Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Nokia Firewall, VPN, and IPSO Configuration Guide

    • 1st Edition
    • Andrew Hay + 2 more
    • English
    "While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements."--Chri... Christiansen, Vice President, Internet Infrastructure and Security Software, IDC.Syngress has a long history of publishing market-leading books for system administrators and security professionals on commercial security products, particularly Firewall and Virtual Private Network (VPN) appliances from Cisco, Check Point, Juniper, SonicWall, and Nokia (see related titles for sales histories). The Nokia Firewall, VPN, and IPSO Configuration Guide will be the only book on the market covering the all-new Nokia Firewall/VPN Appliance suite. Nokia Firewall/VPN appliances are designed to protect and extend the network perimeter.According to IDC research, Nokia Firewall/VPN Appliances hold the #3 worldwide market-share position in this space behind Cisco and Juniper/NetScreen. IDC estimated the total Firewall/VPN market at $6 billion in 2007, and Nokia owns 6.6% of this market. Nokia's primary customers for security appliances are Mid-size to Large enterprises who need site-to-site connectivity and Mid-size to Large enterprises who need remote access connectivity through enterprise-deployed mobile devices. Nokia appliances for this market are priced form $1,000 for the simplest devices (Nokia IP60) up to $60,0000 for large enterprise- and service-provider class devices (like the Nokia IP2450 released in Q4 2007). While the feature set of such a broad product range obviously varies greatly, all of the appliances run on the same operating system: Nokia IPSO (IPSO refers to Ipsilon Networks, a company specializing in IP switching acquired by Nokia in 1997. The definition of the acronym has little to no meaning for customers.) As a result of this common operating system across the product line, The Nokia Firewall, VPN, and IPSO Configuration Guide will be an essential reference to users of any of these products. Users manage the Nokia IPSO (which is a Linux variant, specifically designed for these appliances) through a Web interface called Nokia Network Voyager or via a powerful Command Line Interface (CLI). Coverage within the book becomes increasingly complex relative to the product line.The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. The book contains special chapters devoted to mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface. In addition, the companion Web site offers downloadable video walkthroughs on various installation and troubleshooting tips from the authors.
  • Next Generation SSH2 Implementation

    Securing Data in Motion
    • 1st Edition
    • Dale Liu
    • English
    New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA... SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.
  • Mobile Malware Attacks and Defense

    • 1st Edition
    • Ken Dunham
    • English
    Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.* Visual PayloadsView attacks as visible to the end user, including notation of variants.* Timeline of Mobile Hoaxes and ThreatsUnderstand the history of major attacks and horizon for emerging threates.* Overview of Mobile Malware FamiliesIdentify and understand groups of mobile malicious code and their variations.* Taxonomy of Mobile MalwareBring order to known samples based on infection, distribution, and payload strategies.* Phishing, SMishing, and Vishing AttacksDetect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.* Operating System and Device VulnerabilitiesAnaly... unique OS security issues and examine offensive mobile device threats.* Analyze Mobile MalwareDesign a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware.* Forensic Analysis of Mobile MalwareConduct forensic analysis of mobile devices and learn key differences in mobile forensics.* Debugging and Disassembling Mobile MalwareUse IDA and other tools to reverse-engineer samples of malicious code for analysis.* Mobile Malware Mitigation MeasuresQualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.
  • SAP Security Configuration and Deployment

    The IT Administrator's Guide to Best Practices
    • 1st Edition
    • Joey Hirao
    • English
    Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It's a complex area that requires focused expertise.This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations.Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security.
  • A Leadership Primer for New Librarians

    Tools for Helping Today’s Early-Career Librarians Become Tomorrow’s Library Leaders
    • 1st Edition
    • Suzanne Byke + 1 more
    • English
    This book provides strategies and practical tips for leadership development in the field of librarianship. With the increase of both new graduates entering the field and upcoming retirements, there is a foreseeable gap in library leadership. Many early-career librarians will move into roles they are not ready for and others will find themselves having to lead without being in traditional leadership roles. This book offers suggestions for librarians facing these challenging new circumstances. The book shows how to create leadership opportunities when none appear to be present, how to take charge of your own professional development, and how to become an effective follower as well as an effective leader. The book helps the reader to recognize and take advantage of the leadership opportunities set before them.
  • A Sense of Control

    Virtual Communities for People with Mobility Impairments
    • 1st Edition
    • Christine Tilley
    • English
    This work develops a theoretical framework for a virtual community for people with long-term, severe mobility disabilities. It proposes strategies for implementing a virtual community model based on user information needs. The central theme to emerge from their narratives is how the use of information and communications technology (ICT) allows them to regain a sense of control. The conclusion is that the technology provides strategies for independence and facilitates self-empowerment.
  • Disaster Communications in a Changing Media World

