Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • From Lending to Learning

    The Development and Extension of Public Libraries
    • 1st Edition
    • Rónán O'Beirne
    • English
    From Lending to Learning provides a theoretical overview and practical guide to the functional area of delivering learning services within public libraries. It traces the development of public library service delivery and critically appraises the inherent tension between offering an educational-focused or leisure-focused library. The current and future policy directions are explored against the backdrop of the emerging learning society. A general overview of recent developments in learning theory is followed by an insight into the learning landscape. The issues and practicalities of setting up a learning environment within a public library are dealt with in a clear and straightforward fashion. The book concludes with an assessment of the emerging web 2.0 technologies and gives an insight into how the whole area of social networking might shape the future.
  • Managed Code Rootkits

    Hooking into Runtime Environments
    • 1st Edition
    • Erez Metula
    • English
    Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The book, divided into four parts, points out high-level attacks, which are developed in intermediate language. The initial part of the book offers an overview of managed code rootkits. It explores environment models of managed code and the relationship of managed code to rootkits by studying how they use application VMs. It also discusses attackers of managed code rootkits and various attack scenarios. The second part of the book covers the development of managed code rootkits, starting with the tools used in producing managed code rootkits through their deployment. The next part focuses on countermeasures that can possibly be used against managed code rootkits, including technical solutions, prevention, detection, and response tactics. The book concludes by presenting techniques that are somehow similar to managed code rootkits, which can be used in solving problems.
  • Death Penalty Cases

    Leading U.S. Supreme Court Cases on Capital Punishment
    • 3rd Edition
    • Barry Latzer
    • English
    Death Penalty Cases presents significant verbatim excerpts of death-penalty decisions from the United States Supreme Court. The first chapter introduces the topics discussed throughout the book. It also includes a detailed history of the death penalty in the United States. After this introduction, the remaining eighteen chapters are divided into five parts: Foundational Cases, Death-Eligible Crimes and Persons, The Death Penalty Trial, Post-Conviction Review, and Execution Issues. The first part, consisting of five chapters, talks about the mandatory death penalty, mitigating evidence and racial bias. The next part covers death-eligible crimes, such as rape and other crimes that do not involve homicide and murder. The middle part presents the trial process, from choosing the appropriate decision-makers through the sentencing decision. Followed by this is a chapter focusing on the aftermath of conviction, such as claims of innocence. The book concludes by exploring issues related to execution, such as not executing insane convicts. Finally, execution methods are presented.
  • Ontologies, Taxonomies and Thesauri in Systems Science and Systematics

    • 1st Edition
    • Emilia Currás
    • English
    The originality of this book, which deals with such a new subject matter, lies in the application of methods and concepts never used before – such as ontologies and taxonomies, as well as thesauri - to the ordering of knowledge based on primary information. Chapters in the book also examine the study of ontologies, taxonomies and thesauri from the perspective of systematics and general systems theory. Ontologies, Taxonomies and Thesauri in Systems Science and Systematics will be extremely useful to those operating within the network of related fields, which includes documentation and information science.
  • Citrix XenDesktop Implementation

    A Practical Guide for IT Professionals
    • 1st Edition
    • Gareth R. James
    • English
    Citrix XenDesktop Implementation explores the implementation of Citrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation of a desktop delivery controller through advanced XenDesktop Client Settings. This book briefly discusses the work of desktop delivery controller mechanisms followed by its installation process, integration process of XenDesktop with Microsoft Active Directory, and the configuration of the desktop delivery controller. It then examines the process of installing the virtual desktop onto the server infrastructure, and it follows the installation and integration onto Xen Server, Hyper-V, and VMware hypervisors. Furthermore, it discusses the advanced configuration settings. The book covers the installation of the Citrix Provisioning Server and its fundamental configuration. It also explores the configuration of Citrix XenApp for Application provisioning, the integration of virtual applications, and the implementation of virtual profiles into the virtual desktop. The book concludes by explaining the advanced XenDesktop client settings on audio, video, and peripherals.
  • Imagine Your Library's Future

    Scenario Planning for Libraries and information Organisations
    • 1st Edition
    • Steve O’Connor + 1 more
    • English
    In this information age it is widely recognised that, in order to maintain relevance and to gain a competitive edge, libraries and other organisations in the business of information must continuously assess their roles, collections, services and perhaps most importantly, their business practices. Scenarios are a way of predicting and describing a future three to five years away while strongly engaging one’s community in choosing the future which is preferable. The horizon in which assessments about future roles change is growing shorter and shorter. While it is almost clichéd to state that change is the only constant, differing scenarios of what libraries might be allow all of us to contemplate futures we might otherwise not allow. Drawing on extensive experience in libraries in different parts of the globe, the authors provide a rich analysis of planning, managing and implementing change in information organisations through scenario planning. Through extensive practical applications, both actual and theoretical, the authors provide a strong background understanding and direct the reader through a planning process that is both readily applicable and innovative for all information organisations, irrespective of their size or client base.
  • Ninja Hacking

    Unconventional Penetration Testing Tactics and Techniques
    • 1st Edition
    • Thomas Wilhelm + 1 more
    • English
    Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.
  • Security for Microsoft Windows System Administrators

    Introduction to Key Information Security Concepts
    • 1st Edition
    • Derrick Rountree
    • English
    Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is divided into six chapters that cover details about network attacks, system failures, audits, and social networking. The book introduces general security concepts including the principles of information security, standards, regulation, and compliance; authentication, authorization, and accounting; and access control. It also covers the cryptography and the principles of network, system, and organizational and operational security, including risk analysis and disaster recovery. The last part of the book presents assessments and audits of information security, which involve methods of testing, monitoring, logging, and auditing. This handy guide offers IT practitioners, systems and network administrators, and graduate and undergraduate students in information technology the details they need about security concepts and issues. Non-experts or beginners in Windows systems security will also find this book helpful.
  • Practical Open Source Software for Libraries

    • 1st Edition
    • Nicole Engard
    • English
    Open source refers to an application whose source code is made available for use or modification as users see fit. This means libraries gain more flexibility and freedom than with software purchased with license restrictions. Both the open source community and the library world live by the same rules and principles. Practical Open Source Software for Libraries explains the facts and dispels myths about open source. Chapters introduce librarians to open source and what it means for libraries. The reader is provided with links to a toolbox full of freely available open source products to use in their libraries.
  • New Approaches to E-Reserve

    Linking, Sharing and Streaming
    • 1st Edition
    • Ophelia Cheung + 2 more
    • English
    Aimed at academic library practitioners, this book describes how e-reserve services can evolve and adapt to the changing virtual learning environment of higher education. New approaches discussed include: the integration of subscribed, free, and copyrighted resources within course management systems; innovative employment of open URL link resolvers to connect e-reserve with library e-resources and services; video streaming within course documents; and the creative use of bibliographic software to produce customized reading lists. New Approaches to E-Reserve includes detailed descriptions and extensive step-by-step illustrations in order to provide readers with the tools needed to implement the techniques covered within. These combine to offer practical insight into common issues faced by academic institutions worldwide. In addition to an overview of practices and an update on new developments in e-reserve, a discussion of strategy, policy and organizational change extends this book’s relevance to a much broader theme: the strategic management of current and future technological changes in tertiary education.