Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Transportation Security

    • 1st Edition
    • Clifford Bragdon
    • English
    Insecure transportation systems are costing our worldwide mobility-based economy as much as 6% of GDP annually. The effectiveness of security measures vary widely. In the United States, depending on the mode of transportation, it ranges from “medium effectiveness” for airports to “low effectiveness” for maritime, rail, transit, and intermodal activities. Situational awareness and interoperability are lacking as we try to deal with both natural and man-made disasters. Regardless of the transport mode, improvements are essential if governments and corporations are to address security planning, response, and national preparedness. Transportation Security examines this problem in a comprehensive manner and addresses security-based technologies and solutions to minimize risk.
  • Nuclear Safeguards, Security and Nonproliferation

    Achieving Security with Technology and Policy
    • 1st Edition
    • James Doyle
    • James Doyle
    • English
    With an increase of global security concerns over potential terrorist acts, the threat of WMDs, and increasing political issues with nations seeking nuclear capability, the need to track, detect, and safeguard nuclear material globally has never been greater. Nuclear Safeguards, Security and Nonproliferation is a comprehensive reference that covers cutting-edge technologies used to trace, track, and safeguard nuclear material. It is a contributed volume with sections contributed by scientists from leading institutions such as Los Alamos National Labs, Sandia National Labs, Pacific Northwest Nuclear Labs, and Texas A&M University, and the Monterey Institute of International Studies. The book is divided into 3 sections and includes 30 chapters on such topics as - the security of nuclear facilities and material, the illicit trafficking of nuclear materials, improvised nuclear devices, how to prevent nuclear terrorism. International case studies of security at nuclear facilities and illegal nuclear trade activities provide specific examples of the complex issues surrounding the technology and policy for nuclear material protection, control and accountability. Specific cases include analysis of the timely issues in the nuclear programs of countries such as North Korea, Iran, and Kazakstan among others. Nuclear Security is a must-have volume for the dozens of private and public organizations involved in driving Homeland Security, domestic, and international policy issues relating to nuclear material security, non-proliferation, and nuclear transparency.
  • Global Information Inequalities

    Bridging the Information Gap
    • 1st Edition
    • Deborah Charbonneau
    • English
    The disparity in access to information is a worldwide phenomenon. Global Information Inequalities offers a captivating look into problems of information access across the world today. One of the unique strengths of the book is the use of examples of library initiatives from around the world to illustrate the range of possibilities for equitable access and library service delivery in a global context. It contains numerous examples of a wide variety of information problems and solutions ranging from developing literacy programs in rural communities in Tanzania, building school libraries in China, making government-related information more transparent in Chile, to exploring how digital technologies have the potential to revolutionize the lives of people with sensory-disabilities... The contributions in Global Information Inequalities address a number of core professional issues, including access to information, library services, collection development, global collaboration, intellectual property, and digital information. The contributors are from Argentina, Canada, Chile, China, Iceland, Malaysia, Peru, South Africa, Tanzania, United States, and Zambia, thereby providing a wide range of perspectives on librarianship. Written in a simple, thorough, and multidisciplinary approach, the book presents and discusses key issues in various library settings and from different perspectives. Overall, this work contributes to a global examination and exploration of libraries in various parts of the world. This book has a wide appeal and is applicable to various library environments (including academic, public, and special libraries).
  • Malware Forensics

    Investigating and Analyzing Malicious Code
    • 1st Edition
    • Eoghan Casey + 2 more
    • English
    Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of live forensics, where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss live forensics on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. It is the first book detailing how to perform live forensic techniques on malicious code. The book gives deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more. It explores over 150 different tools for malware incident response and analysis, including forensic tools for preserving and analyzing computer memory. Readers from all educational and technical backgrounds will benefit from the clear and concise explanations of the applicable legal case law and statutes covered in every chapter. In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter. This book is intended for system administrators, information security professionals, network personnel, forensic examiners, attorneys, and law enforcement working with the inner-workings of computer memory and malicious code.
  • A Short-Cut to Marketing the Library

    • 1st Edition
    • Zuzana Helinsky
    • English
    Technological changes mean that the role of libraries is now not as obvious or assured as in the past. This means that to survive, libraries must actively market their products and services to their users and to their funding sources. A concise handbook which spells out the critical need for marketing for libraries, A Short-cut to Marketing The Library provides a series of practical and accessible tools to achieve success and includes publishers marketing suggestions.
  • The IT / Digital Legal Companion

    A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
    • 1st Edition
    • Gene K. Landy + 1 more
    • English
    The IT/Digital Legal Companion is a comprehensive business and legal guidance covering intellectual property for digital business; digital contract fundamentals; open source rules and strategies; development, consulting and outsourcing; software as a service; business software licensing, partnering, and distribution; web and Internet agreements; privacy on the Internet; digital multimedia content clearance and distribution; IT standards; video game development and content deals; international distribution; and user-created content, mash-ups, MMOGs, and web widgets.Chapters deal with topics such as copyrights on the Internet, for software protection and around the world; trademarks and domain names; patents and digital technology companies; trade secrets and non-disclosure agreements; confidentiality, rights transfer, and non-competition agreements for employees; introduction to digital product and service contracts; a pragmatic guide to open source; IT services - development, outsourcing, and consulting; beta test agreements; commercial end-user agreements; terms of use for web sites and online applications; privacy and use of personal data; digital technology standards - opportunities, risks, and strategies; content for digital media; and deals in the web and mobile value chains.This book is intended for executives, entrepreneurs, finance and business development officers; technology and engineering officers; marketers, licensing professionals, and technology professionals; in-house counsel; and anyone else that deals with software or digital technology in business.
  • Securing Citrix XenApp Server in the Enterprise

    • 1st Edition
    • Tariq Azad
    • English
    Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains.
  • Kismet Hacking

    • 1st Edition
    • Frank Thornton + 2 more
    • English
    Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.
  • The IT Regulatory and Standards Compliance Handbook

    How to Survive Information Systems Audit and Assessments
    • 1st Edition
    • Craig S. Wright
    • English
    The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs.
  • SonicWALL Secure Wireless Networks Integrated Solutions Guide

    • 1st Edition
    • Khai Tran + 5 more
    • English
    Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk. Many wireless proprietors think that the convenience of wireless outweighs the possible risk of insecure impelentation, or that secure wireless is far too complicated to worry about deploying. SonicWALL® Secure Wireless Networks Integrated Solutions Guide provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model. This introduction to wireless network security is both comprehensive and easy to understand. Using straightforward language, this book describes deployment best practices, what SonicWALL security appliances do, and how they interoperate within an existing or new network. It begins with brief overviews of the theory of risk management, the history of wireless networks, and today’s top five wireless threats. Real-world case studies highlight wireless solution business drivers for education, healthcare, retail and hospitality, and government agencies, as well as their respective regulatory compliance requirements. SonicWALL believes that the days of being forced to accept inherent risk in wireless networking are over. By using modern security standards and sound network design methods, your wireless network should be just as secure as your wired network.Wireless networks can be made as secure as wired networks, and deploying this type of security can be far less complicated than you think. In this book, and through their massive product offerings, SonicWALL gives you (the secure wireless network hopeful) all of the planning, implementation, and optimizing tools you need to do wireless. Securely.