    • 1st Edition
    • George Haddow + 1 more
    • English
    Communications is key to the success of disaster mitigation, preparedness, response and recovery. Accurate information disseminated to the general public, to elected officials and community leaders, and to the media reduces risk, saves lives and property, and speeds recovery. The ability to communicate is no longer an afterthought or a luxury; timely communication is now as important as logistics or the pre-deployment of materials. Planning and controlling the flow of information before, during and after a disaster will define your organization's credibility, trustworthiness, authority, and effectiveness.The emergence of new media like the internet, e-mail, blogs, text messaging, cell phone photos, and the increasing role played by "first informers"-- witnesses who now have the ability to transmit information immediately from the event--are redefining the roles of government and media.The government's historical role as gatekeeper is now an anachronism. Traditional media's role as the sole conduit of reliable and officially-sanctione... information has been eclipsed by the advent of new media. The tools and rules of communications are evolving and disaster communications must evolve to capitalize on these changes and exploit the opportunities they provide. Bloggers have the potential either to add to the chaos during a crisis, or to help convey accurate data and report on local conditions. Disaster communications must incorporate a way to manage their impact and if possible use them for the common good.Finally, even though the means to the end are evolving, the goals, the values, and the underlying principles of effective disaster communication-- the need for transparency, increased accessibility, trustworthiness and reliability, and to create partnerships with the media--have not changed and need to be embraced along with the practical ability to convey information effectively.
  • Concise Encyclopedia of Languages of the World

    • 1st Edition
    • Keith Brown + 1 more
    • English
    Concise Encyclopedia of Languages of the World is an authoritative single-volume reference resource comprehensively describing the major languages and language families of the world. It will provide full descriptions of the phonology, semantics, morphology, and syntax of the world’s major languages, giving insights into their structure, history and development, sounds, meaning, structure, and language family, thereby both highlighting their diversity for comparative study, and contextualizing them according to their genetic relationships and regional distribution.Based on the highly acclaimed and award-winning Encyclopedia of Language and Linguistics, this volume will provide an edited collection of almost 400 articles throughout which a representative subset of the world's major languages are unfolded and explained in up-to-date terminology and authoritative interpretation, by the leading scholars in linguistics. In highlighting the diversity of the world’s languages — from the thriving to the endangered and extinct — this work will be the first point of call to any language expert interested in this huge area. No other single volume will match the extent of language coverage or the authority of the contributors of Concise Encyclopedia of Languages of the World.
  • E-discovery: Creating and Managing an Enterprisewide Program

    A Technical Guide to Digital Investigation and Litigation Support
    • 1st Edition
    • Karen A. Schuler
    • English
    One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI). According to the 2007 Socha-Gelbmann Electronic Discovery Survey, it is now a $2 billion industry, a 60% increase from 2004, projected to double by 2009. The core reason for the explosion of e-discovery is sheer volume; evidence is digital and 75% of modern day lawsuits entail e-discovery.A recent survey reports that U.S. companies face an average of 305 pending lawsuits internationally. For large U.S. companies ($1 billion or more in revenue)that number has soared to 556 on average, with an average of 50 new disputes emerging each year for nearly half of them. To properly manage the role of digital information in an investigative or legal setting, an enterprise--whether it is a Fortune 500 company, a small accounting firm or a vast government agency--must develop an effective electronic discovery program. Since the amendments to the Federal Rules of Civil Procedure, which took effect in December 2006, it is even more vital that the lifecycle of electronically stored information be understood and properly managed to avoid risks and costly mistakes. This books holds the keys to success for systems administrators, information security and other IT department personnel who are charged with aiding the e-discovery process.
  • Aspects of Explosives Detection

    • 1st Edition
    • Maurice Marshall + 1 more
    • English
    Detection and quantification of trace chemicals is a major thrust of analytical chemistry. In recent years much effort has been spent developing detection systems for priority pollutants. Less mature are the detections of substances of interest to law enforcement and security personnel:in particular explosives. This volume will discuss the detection of these, not only setting out the theoretical fundamentals, but also emphasizing the remarkable developments in the last decade. Terrorist events—airplanes blown out of the sky (PanAm 103 over Lockerbie) and attacks on U.S. and European cities (Trade Center in New York and the Murrah Federal Building in Oklahoma City, railways in London and Madrid)--emphasize the danger of concealed explosives. However, since most explosives release little vapor, it was not possible to detect them by technology used on most organic substances. After PanAm 103 was downed over Scotland, the U.S. Congress requested automatic explosive detection equipment be placed in airports. This volume outlines the history of explosive detection research, the developments along the way, present day technologies, and what we think the future holds.