Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Scholarly Communication in Library and Information Services

    The Impacts of Open Access Journals and E-Journals on a Changing Scenario
    • 1st Edition
    • Bhaskar Mukherjee
    • English
    This book has been written with a view to understand the validity of the perceptions of Open Access (OA) e-journals in the Library and Information Science (LIS) field. Using relevant OA journals this book presents and evaluates journals qualitatively and quantitatively. Over the last three hundred years scholarly journals have been the prime mode of transport in communicating the scholarly research process. However in the last few decades, a changing scenario has been witnessed in their form and format. OA is an innovative idea that attracts a fair amount of support and opposition around the world because it bridges the gap between digitally divided scholars by solving the pricing and permission crises that have imbalanced the scholarly communication process. Some scholars are of the opinion that OA has led to a chaotic environment where anyone can publish anything. Scholarly Communication in Library and Information Services records, in detail, the impact by accessing the journals’ web site qualitatively and quantitatively in measuring the important elements such as articles, authors, countries, subjects and cited references. Finally, the book calculates the impact factor using synchronous and asynchronous approaches.
  • Information Literacy in the Digital Age

    An Evidence-Based Approach
    • 1st Edition
    • Teresa Welsh + 1 more
    • English
    This book examines the various types of literacy that are important in the Digital Age of rapid technological change and proliferating information resources in a variety of formats. According to the American Library Association (www.ala.org), “information literacy is a set of abilities requiring individuals to recognize when information is needed and have the ability to locate, evaluate, and use effectively the needed information.” Information literacy forms the basis for lifelong learning and is common to all disciplines, to all learning environments, and to all levels of education. Information literacy is an umbrella term that includes a variety of specific competencies: cultural literacy, library literacy, computer literacy, network literacy, and media literacy. Each topic addressed in the book includes contextual background information, basic concepts, a resource list, exercises and activities to reinforce the important learning concepts addressed in each chapter.
  • Online Learning and Assessment in Higher Education

    A Planning Guide
    • 1st Edition
    • Robyn Benson + 1 more
    • English
    The use of e-learning strategies in teaching is becoming increasingly popular, particularly in higher education. Online Learning and Assessment in Higher Education recognises the key decisions that need to be made by lecturers in order to introduce e-learning into their teaching. An overview of the tools for e-learning is provided, including the use of Web 2.0 and the issues surrounding the use of e-learning tools such as resources and support and institutional policy. The second part of the book focuses on e-assessment; design principles, different forms of online assessment and the benefits and limitations of e-assessment.
  • Metrics and Methods for Security Risk Management

    • 1st Edition
    • Carl Young
    • English
    Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, transmission, and storage of information may represent security problem. Metrics and Methods for Security Risk Management is of interest, especially since the 9/11 terror attacks, because it addresses the ways to manage risk security in the corporate world. The book aims to provide information about the fundamentals of security risks and the corresponding components, an analytical approach to risk assessments and mitigation, and quantitative methods to assess the risk components. In addition, it also discusses the physical models, principles, and quantitative methods needed to assess the risk components. The by-products of the methodology used include security standards, audits, risk metrics, and program frameworks. Security professionals, as well as scientists and engineers who are working on technical issues related to security problems will find this book relevant and useful.
  • Microsoft Windows Server 2008 R2 Administrator's Reference

    The Administrator's Essential Reference
    • 1st Edition
    • Dustin Hannifin
    • English
    Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the available editions; and discusses its deployment. After introducing Windows Server 2008 R2, the book explains its installation and configuration processes followed by its networking. It also examines different features, such as the active directory, internet information services 7.5, Hyper-V, and PowerShell V2. It discusses securing Windows Server 2008 R2 files and its print services, remote desktop services, high-availability and recovery features, and monitoring and troubleshooting; in addition, their delta changes are discussed in the final chapter. The book also explores the features that influence both Windows Server 2008 R2 and Windows 7. These features allow the server operating system to work with Windows 7. One feature is the BranchCache, which offers users who open files across a Wide Area Network a better end-user experience by caching copy in the branch office when a document or intranet Web site is opened for the first time. Another feature is DirectAccess, which is the new remote connectivity solution for Windows networks.
  • Epidemiology and Demography in Public Health

    • 1st Edition
    • Japhet Killewo + 2 more
    • English
    Epidemiology and Demography in Public Health provides practical guidance on planning and implementing surveillance and investigation of disease and disease outbreaks. Exploring contributing factors to the dynamics of disease transmission and the identification of population risks, it also includes a discussion of ehtics in epidemiology and demography including important issues of privacy vs. public safety. With a chapter on H1N1 and Bird flu, this book will be important for students and professionals in public health and epidemiology.
  • Digital Forensics for Network, Internet, and Cloud Computing

    A Forensic Evidence Guide for Moving Targets and Data
    • 1st Edition
    • Clint P Garrison + 2 more
    • English
    Network forensics is an evolution of typical digital forensics, in which evidence is gathered from network traffic in near real time. This book will help security and forensics professionals as well as network administrators build a solid foundation of processes and controls to identify incidents and gather evidence from the network. Forensic scientists and investigators are some of the fastest growing jobs in the United States with over 70,000 individuals employed in 2008. Specifically in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10,000 qualified specialists. Almost every technology company has developed or is developing a cloud computing strategy. To cut costs, many companies are moving toward network-based applications like SalesForce.com, PeopleSoft, and HR Direct. Every day, we are moving companies’ proprietary data into a cloud, which can be hosted anywhere in the world. These companies need to understand how to identify where their data is going and what they are sending.
  • Online and Blended Business Education for the 21st Century

    Current Research and Future Directions
    • 1st Edition
    • J B Arbaugh
    • English
    Examines the state of research of online and blended learning in business disciplines with the intent of identifying opportunities for meaningful future research and enhancing the practice of online teaching in business schools. The book evaluates research from business disciplines such as accounting, economics, finance, information systems (IS), management, marketing, and operations/supply chain management. The author reports on topics attracting interest from scholars in the respective disciplines, the methods commonly used to examine those topics, and the most noteworthy conclusions to date from that research.
  • Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

    • 1st Edition
    • Brian Baskin + 3 more
    • English
    Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled “The F0rb1dd3n Network,” tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, “Security Threats Are Real” (STAR), focuses on these real-world lessons.The F0rb1dd3n Network can be read as a stand-alone story or as an illustration of the issues described in STAR. Throughout The F0rb1dd3n Network are “Easter eggs”—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on The F0rb1dd3n Network, STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.
  • Visionary Leaders for Information

    • 1st Edition
    • Arthur Winzenried
    • English
    This book examines the theory, behaviour, connections and issues of modern information organizations. Asking leading professionals where we may be in the near future, it challenges both our perceptions and preconceptions. Posing perhaps the most vital question of all… Are we prepared? Do we have a vision?