Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Cruise to Success

    How to Steer Your Way through the Murky Waters of Marketing Your Library
    • 1st Edition
    • Loreen Phillips
    • English
    Cruise to Success is a hands-on guide and handbook to create a library marketing campaign. Examples and step-by-step instructions assist both the novice and expert in presenting a campaign to attract the campus community to the library’s resources.
  • Librarians of Babel

    A Toolkit for Effective Communication
    • 1st Edition
    • Paola de Castro
    • English
    A librarian’s main task is to acquire, organize, process, retrieve and disseminate information to all possible users, but also to communicate and develop professional skills in this field. This collection offers an introduction to the different challenges that librarians and information specialists are called upon to carry out in order to achieve effective communication through different media. The main elements of professional writing, conference or workshop organization power point presentations are outlined.
  • Emerging Technologies for Academic Libraries in the Digital Age

    • 1st Edition
    • LiLi Li
    • English
    This book is written to promote academic strategic management and envision future innovations for academic library resources, services and instructions in the digital age. It provides academic executives, consultants, instructors, IT specialists, librarians, LIS students, managers, trainers and other professionals with the latest information for developing trends of emerging technologies applied to student-centred and service-oriented academic learning environments. This book explores various fields where key emerging technologies may have great implications on academic library information technologies, academic library management, academic library information services, and academic library internal operations.
  • China-Asean Relations and International Law

    • 1st Edition
    • Zou Keyuan
    • English
    Our contemporary era has witnessed the remarkable development of China-ASEAN relations. Both sides have pledged to establish and develop a comprehensive cooperation. However, any development of international relations is governed by international legal principles, norms and rules, such as the Charter of the United Nations and general international law. There is no exception for China-ASEAN relations. The book discusses and explains China-ASEAN relations from an international law perspective and covers a wide range of legal topics and legal issues.
  • The Internet and Higher Education

    Achieving Global Reach
    • 1st Edition
    • Alfred Rovai
    • English
    The purpose of this book is to increase understanding of the major theories, issues, challenges, and solutions related to online distance education. It balances practical advice with a description of the theoretical and research-based underpinnings for the culturally-responsiv... strategies presented. An important integrating theme is the impact of globalization and internationalization on all aspects of distance education. Consequently, the book examines the implications of global reach and cross-border education and promotes the integration of global learning in academic programs.
  • Introduction to Criminalistics

    The Foundation of Forensic Science
    • 1st Edition
    • Barry A.J. Fisher + 2 more
    • English
    Introduction to Criminalistics covers the basics of Criminalistics in a textbook for a one or two semester course, with the intention of preparing the student for a future in forensic science. The role of the Criminalist is to analyze, compare, identify, and interpret physical evidence in the crime lab. These crime labs, or forensic labs, have two primary functions: identifying evidence and linking the suspect, victim, and crime scene through physical evidence. This new primer introduces the learner to the structure and organization of the crime lab and to the role of the Criminalist. It features real cases – recent and historic – to illustrate concepts. Colorful pedagogy clearly defines chapter elements and sets this text apart from next best. Topics covered include how to process a crime scene and preserve evidence, the basic principles of firearm examination, latent fingerprints, and rudimentary toxicology, or how to determine the presence or absence of drugs and poisons. Well organized and methodical, this textbook has the potential to become the standard text for applying techniques of the physical and natural sciences to examining physical evidence.
  • Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

    • 1st Edition
    • Jesse Varsalone
    • English
    This book provides digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic investigators and security professionals subsequently can use data gathered from these devices to aid in the prosecution of criminal cases, litigate civil cases, audit adherence to federal regulatory compliance issues, and identify breech of corporate and government usage policies on networks. MAC Disks, Partitioning, and HFS+ File System Manage multiple partitions on a disk, and understand how the operating system stores data.FileVault and Time Machine Decrypt locked FileVault files and restore files backed up with Leopard's Time Machine.Recovering Browser History Uncover traces of Web-surfing activity in Safari with Web cache and .plist filesRecovering Email Artifacts, iChat, and Other Chat Logs Expose communications data in iChat, Address Book, Apple's Mail, MobileMe, and Web-based email.Locating and Recovering Photos Use iPhoto, Spotlight, and shadow files to find artifacts pof photos (e.g., thumbnails) when the originals no longer exist.Finding and Recovering QuickTime Movies and Other Video Understand video file formats--created with iSight, iMovie, or another application--and how to find them.PDF, Word, and Other Document Recovery Recover text documents and metadata with Microsoft Office, OpenOffice, Entourage, Adobe PDF, or other formats.Forensic Acquisition and Analysis of an iPod Documentseizure of an iPod model and analyze the iPod image file and artifacts on a Mac.Forensic Acquisition and Analysis of an iPhone Acquire a physical image of an iPhone or iPod Touch and safely analyze without jailbreaking.
  • Disappearing Cryptography

    Information Hiding: Steganography and Watermarking
    • 3rd Edition
    • Peter Wayner
    • English
    Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates.
  • Securing Intellectual Property

    Protecting Trade Secrets and Other Information Assets
    • 1st Edition
    • Information Information Security
    • English
    Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
  • Virtualization for Security

    Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
    • 1st Edition
    • John Hoopes
    • English
    One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. A recent report by IT research firm IDC predicts the virtualization services market will grow from $5.5 billion in 2006 to $11.7 billion in 2011. With this growth in adoption, becoming increasingly common even for small and midsize businesses, security is becoming a much more serious concern, both in terms of how to secure virtualization and how virtualization can serve critical security objectives. Titles exist and are on the way to fill the need for securing virtualization, but security professionals do not yet have a book outlining the many security applications of virtualization that will become increasingly important in their job requirements. This book is the first to fill that need, covering tactics such as isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network, migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threats to actual production systems.About the TechnologiesA sandbox is an isolated environment created to run and test applications that might be a security risk. Recovering a compromised system is as easy as restarting the virtual machine to revert to the point before failure. Employing virtualization on actual production systems, rather than just test environments, yields similar benefits for disaster recovery and high availability. While traditional disaster recovery methods require time-consuming reinstallation of the operating system and applications before restoring data, backing up to a virtual machine makes the recovery process much easier, faster, and efficient. The virtual machine can be restored to same physical machine or an entirely different machine if the original machine has experienced irreparable hardware failure. Decreased downtime translates into higher availability of the system and increased productivity in the enterprise.Virtualiz... has been used for years in the field of forensic analysis, but new tools, techniques, and automation capabilities are making it an increasingly important tool. By means of virtualization, an investigator can create an exact working copy of a physical computer on another machine, including hidden or encrypted partitions, without altering any data, allowing complete access for analysis. The investigator can also take a live ?snapshot? to review or freeze the target computer at any point in time, before an attacker has a chance to cover his tracks or inflict further damage.A honeypot is a system that looks and acts like a production environment but is actually a monitored trap, deployed in a network with enough interesting data to attract hackers, but created to log their activity and keep them from causing damage to the actual production environment. A honeypot exposes new threats, tools, and techniques used by hackers before they can attack the real systems, which security managers patch based on the information gathered. Before virtualization became mainstream, setting up a machine or a whole network (a honeynet) for research purposes only was prohibitive in both cost and time management. Virtualization makes this technique more viable as a realistic approach for companies large and small.