Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Electronic Access Control

    • 1st Edition
    • Thomas L. Norman
    • English
    Electronic Access Control introduces the fundamentals of electronic access control through clear, well-illustrated explanations. Access Control Systems are difficult to learn and even harder to master due to the different ways in which manufacturers approach the subject and the myriad complications associated with doors, door frames, hardware, and electrified locks. This book consolidates this information, covering a comprehensive yet easy-to-read list of subjects that every Access Control System Designer, Installer, Maintenance Tech or Project Manager needs to know in order to develop quality and profitable Alarm/Access Control System installations. Within these pages, Thomas L. Norman – a master at electronic security and risk management consulting and author of the industry reference manual for the design of Integrated Security Systems – describes the full range of EAC devices (credentials, readers, locks, sensors, wiring, and computers), showing how they work, and how they are installed.
  • Coding for Penetration Testers

    Building Better Tools
    • 1st Edition
    • Jason Andress + 1 more
    • English
    Coding for Penetration Testers discusses the use of various scripting languages in penetration testing. The book presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages. It also provides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation scripting. It guides the student through specific examples of custom tool development that can be incorporated into a tester's toolkit as well as real-world scenarios where such tools might be used. This book is divided into 10 chapters that explores topics such as command shell scripting; Python, Perl, and Ruby; Web scripting with PHP; manipulating Windows with PowerShell; scanner scripting; information gathering; exploitation scripting; and post-exploitation scripting. This book will appeal to penetration testers, information security practitioners, and network and system administrators.
  • Development and Reform of Higher Education in China

    • 1st Edition
    • Hong Zhen Zhu + 1 more
    • English
    The Chinese higher education sector is an area subject to increasing attention from an international perspective. Written by authors centrally located within the education system in China, Development and Reform of Higher Education in China highlights not only the development of different aspects of higher education, but also the reform of the education system and its role in the educational and social development of the country. This book analyses recently collected data from the National Bureau of Statistics of China and the work of leading scholars in the field of higher education. It highlights the marketization of state-owned institutions and the increasing importance of the internationalization of higher education – two important features of education in a modern and global context.
  • The Official CHFI Study Guide (Exam 312-49)

    for Computer Hacking Forensic Investigator
    • 1st Edition
    • Dave Kleiman
    • English
    This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and properly gather the necessary evidence to prosecute. The EC-Council offers certification for ethical hacking and computer forensics. Their ethical hacker exam has become very popular as an industry gauge and we expect the forensics exam to follow suit. Material is presented in a logical learning sequence: a section builds upon previous sections and a chapter on previous chapters. All concepts, simple and complex, are defined and explained when they appear for the first time. This book includes: Exam objectives covered in a chapter are clearly explained in the beginning of the chapter, Notes and Alerts highlight crucial points, Exam’s Eye View emphasizes the important points from the exam’s perspective, Key Terms present definitions of key terms used in the chapter, Review Questions contains the questions modeled after real exam questions based on the material covered in the chapter. Answers to the questions are presented with explanations. Also included is a full practice exam modeled after the real exam.
  • Managing Your Library and its Quality

    The ISO 9001 Way
    • 1st Edition
    • Núria Balagué + 1 more
    • English
    This book, divided into two parts, provides an introduction to the quality management issues and gives a general overview to the use of ISO 9001 in the library environment. The second part presents the main features of ISO 9001:2008 with practical comments and examples on how to implement its clauses in libraries. Whether in the public or in the private sector, libraries can be seen as service organisations: they act in very dynamic environments where users are increasingly demanding new types of services. Thus the adoption of a quality management system helps each library in meeting the needs of the customers. This book covers some key ideas about how to approach the ISO 9001 standard in library terms, or any other information service unit. Managing Your Library and its Quality offers not only a useful approach to quality but it is also an excellent guide on how to manage knowledge within organisations and, a priori, thus should be utilised by the information professional.
  • Academic Branch Libraries in Changing Times

    • 1st Edition
    • Nevenka Zdravkovska
    • English
    Are academic branch libraries going to be extinct in the near future? In these difficult economic times, when collections are digitized rapidly, is there still a need for a separate unit within proximity to the department, school, or college with a subject-based or subject-specific collection? Academic Branch Libraries in Changing Times gives a brief historical overview of the role of a branch academic library. It reviews the current situation from a practitioner’s point of view and suggests solutions for the future.
  • Industrial Network Security

    Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
    • 1st Edition
    • Eric D. Knapp + 1 more
    • English
    Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems covers implementation guidelines for security measures of critical infrastructure. The book describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented. It also discusses common pitfalls and mistakes and how to avoid them. After reading this book, students will understand and address the unique security concerns that face the world's most important networks. This book examines the unique protocols and applications that are the foundation of industrial control systems and provides comprehensive guidelines for their protection. Divided into 11 chapters, it explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also explores industrial networks as they relate to "critical infrastructure" and cyber security; potential risks and consequences of a cyber attack against an industrial control system; compliance controls in relation to network security practices; industrial network protocols such as Modbus and DNP3; assessment of vulnerabilities and risk; how to secure enclaves; regulatory compliance standards applicable to industrial network security; and common pitfalls and mistakes, like complacency and deployment errors. This book is a valuable resource for plant operators and information security analysts, as well as compliance officers who want to pass an audit with minimal penalties and/or fines. It will also appeal to IT and security professionals working on networks and control systems operations.
  • Comparative Osteology

    A Laboratory and Field Guide of Common North American Animals
    • 1st Edition
    • Bradley Adams + 1 more
    • English
    In the forensic context it is quite common for nonhuman bones to be confused with human remains and end up in the medical examiner or coroner system. It is also quite common for skeletal remains (both human and nonhuman) to be discovered in archaeological contexts. While the difference between human and nonhuman bones is often very striking, it can also be quite subtle. Fragmentation only compounds the problem. The ability to differentiate between human and nonhuman bones is dependent on the training of the analyst and the available reference and/or comparative material. Comparative Osteology is a photographic atlas of common North American animal bones designed for use as a laboratory and field guide by the forensic scientist or archaeologist. The intent of the guide is not to be inclusive of all animals, but rather to present some of the most common species which also have the highest likelihood of being potentially confused with human remains.
  • Technology and Knowledge Flow

    The Power of Networks
    • 1st Edition
    • Guglielmo Trentin
    • English
    This book outlines how network technology can support, foster and enhance the Knowledge Management, Sharing and Development (KMSD) processes in professional environments through the activation of both formal and informal knowledge flows. Understanding how ICT can be made available to such flows in the knowledge society is a factor that cannot be disregarded and is confirmed by the increasing interest of companies in new forms of software-mediated social interaction. The latter factor is in relation both to the possibility of accelerating internal communication and problem solving processes, and/or in relation to dynamics of endogenous knowledge growth of human resources.The book will focus specifically on knowledge flow (KF) processes occurring within networked communities of professionals (NCP) and the associated virtual community environments (VCE) that foster horizontal dynamics in the management, sharing and development of fresh knowledge. Along this line a further key issue will concern the analysis and evaluation techniques of the impact of Network Technology use on both community KF and NCP performance.
  • Understanding Librarians

    Communication is the Issue
    • 1st Edition
    • Barbara Hull
    • English
    Aimed at professionals and trainee professionals within the library and information service (LIS) fields, this book reminds the reader of the frequently ignored communication-gulf between the professional and the layman, and in particular the lack of true communication between LIS professionals and the user. It focuses especially on ‘non-standard’ users, such as non-native speakers or those with some disability. The author provides accessible examples of good practice, assesses their degree of success and suggests further ways to improve performance in information provision.