Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Test and Measurement: Know It All

    • 1st Edition
    • Jon S. Wilson + 4 more
    • English
    The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!Field Application engineers need to master a wide area of topics to excel. The Test and Measurement Know It All covers every angle including Machine Vision and Inspection, Communications Testing, Compliance Testing, along with Automotive, Aerospace, and Defense testing.
  • Building the Agile Enterprise

    With SOA, BPM and MBM
    • 1st Edition
    • Fred A. Cummins
    • English
    In the last ten years IT has brought fundamental changes to the way the world works. Not only has it increased the speed of operations and communications, but it has also undermined basic assumptions of traditional business models and increased the number of variables. Today, the survival of major corporations is challenged by a world-wide marketplace, international operations, outsourcing, global communities, a changing workforce, security threats, business continuity, web visibility, and customer expectations. Enterprises must constantly adapt or they will be unable to compete. Fred Cummins, an EDS Fellow, presents IT as a key enabler of the agile enterprise. He demonstrates how the convergence of key technologies—includi... SOA, BPM and emerging enterprise and data models—can be harnessed to transform the enterprise. Cummins mines his 25 years experience to provide IT leaders, as well as enterprise architects and management consultants, with the critical information, skills, and insights they need to partner with management and redesign the enterprise for continuous change. No other book puts IT at the center of this transformation, nor integrates these technologies for this purpose.
  • Forensic Victimology

    Examining Violent Crime Victims in Investigative and Legal Contexts
    • 1st Edition
    • Brent E. Turvey + 1 more
    • English
    This new textbook provides students with the basic principles and practice standards of forensic victimology--the scientific study of victims for the purposes of addressing investigative and forensic issues. It provides case-based coverage with original insights into the role that victimology plays in the justice system, moving beyond the traditional theoretical approaches already available. The purpose of this textbook is to distinguish the investigative and forensic aspects of victim study as a necessary adjunct to the field of victimology. It identifies forensic victimologists in the investigative and forensic communities and provides them with methods and standards of practice needed to be of service. This book is intended to educate students on the means and rationale for performing victimological assessments with a scientific mindset. Forensic Victimology is designed specifically for teaching the practical aspects of this topic, with “hands on” real-life case examples.
  • GFI Network Security and PCI Compliance Power Tools

    • 1st Edition
    • Brien Posey
    • English
    Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning how to set up sophisticated products is time-consuming, and can be confusing. GFI's LANguard Network Security Scanner reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. To take advantage of the best things that GFI's LANguard Network Security Scanner has to offer, you'll want to configure it on your network so that it captures key events and alerts you to potential vulnerabilities before they are exploited.In this book Brien Posey has pinpointed the most important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively. His straightforward, no nonsense writing style is devoid of difficult to understand technical jargon. His descriptive examples explain how GFI's security tools enhance the security controls that are already built into your server's operating system.* Secure Your Network Master the various components that make up the management console and prepare to use it for most tasks.* Analyze Scan Results View detected vulnerabilities, save and print results, query open ports, and filter your results.* Install and Use the ReportPack Learn how to build custom reports and schedule reports. See how filters allow you to control the information that is processed when a reports is run.* Perform a Hardware Inventory and Compile a Software Inventory Use GFI to do your inventories and perform audits. See how to blacklist and whitelist applications to make your reports more meaningful.* Manage Patches Effectively See how to deploy a specific patch, perform a scan comparison, uninstall a patch, and deploy custom software.* Use GFI EndPointSecurity to Lock Down Hardware Be prepared for users trying to install unauthorized software, copy sensitive data onto removable media, or perform other actions to try and circumvent your network's security.* Create Protection Policies Control the level of device access allowed on a system and create separate protection policies; one for servers, one for workstations, and one for laptops. Learn how to deploy agents.* Regulate Specific Devices Master some of the advanced features of GFI: locking device categories, blacklisting and whitelisting devices, and using file type restrictions.* Monitor Device Usage Keep tabs on your network by setting logging options, setting alerting options, and generating end point security reports.
  • Handbook for the Assessment of Driving Capacity

