Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Yunnan-A Chinese Bridgehead to Asia

    A Case Study of China’s Political and Economic Relations with its Neighbours
    • 1st Edition
    • May 15, 2013
    • Tim Summers
    • English
    The Chinese Government’s five-year strategy for social and economic development to 2015 includes the aim of making the southwestern province of Yunnan a bridgehead for ‘opening the country’ to southeast Asia and south Asia. Yunnan - A Chinese Bridgehead to Asia traces the dynamic process which has led to this policy goal, a process through which Yunnan is being repositioned from a southwestern periphery of the People’s Republic of China to a ‘bridgehead’ between China and its regional neighbours. It shows how this has been expressed in ideas and policy frameworks, involvement in regional institutions, infrastructure development, and changing trade and investment flows, from the 1980s to the present.Detailing the wider context of the changes in China's global interactions, especially in Asia, the book uses Yunnan's case to demonstrate the extent of provincial agency in global interactions in reform-era China, and provides new insights into both China’s relationships with its Asian neighbours and the increasingly important economic engagement between developing countries.
  • The Wireshark Field Guide

    Analyzing and Troubleshooting Network Traffic
    • 1st Edition
    • May 14, 2013
    • Robert Shimonski
    • English
    The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill down into the information contained in real-time network traffic. Readers will learn the fundamentals of packet capture and inspection, the use of color codes and filters, deep analysis, including probes and taps, and much more. The Wireshark Field Guide is an indispensable companion for network technicians, operators, and engineers.
  • Simple Steps to Data Encryption

    A Practical Guide to Secure Computing
    • 1st Edition
    • April 25, 2013
    • Peter Loshin
    • English
    Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHO... having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard. The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file. There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche. By reading this title readers will be provided with a step by step hands-on guide that includes: Simple descriptions of actual threat scenarios Simple, step-by-step instructions for securing data How to use open source, time-proven and peer-reviewed cryptographic software Easy to follow tips for safer computing Unbiased and platform-independent coverage of encryption tools and techniques
  • Pharmacy Law and Practice

    • 5th Edition
    • April 19, 2013
    • Jon Merrills + 1 more
    • English
    Pharmacy Law and Practice, Fifth Edition provides a straightforward and useable guide for students, practitioners, academics and others interested in pharmacy law and practice in the United Kingdom. This multi-dimensional book includes discussions of socio-political influences on legal developments to provide greater insight to the reader. It clearly sets out the background to regulatory issues together with simple and practical statements of what a pharmacist has to do to obey the law. As in previous editions, this book discusses topics thematically rather than by statute. It is a unique and reader-friendly guide that boils down the complex or difficult language of the law, describes the reasons behind it, and illustrates the application to pharmacy practice.
  • Windows Server 2012 Security from End to Edge and Beyond

    Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions
    • 1st Edition
    • April 18, 2013
    • Yuri Diogenes + 2 more
    • English
    Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments. The book's revolutionary "Test Lab Guide" approach lets you test every subject in a predefined test lab environment. This, combined with conceptual and deployment guidance, enables you to understand the technologies and move from lab to production faster than ever before. Critical material is also presented in key concepts and scenario-based approaches to evaluation, planning, deployment, and management. Videos illustrating the functionality in the Test Lab can be downloaded from the authors’ blog http://blogs.technet... Each chapter wraps up with a bullet list summary of key concepts discussed in the chapter.
  • Exploring Education for Digital Librarians

    Meaning, Modes and Models
    • 1st Edition
    • April 17, 2013
    • Sue Myburgh + 1 more
    • English
    Exploring Education for Digital Librarians provides a refreshing perspective on the discipline and profession of Library and Information Science (LIS), with a focus on preparing students for careers as librarians who can deal with present and future digital information environments. A re-examination of the knowledge base of the field, combined with a proposed theoretical structure for LIS, provide the basis for this work, which also examines competencies for practice as well as some of the international changes in the nature of higher education. The authors finally suggest a model that could be used internationally to educate librarians for their new roles and social responsibilities in a digitised, networked world.The twelve chapters of this book cover key issues in education for digital librarians, including: the necessity of regenerating the profession; current contexts; previous research on education for digital librarians; understanding the dimensions of the discipline and profession of librarianship, and the distinctions between them; the social purpose of librarianship as a profession and the theoretical framework which supports the practice of the profession; a brief analysis of curriculum design, pedagogies and teaching methods, and a glimpse of the proactive and important future role of librarianship in society.
  • International Security Programs Benchmark Report

    Research Report
    • 1st Edition
    • March 29, 2013
    • Bob Hayes + 1 more
    • English
    The International Security Programs Benchmark Report presents and analyzes the findings of a broad survey conducted by the Security Executive Council of corporate international security programs. The report identifies the types of international security baseline programs in place for a range of company sizes, and describes the organizational perception of security’s role and capability. The data suggest that international security programs are greatly affected by the company size and the location of the security department within the organization, whether as part of the executive, legal, or human resources function.Security leaders can gain valuable insights from this report regarding the scope of international security programs at key corporations with contextualized comparison points for evaluating their own programs.The International Security Programs Benchmark Report is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Nine Practices of the Successful Security Leader

    Research Report
    • 1st Edition
    • March 28, 2013
    • Bob Hayes + 1 more
    • English
    Nine Practices of the Successful Security Leader lays out a series of best practices for security managers. Collected from interviews with security leaders at public and private sector organizations, ranging from small- and mid-size all the way up to large international entities, these practices are a sampling of what is vital and what works. Recommendations such as close communication with management, alignment of security agendas with business goals, and creating internal awareness programs are just some of the effective initiatives detailed in the report. With this information, security professionals can gain insight into the practices of their peers, measure their own success, and mentor junior colleagues. Nine Practices of the Successful Security Leader is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Domestic Violence Spills Over into the Workplace

    Proven Practices
    • 1st Edition
    • March 26, 2013
    • Rosalind Jackson
    • English
    Domestic Violence Spills Over into the Workplace is a video presentation. Length: 22 minutes. Domestic Violence Spills Over into the Workplace presents ways to assess the danger of and address issues associated with domestic violence in the workplace. This 22-minute video presentation of narrated slides provides valuable information on recognizing signs of abuse, the cost to companies, and what actions to take to mitigate the negative impact of domestic violence in your workplace. It also addresses how to develop and communicate a domestic violence policy and a safety plan for survivors. Presenter Rosalind W. Jackson has years of experience managing workplace violence prevention programs in both corporate office and manufacturing settings. This presentation is a valuable tool for human resources and security professionals for use in training, business and security executives in the development of a corporate domestic violence policy, and educators in the classroom. Domestic Violence Spills Over into the Workplace is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Financial Whirlpools

    A Systems Story of the Great Global Recession
    • 1st Edition
    • March 26, 2013
    • Karen L. Higgins
    • English
    How do economists reconcile their expertise with their failures to predict and manage the 2008 financial crisis? This book goes a long way toward an answer by using systems theory to reveal the complex interdependence of factors and forces behind the crisis. In her fully integrated view of the economy, how it works, and how the economic crisis burst, Karen Higgins combines human psychology, cultural values, and belief formation with descriptions of the ways banks and markets succeed and fail. In each chapter she introduces themes from financial crisis literature and brings a systems-theory treatment of them. Her methodology and visual presentations both develop the tools of systems theory and apply these tools to the financial crisis. Not just another volume about the crisis, this book challenges the status quo through its unique multidisciplinary approach.