Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • The Lessons Learned Handbook

    Practical Approaches to Learning from Experience
    • 1st Edition
    • Nick Milton
    • English
    The phrase “lessons learned” is such a common one, yet people struggle with developing effective lessons learned approaches. The Lessons Learned Handbook is written for the project manager, quality manager or senior manager trying to put in place a system for learning from experience, or looking to improve the system they have. Based on experience of successful and unsuccessful systems, the author recognises the need to convert learning into action. For this to happen, there needs to be a series of key steps, which the book guides the reader through. The book provides practical guidance to learning from experience, illustrated with case histories from the author, and from contributors from industry and the public sector.
  • Practising Information Literacy

    Bringing Theories of Learning, Practice and Information Literacy Together
    • 1st Edition
    • Annemaree Lloyd + 1 more
    • English
    This book showcases new interdisciplinary academic research on the relationship between information literacy and learning. It combines findings with new understandings drawn from theoretical and empirical research conducted in primary and secondary schools, higher education, workplaces, and community contexts. The studies offer new insights into questions such as how transferable are the information practices and skills learned in one context to other contexts? What is the degree to which information competences are generic, to what degree are they domain and context specific? What are the kinds of challenges and outcomes that emerge from incorporating information literacy into education and training courses? And, most importantly, what kinds of theories and philosophies regarding the nature of learning, information, and knowledge, should information literacies education and research efforts be based on?
  • A Practical Writing Guide for Academic Librarians

    Keeping It Short and Sweet
    • 1st Edition
    • Anne Langley + 1 more
    • English
    Mastering the skills necessary for clear, effective writing can make writing tasks flow more easily. This book helps academic librarians who are new to the profession or new to a supervisory or management position, as well as those who want to be more productive and make the their writing for work go more smoothly. From progress reports to project plans, cover letters to case studies and book reviews to blogging, readers will find examples and how-tos for most of the types of writing they need to do in their academic library careers.
  • Web 2.0 and Libraries

    Impacts, Technologies and Trends
    • 1st Edition
    • Dave Parkes + 1 more
    • English
    In a world where computing power, ubiquity and connectivity create powerful new ways to facilitate learning, this book examines how librarians and information professionals can utilize emerging technologies to expand service and resource delivery. With contributions from leading professionals, including lecturers, librarians and e-learning technologists, this bookl explores strategic approaches for effectively implementing, living with, and managing revolutionary technological change in libraries.
  • Microsoft Virtualization

    Master Microsoft Server, Desktop, Application, and Presentation Virtualization
    • 1st Edition
    • Thomas Olzak + 3 more
    • English
    Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization serves a thorough reference for those considering a migration into the virtualized world. It provides the tools and explanations needed to create a fresh virtualization environment. Readers walk through step-by-step instructions on everything from building a Windows 2008 server to installing and configuring Hyper-V and App-V. The book begins with the basics of virtualization, including the role of virtualization in the changing landscape of the traditional data center and its benefits, and the strategies of virtualization. It presents the step-by-step process used to build a Windows 2008 server and the process of configuring and managing a Hyper-V infrastructure. Microsoft's approach to high availability and the combination of Microsoft tools to provide a very reliable and highly available virtualization infrastructure are discussed. The chapters also cover the migration of physical servers to virtual servers; the Dynamic Data Center concept; creating and publishing a virtual application within App-V; and desktop virtualization. This book was intended for seasoned system administrators and engineers who grew up in and still manage primarily a hardware-based server environment containing a large assortment of both newer and legacy applications.
  • Seven Deadliest Social Network Attacks

    • 1st Edition
    • Carl Timm + 1 more
    • English
    Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a comprehensive view into how such attacks have impacted the livelihood and lives of adults and children. It lays out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book is separated into seven chapters, with each focusing on a specific type of attack that has been furthered with social networking tools and devices. These are: social networking infrastructure attacks; malware attacks; phishing attacks; Evil Twin Attacks; identity theft; cyberbullying; and physical threat. Each chapter takes readers through a detailed overview of a particular attack to demonstrate how it was used, what was accomplished as a result, and the ensuing consequences. In addition to analyzing the anatomy of the attacks, the book offers insights into how to develop mitigation strategies, including forecasts of where these types of attacks are heading. This book can serve as a reference guide to anyone who is or will be involved in oversight roles within the information security field. It will also benefit those involved or interested in providing defense mechanisms surrounding social media as well as information security professionals at all levels, those in the teaching profession, and recreational hackers.
  • Seven Deadliest Unified Communications Attacks

    • 1st Edition
    • Dan York
    • English
    Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints; eavesdropping and modification attacks; control channel attacks; attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection; attacks on identity; and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability. This book will be of interest to information security professionals of all levels as well as recreational hackers.
  • Microsoft Windows 7 Administrator's Reference

    Upgrading, Deploying, Managing, and Securing Windows 7
    • 1st Edition
    • Jorge Orchilles
    • English
    Microsoft Windows 7 Administrators Reference covers various aspects of Windows 7 systems, including its general information as well as installation and upgrades. This reference explains how to deploy, use, and manage the operating system. The book is divided into 10 chapters. Chapter 1 introduces the Windows 7 and the rationale of releasing this operating system. The next chapter discusses how an administrator can install and upgrade the old operating system from Windows Vista to Windows 7. The deployment of Windows 7 in an organization or other environment is then explained. It also provides the information needed to deploy Windows 7 easily and quickly for both the administrator and end users. Furthermore, the book provides the features of Windows 7 and the ways to manage it properly. The remaining chapters discuss how to secure Windows 7, as well as how to troubleshoot it. This book will serve as a reference and guide for those who want to utilize Windows 7.
  • Seven Deadliest USB Attacks

    • 1st Edition
    • Brian Anderson + 1 more
    • English
    Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally susceptible to similar attacks. If you need to keep up with the latest hacks, attacks, and exploits effecting USB technology, then this book is for you. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The attacks outlined in this book are intended for individuals with moderate Microsoft Windows proficiency. The book provides the tools, tricks, and detailed instructions necessary to reconstruct and mitigate these activities while peering into the risks and future aspects surrounding the respective technologies. There are seven chapters that cover the following: USB Hacksaw; the USB Switchblade; viruses and malicious codes; USB-based heap overflow; the evolution of forensics in computer security; pod slurping; and the human element of security, including the risks, rewards, and controversy surrounding social-engineering engagements. This book was written to target a vast audience including students, technical staff, business leaders, or anyone seeking to understand fully the removable-media risk for Windows systems. It will be a valuable resource for information security professionals of all levels, as well as web application developers and recreational hackers.
  • The Risk Management of Safety and Dependability

    A Guide for Directors, Managers and Engineers
    • 1st Edition
    • W Wong
    • English
    The issue of risk should be embedded into the mindset of every engineer and manager to improve safety and dependability. Companies can be held accountable through law when a gross failing in health and safety management has fatal consequences. Here risk management, the organisational structure required and the main factors needed for its successful execution are explored. What risks must be managed as a legal requirement? How is risk quantified? What methods can be used to reduce risk? Such questions are addressed, alongside case histories of disasters to illustrate failures in risk management.In an easy-to-read and accessible way, The risk management of safety and dependability presents the key factors involved in successful risk management, so that even non-experts in small and medium-sized organisations, as well as engineers and managers, can apply sound safety and dependability principles.