    • 1st Edition
    • Maria T. Schultheis + 2 more
    • English
    This is a resource for professionals involved in determining the driving capacity of individuals with neurological involvement and or trauma. While much work has been completed in this new and growing field, this is the first attempt to bring together clinical work on assessing driving capacity for different clinical populations and conditions. Specific topics include, traumatic brain injury, stroke, dementia, normal aging, medications, retraining, interventions, medical conditions, legal issues, practical issues, assessment instruments, simulators, research and epidemiology. Each chapter will address clinically relevant issues specific to the clinical population. This comprehensive compilation of driving assessment of cognitively compromised populations is the first of its kind and Dr. Schultheis is regarded as a leader in the field.
  • Finding the Concept, Not Just the Word

    A Librarian’s Guide to Ontologies and Semantics
    • 1st Edition
    • Brandy King + 1 more
    • English
    Aimed at students and professionals within Library and Information Services (LIS), this book is about the power and potential of ontologies to enhance the electronic search process. The book will compare search strategies and results in the current search environment and demonstrate how these could be transformed using ontologies and concept searching. Simple descriptions, visual representations, and examples of ontologies will bring a full understanding of how these concept maps are constructed to enhance retrieval through natural language queries. Readers will gain a sense of how ontologies are currently being used and how they could be applied in the future, encouraging them to think about how their own work and their users' search experiences could be enhanced by the creation of a customized ontology.
  • Knowledge Management

    Systems Implementation: Lessons from the Silicon Valley
    • 1st Edition
    • Hind Benbya
    • English
    This book brings together the results of several years of analysis of knowledge management systems (KMS) implementations and the experience of leading organisations in the Silicon Valley, to provide a practical guide on key strategic, technical and economic aspects of knowledge management systems implementations. It provides a comprehensive and methodological approach to support managers in their implementations of KMS. It is intended to equip current and future managers with some of the knowledge and practical skills to help them navigate their organisations towards knowledge management. Managers must be actively engaged in the emergent process of KMS implementation in a way that does not simply offer exhortations or ensure that the infrastructure is working. This book also goes beyond the implementation process and suggests how to deal with KMS along the maturity process and how to assess and measure the results achieved from KMS. These issues are illustrated in a series of case studies from leading organisations in the Silicon Valley, including Hewlett Packard, IBM, Cisco, Protiviti and Wilson Sonsini Goodrich and Rosati.
  • Encyclopedia of Violence, Peace, and Conflict

    • 2nd Edition
    • Lester R. Kurtz
    • English
    The 2nd edition of Encyclopedia of Violence, Peace and Conflict provides timely and useful information about antagonism and reconciliation in all contexts of public and personal life. Building on the highly-regarded 1st edition (1999), and publishing at a time of seemingly inexorably increasing conflict and violent behaviour the world over, the Encyclopedia is an essential reference for students and scholars working in the field of peace and conflict resolution studies, and for those seeking to explore alternatives to violence and share visions and strategies for social justice and social change. Covering topics as diverse as Arms Control, Peace Movements, Child Abuse, Folklore, Terrorism and Political Assassinations, the Encyclopedia comprehensively addresses an extensive information area in 225 multi-disciplinary, cross-referenced and authoritatively authored articles. In his Preface to the 1st edition, Editor-in-Chief Lester Kurtz wrote: "The problem of violence poses such a monumental challenge at the end of the 20th century that it is surprising we have addressed it so inadequately. We have not made much progress in learning how to cooperate with one another more effectively or how to conduct our conflicts more peacefully. Instead, we have increased the lethality of our combat through revolutions in weapons technology and military training. The Encyclopedia of Violence, Peace, and Conflict is designed to help us to take stock of our knowledge concerning these crucial phenomena." Ten years on, the need for an authoritative and cross-disciplinary approach to the great issues of violence and peace seems greater than ever.
  • International Encyclopedia of Public Health

    • 1st Edition
    • Stella R. Quah + 1 more
    • English
    An authoritative and comprehensive guide to the major issues, challenges, methods, and approaches of global public health. This encyclopedia will cover all dimensions of the field, from details of specific diseases to the organization of social insurance agencies. A significant percentage of the articles will cover public health aspects of diseases and conditions. Other articles will survey aging, diet, injuries, ethical and legal subjects in public health, measurement and modeling, consumerism, anthropology and sociology, economics, the history of public health, and global issues.