Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Stress Processes across the Life Course

    • 1st Edition
    • Volume 13
    • Heather A. Turner + 1 more
    • English
    Stress researchers have become increasing aware of the ways in which structural and psychosocial variations in the life course shape exposure and vulnerability to social stress. This volume of Advances in Life Course Research explores, theoretically and empirically, stress processes both within and across specific life stages. Chapters within this volume incorporate several areas of research, including:• How physical and mental health trajectories are shaped by life course variations in stressors and resources• Stress associated with social role transitions and the significance of different role trajectories for stress exposure and outcomes • Life course variations in the quality and content of institutional contexts (such as school, work and family) and their significance for stress processes• Differenc... in types, levels, and effects of different stress-moderating resources within and across life course stages• Ways in which race, gender, and social class influence or condition stress processes over the life course• The relevance of “linked lives” within families and across generations for stress exposure and vulnerability• Histo... variations in stress-related conditions and cohort differences in stress experiences• Methodo... and theoretical advances in studying stress processes across the life course
  • Techno Security's Guide to Securing SCADA

    A Comprehensive Handbook On Protecting The Critical Infrastructure
    • 1st Edition
    • Greg Miles + 8 more
    • English
    Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--ever... from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independ... concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.
  • Transportation Security

    • 1st Edition
    • Clifford Bragdon
    • English
    Insecure transportation systems are costing our worldwide mobility-based economy as much as 6% of GDP annually. The effectiveness of security measures vary widely. In the United States, depending on the mode of transportation, it ranges from “medium effectiveness” for airports to “low effectiveness” for maritime, rail, transit, and intermodal activities. Situational awareness and interoperability are lacking as we try to deal with both natural and man-made disasters. Regardless of the transport mode, improvements are essential if governments and corporations are to address security planning, response, and national preparedness. Transportation Security examines this problem in a comprehensive manner and addresses security-based technologies and solutions to minimize risk.
  • Nuclear Safeguards, Security and Nonproliferation

    Achieving Security with Technology and Policy
    • 1st Edition
    • James Doyle
    • James Doyle
    • English
    With an increase of global security concerns over potential terrorist acts, the threat of WMDs, and increasing political issues with nations seeking nuclear capability, the need to track, detect, and safeguard nuclear material globally has never been greater. Nuclear Safeguards, Security and Nonproliferation is a comprehensive reference that covers cutting-edge technologies used to trace, track, and safeguard nuclear material. It is a contributed volume with sections contributed by scientists from leading institutions such as Los Alamos National Labs, Sandia National Labs, Pacific Northwest Nuclear Labs, and Texas A&M University, and the Monterey Institute of International Studies. The book is divided into 3 sections and includes 30 chapters on such topics as - the security of nuclear facilities and material, the illicit trafficking of nuclear materials, improvised nuclear devices, how to prevent nuclear terrorism. International case studies of security at nuclear facilities and illegal nuclear trade activities provide specific examples of the complex issues surrounding the technology and policy for nuclear material protection, control and accountability. Specific cases include analysis of the timely issues in the nuclear programs of countries such as North Korea, Iran, and Kazakstan among others. Nuclear Security is a must-have volume for the dozens of private and public organizations involved in driving Homeland Security, domestic, and international policy issues relating to nuclear material security, non-proliferation, and nuclear transparency.
  • A Short-Cut to Marketing the Library

    • 1st Edition
    • Zuzana Helinsky
    • English
    Technological changes mean that the role of libraries is now not as obvious or assured as in the past. This means that to survive, libraries must actively market their products and services to their users and to their funding sources. A concise handbook which spells out the critical need for marketing for libraries, A Short-cut to Marketing The Library provides a series of practical and accessible tools to achieve success and includes publishers marketing suggestions.
  • Global Information Inequalities

    Bridging the Information Gap
    • 1st Edition
    • Deborah Charbonneau
    • English
    The disparity in access to information is a worldwide phenomenon. Global Information Inequalities offers a captivating look into problems of information access across the world today. One of the unique strengths of the book is the use of examples of library initiatives from around the world to illustrate the range of possibilities for equitable access and library service delivery in a global context. It contains numerous examples of a wide variety of information problems and solutions ranging from developing literacy programs in rural communities in Tanzania, building school libraries in China, making government-related information more transparent in Chile, to exploring how digital technologies have the potential to revolutionize the lives of people with sensory-disabilities... The contributions in Global Information Inequalities address a number of core professional issues, including access to information, library services, collection development, global collaboration, intellectual property, and digital information. The contributors are from Argentina, Canada, Chile, China, Iceland, Malaysia, Peru, South Africa, Tanzania, United States, and Zambia, thereby providing a wide range of perspectives on librarianship. Written in a simple, thorough, and multidisciplinary approach, the book presents and discusses key issues in various library settings and from different perspectives. Overall, this work contributes to a global examination and exploration of libraries in various parts of the world. This book has a wide appeal and is applicable to various library environments (including academic, public, and special libraries).
  • Malware Forensics

    Investigating and Analyzing Malicious Code
    • 1st Edition
    • Eoghan Casey + 2 more
    • English
    Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of live forensics, where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss live forensics on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. It is the first book detailing how to perform live forensic techniques on malicious code. The book gives deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more. It explores over 150 different tools for malware incident response and analysis, including forensic tools for preserving and analyzing computer memory. Readers from all educational and technical backgrounds will benefit from the clear and concise explanations of the applicable legal case law and statutes covered in every chapter. In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter. This book is intended for system administrators, information security professionals, network personnel, forensic examiners, attorneys, and law enforcement working with the inner-workings of computer memory and malicious code.
  • The IT / Digital Legal Companion

    A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
    • 1st Edition
    • Gene K. Landy + 1 more
    • English
    The IT/Digital Legal Companion is a comprehensive business and legal guidance covering intellectual property for digital business; digital contract fundamentals; open source rules and strategies; development, consulting and outsourcing; software as a service; business software licensing, partnering, and distribution; web and Internet agreements; privacy on the Internet; digital multimedia content clearance and distribution; IT standards; video game development and content deals; international distribution; and user-created content, mash-ups, MMOGs, and web widgets.Chapters deal with topics such as copyrights on the Internet, for software protection and around the world; trademarks and domain names; patents and digital technology companies; trade secrets and non-disclosure agreements; confidentiality, rights transfer, and non-competition agreements for employees; introduction to digital product and service contracts; a pragmatic guide to open source; IT services - development, outsourcing, and consulting; beta test agreements; commercial end-user agreements; terms of use for web sites and online applications; privacy and use of personal data; digital technology standards - opportunities, risks, and strategies; content for digital media; and deals in the web and mobile value chains.This book is intended for executives, entrepreneurs, finance and business development officers; technology and engineering officers; marketers, licensing professionals, and technology professionals; in-house counsel; and anyone else that deals with software or digital technology in business.
  • Securing Citrix XenApp Server in the Enterprise

    • 1st Edition
    • Tariq Azad
    • English
    Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains.
  • Kismet Hacking

    • 1st Edition
    • Frank Thornton + 2 more
    • English
    Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.