Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Seven Deadliest Network Attacks

    • 1st Edition
    • Stacy Prowell + 2 more
    • English
    Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book consists of seven chapters that deal with the following attacks: denial of service; war dialing; penetration testing; protocol tunneling; spanning tree attacks; man-in-the-middle; and password replay. These attacks are not mutually exclusive and were chosen because they help illustrate different aspects of network security. The principles on which they rely are unlikely to vanish any time soon, and they allow for the possibility of gaining something of interest to the attacker, from money to high-value data. This book is intended to provide practical, usable information. However, the world of network security is evolving very rapidly, and the attack that works today may (hopefully) not work tomorrow. It is more important, then, to understand the principles on which the attacks and exploits are based in order to properly plan either a network attack or a network defense. Seven Deadliest Network Attacks will appeal to information security professionals of all levels, network admins, and recreational hackers.
  • Workplace Violence

    Planning for Prevention and Response
    • 1st Edition
    • Kim Kerr
    • English
    Workplace violence in all its forms is becoming more prevalent and pervasive every year. Workplace Violence: Planning for Prevention and Response gives a comprehensive account of the problem using a multi-faceted approach to the issues surrounding workplace violence incidents, addressing how the topic affects victims, witnesses, the workforce, family members, and management. A series of chapters helps organizations to form action and response plans to manage incidents both large and small. The focus also includes organizations that are forced to address violent individuals in settings where law enforcement may not be immediately available. Kerr speaks first-hand about complex issues like corporate liability for violent or threatening acts committed by employees, as well as issues of privacy, and he includes chapters written by experts on legal issues, cyberthreats, and anger in the workplace. This book belongs on the desk of every security manager and HR professional, and offers solid advice to all managers regardless of the size of their organization.
  • Libraries and Identity

    The Role of Institutional Self-Image and Identity in the Emergence of New Types of Libraries
    • 1st Edition
    • Joacim Hansson
    • English
    Libraries and Identity summarizes the role of institutional identity in the emergence of new types of libraries such as joint-use libraries and digital libraries. Professional and institutional identity has shown to be one of the most problematic, yet overlooked issues to deal with when traditional libraries such as public libraries and academic libraries develop into new shapes. The author clearly outlines the importance of identity in making change and innovation in libraries understandable. Based on original research the book comprehensively explores the role of identity as a trigger for change and development in libraries.
  • Customer Care

    A Training Manual for Library Staff
    • 1st Edition
    • Pat Gannon-Leary + 1 more
    • English
    Customer Care provides a detailed course suitable for delivery to library staff at all levels. It can be used as a stand-alone reference work for customer care processes and procedures or, alternatively, it can be used by library staff to tailor a customer care course to suit the requirements and training needs of their own staff.
  • Abstracts and Abstracting

    A Genre and Set of Skills for the Twenty-First Century
    • 1st Edition
    • Tibor Koltay
    • English
    Despite their changing role, abstracts remain useful in the digital world. Highly beneficial to information professionals and researchers who work and publish in different fields, this book summarizes the most important and up-to-date theory of abstracting, as well as giving advice and examples for the practice of writing different kinds of abstracts. The book discusses the length, the functions and basic structure of abstracts, outlining a new approach to informative and indicative abstracts. The abstractors’ personality, their linguistic and non-linguistic knowledge and skills are also discussed with special attention.
  • Productivity for Librarians

    How to Get More Done in Less Time
    • 1st Edition
    • Samantha Hines
    • English
    Productivity for Librarians provides tips and tools for organizing, prioritizing and managing time along with reducing stress. The book presents a resources guide for continued learning about and exploration of productivity in relation to individual circumstances featuring motivation, procrastination and time management guidelines. Addressing the unique challenges faced by librarians, the author supplies a balanced view of a variety of tools and techniques for dealing with overwork and stress.
  • Seven Deadliest Wireless Technologies Attacks

    • 1st Edition
    • Brad Haines
    • English
    Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised. This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.
  • The Professional Protection Officer

    Practical Security Strategies and Emerging Trends
    • 1st Edition
    • IFPO
    • Sandi J. Davies
    • English
    The Professional Protection Officer: Security Strategies, Tactics and Trends, Second Edition, is the definitive reference and instructional text for career oriented security officers in both the private and public sectors. The first edition originated with the birth of the International Foundation for Protection Officers (IFPO) in 1988, which has been using the book as the official text since that time. Each subsequent edition has brought new and enlightened information to the protection professional. The material in this new edition includes all of the subjects essential to training of protection professionals, and has been updated to reflect new strategies, tactics, and trends in this dynamic field.Written by leading security educators, trainers and consultants, this valuable resource has served as the definitive text for both students and professionals worldwide. This new edition adds critical updates and fresh pedagogy, as well as new diagrams, illustrations, and self assessments. The Professional Protection Officer: Security Strategies, Tactics and Trends is tailored to the training and certification needs of today’s protection professionals and proves to be the most exciting and progressive edition yet.
  • Seven Deadliest Microsoft Attacks

    • 1st Edition
    • Rob Kraus + 3 more
    • English
    Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the most closely guarded company secrets. If you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products, this book is for you. It pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.The book consists of seven chapters that cover the seven deadliest attacks against Microsoft software and networks: attacks against Windows passwords; escalation attacks; stored procedure attacks; mail service attacks; client-side ActiveX and macro attacks; Web service attacks; and multi-tier attacks. Each chapter provides an overview of a single Microsoft software product, how it is used, and some of the core functionality behind the software. Furthermore, each chapter explores the anatomy of attacks against the software, the dangers of an attack, and possible defenses to help prevent the attacks described in the scenarios.This book will be a valuable resource for those responsible for oversight of network security for either small or large organizations. It will also benefit those interested in learning the details behind attacks against Microsoft infrastructure, products, and services; and how to defend against them. Network administrators and integrators will find value in learning how attacks can be executed, and transfer knowledge gained from this book into improving existing deployment and integration practices.
  • Network and System Security

    • 1st Edition
    • John Vacca
    • English
    Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization; cryptography; system intrusion; UNIX and Linux security; Internet security, intranet security; LAN security; wireless network security; cellular network security, RFID security, and more. This compilation of 13 chapters is tightly focused and ideally suited as an essential desk reference in this high-growth subject area.