Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Libraries for Users

    Services in Academic Libraries
    • 1st Edition
    • Luisa Alvite + 1 more
    • English
    This book reviews the quality and evolution of academic library services. It revises service trends offered by academic libraries and the challenge of enhancing traditional ones such as: catalogues, repositories and digital collections, learning resources centres, virtual reference services, information literacy and 2.0 tools.
  • Project Management in Libraries, Archives and Museums

    Working with Government and Other External Partners
    • 1st Edition
    • Julie Carpenter
    • English
    Aimed at practitioners and managers, this practical handbook provides a source of guidance on project management techniques for the academic and cultural heritage sectors, focusing on managing projects involving public sector and other external partners. Issues under consideration and illustration include: different approaches to managing projects and how to select appropriate methods; using project management tools and other applications in project development and implementation; ensuring the sustainability of project outcomes and transferability into practice; realistic monitoring methodologies and specification and commissioning evaluation work that has real value.
  • Web Application Obfuscation

    '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'
    • 1st Edition
    • Mario Heiderich + 3 more
    • English
    Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses.
  • Eve on Top

    Women’s Experience of Success in the Public Sector
    • 1st Edition
    • David Baker + 1 more
    • English
    Eve on Top takes an in-depth look at the position of women in senior positions in the public sector using a case-study approach, based on ten ‘successful’ women and their background, upbringing, career progression, successes and failures, challenges and experiences. Each case study includes a ‘lessons learned’ response in the form of advice both to other women, and the organisations in which they work. Surrounding and supporting the case studies are short essays charting the main themes that emerge from the interview process, backed up by extensive literature reviews. The book also compares relevant public sectors in different parts of the world and concludes with several case studies.
  • RFID for Libraries

    A Practical Guide
    • 1st Edition
    • M. Paul Pandian
    • English
    Many modern technologies give the impression that they somehow work by magic, particularly when they operate automatically and their mechanisms are invisible. A technology called RFID (Radio Frequency Identification), which is relatively new, has exactly this characteristic. Librarians everywhere are closely watching RFID technology. Advances over using bar codes on library materials, RFID tags are being touted as a way to radically redesign how library materials are handled. But it is expensive. The tags are vulnerable to wear and tear and the technology is not fully developed. It's unclear what sort of return on investment (ROI) it provides. While it is common for libraries to now have information technology expertise within their organizations, RFID may appear unfamiliar. RFID for Libraries: A practical guide examines what RFID technology is and how it works. The book reviews the development of computer technology and its effects on library operations over the last couple of decades. Further examination features the applications of RFID technology in libraries. An assessment of current implementations in libraries and the lessons learnt provides suggestions to overcome the issues faced. Concluding chapters look into the future to see what developments might be possible with RFID in libraries. Benefiting from the rich experience the author has gained during recent implementation of RFID based system for his library and the important title aids the library and information community in understanding RFID technology from a library perspective.
  • Cyber Attacks

    Protecting National Infrastructure
    • 1st Edition
    • Edward Amoroso
    • English
    Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well.This book covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. It provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. It illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. Cyber Attacks will be of interest to security professionals tasked with protection of critical infrastructure and with cyber security; CSOs and other top managers; government and military security specialists and policymakers; security managers; and students in cybersecurity and international security programs.
  • Handbook of Social Economics

    • 1st Edition
    • Volume 1A
    • English
    How can economists define social preferences and interactions? Culture, familial beliefs, religion, and other sources contain the origins of social preferences. Those preferences--the desire for social status, for instance, or the disinclination to receive financial support--often accompany predictable economic outcomes. Through the use of new economic data and tools, our contributors survey an array of social interactions and decisions that typify homo economicus. Their work brings order to the sometimes conflicting claims that countries, environments, beliefs, and other influences make on our economic decisions.
  • Handbook of Social Economics

    • 1st Edition
    • Volume 1B
    • Jess Benhabib + 2 more
    • English
    How do economists understand and measure normal social phenomena? Identifying economic strains in activities such as learning, group formation, discrimination, and peer dynamics requires sophisticated data and tools as well as a grasp of prior scholarship. In this volume leading economists provide an authoritative summary of social choice economics, from norms and conventions to the exchange of discrete resources. Including both theoretical and empirical perspectives, their work provides the basis for models that can offer new insights in applied economic analyses.
  • Eleventh Hour CISSP

    Study Guide
    • 1st Edition
    • Eric Conrad + 2 more
    • English
    Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved in securing assets and to find ways to mitigate those risks. Information security jobs include firewall engineers, penetration testers, auditors, and the like. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. The first domain provides information about risk analysis and mitigation, and it discusses security governance. The second domain discusses techniques of access control, which is the basis for all security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental in operating the system and software security components. Domain 6 is one of the critical domains in the Common Body of Knowledge, the Business Continuity Planning and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domain 7, Domain 8 and Domain 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework for determining laws about information system.
  • Contemporary Security Management

    • 3rd Edition
    • John Fay
    • English
    Contemporary Security Management, Third Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: how to organize, plan, develop and manage a security operation. how to identify vulnerabilities. how to determine the protective resources required to offset threats. how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management.