
  • Practical Anonymity

    Hiding in Plain Sight Online
    • 1st Edition
    • Peter Loshin
    • English
    For those with legitimate reason to use the Internet anonymously--diploma... military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. Practical Anonymity: Hiding in Plain Sight Online shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This practical guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult because most of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple. The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers. Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing
  • Kidnapping

    An Investigator’s Guide
    • 2nd Edition
    • Diana M. Concannon
    • English
    Kidnapping: An Investigator's Guide to Profiling is based on a three-part analysis of 100 randomly selected kidnapping cases prosecuted in the United States that have survived Supreme Court appeal. The results of the analysis are incorporated into each chapter as part of the exploration of the inductive profile of each kidnapping subtype, thereby offering a statistically based tool that can inform investigative strategies and the allocation of limited resources. The analysis includes standardized input from four levels of professional law enforcement including a forensic psychologist, a crime analyst, a detective, and a city prosecutor. In addition to chapters pertaining to the kidnapping subtypes – Domestic Kidnapping, Predatory Kidnapping-Adult Victim, Predatory Kidnapping-Child Victim, Profit Kidnapping, Revenge Kidnapping, Staged Kidnapping, and Political Kidnapping - an introductory chapter is dedicated to the evolution of U.S. kidnapping law and intervention strategies, including a review of relevant case law (Megan's Law, Amber Alert). Appendices include a concise summary of all the subtypes and Tabletop Drills that law enforcement can use to support potential kidnapping victims prepare and better respond to a kidnapping threat. The second edition also includes a discussion of the relationship between kidnapping and human trafficking, as well as a new Appendix focused upon effective interview strategies with the victim-witness.
  • Risk Management Framework

    A Lab-Based Approach to Securing Information Systems
    • 1st Edition
    • James Broad
    • English
    The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader’s own organization.
  • Chinese Librarianship in the Digital Era

    • 1st Edition
    • Conghui Fang
    • English
    The library in China has been transformed by rapid socioeconomic development, and the proliferation of the Internet. The issues faced by Chinese libraries andlibrarians are those faced by library practitioners more globally, however, China also has its own unique set of issues in the digital era, including developmental imbalance between East and West, urban and rural areas, and availability of skilled practitioners. Chinese Librarianship in the Digital Era is the first book on Chinese libraries responding to these issues, and more.The first part of the book places discussion in historical context, before moving on to the digital environment of the Chinese library. The book then considers the issue of digital copyright in China, and debates the core values of the Chinese library. The next three chapters cover public and academic libraries, and library consortia. Finally, the book gives a view of the future prospects for libraries in China.
  • Academic Libraries in the US and China

    Comparative Studies of Instruction, Government Documents, and Outreach
    • 1st Edition
    • Hanrong Wang + 1 more
    • English
    Academic libraries have a long history both in the USA and China, with institutions developing along different trajectories, and responding to the rapidly changing library environment globally. Academic Libraries in the US and China compares current practices within Library and Information Science (LIS) in the USA and China, giving an historical overview of instruction, government documents, and outreach in academic libraries, as well as discussion and comparative analysis.An introduction leads to chapters on instruction, government publications, and outreach. Each topic is covered both for American and Chinese academic libraries. A conclusion then gives comparative analysis of US and Chinese academic libraries.
  • Professional Penetration Testing

    Creating and Learning in a Hacking Lab
    • 2nd Edition
    • Thomas Wilhelm
    • English
    Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. All disc-based content for this title is now available on the Web.
  • The Basics of Hacking and Penetration Testing

    Ethical Hacking and Penetration Testing Made Easy
    • 2nd Edition
    • Patrick Engebretson
    • English
    The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
  • WAIS-IV, WMS-IV, and ACS

    Advanced Clinical Interpretation
    • 1st Edition
    • James A. Holdnack + 3 more
    • English
    This book provides users of the Wechsler Adult Intelligence Scale (WAIS-IV) with information on applying the WAIS-IV, including additional indexes and information regarding use in special populations for advanced clinical use and interpretation. The book offers sophisticated users of the WAIS-IV and Wechsler Memory Scale (WMS-IV) guidelines on how to enhance the clinical applicability of these tests. The first section of the book provides an overview of the WAIS-IV, WMS-IV, and new Advanced Clinical Solutions for Use with the WAIS-IV/WMS-IV (ACS). In this section, examiners will learn: Normal versus atypical score variability Low-score prevalence in healthy adults versus clinical populations Assessing whether poor performance reflects a decline in function or is the result of suboptimal effort New social cognition measures found in the ACS are also presented. The second part focuses on applying the topics in the first section to specific clinical conditions, including recommended protocols for specific clientele (e.g. using demographically adjusted norms when evaluating individuals with brain injury). Common clinical conditions are discussed, including Alzheimer’s disease, mild cognitive impairment, traumatic brain injury, and more. Each chapter provides case examples applying all three test batteries and using report examples as they are obtained from the scoring assistant. Finally, the use of the WAIS-IV/WMS-IV and the ACS in forensic settings is presented.