Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Biosecurity and Bioterrorism

    Containing and Preventing Biological Threats
    • 1st Edition
    • Jeffrey Ryan + 1 more
    • English
    Biosecurity and Bioterrorism is the first book to take a holistic approach to biosecurity with coverage of pathogens, prevention and response methodology. The book is organized into four thematic sections: Part I provides a conceptual understanding of biowarfare, bioterrorism and the laws we have to counteract this; Part II investigates known bioagents and the threat from emerging diseases; Part III focuses on agricultural terrorism and food security; Part IV outlines international, US, and local initiatives for biodefense and biosecurity. Case studies illustrate biodefense against both intentional terrorism and natural outbreaks. The authors bring an extraordinary combination of experience in academia and the clinical world, as well as real-world experience in technical and practical matters, to their writing. They make technical material clear and fascinating for readers with a basic knowledge of biology. Ryan and Glarum address the hazards in the context of vulnerability assessments and the planning strategies government and industry can take to prepare for and respond to such events.
  • Secrets Stolen, Fortunes Lost

    Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
    • 1st Edition
    • Richard Power + 1 more
    • English
    The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.
  • OSSEC Host-Based Intrusion Detection Guide

    • 1st Edition
    • Daniel Cid + 2 more
    • English
    This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented...until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems.-- Stephen Northcutt OSSEC determines if a host has been compromised in this manner by taking the equivalent of a picture of the host machine in its original, unaltered state. This "picture" captures the most relevant information about that machine's configuration. OSSEC saves this "picture" and then constantly compares it to the current state of that machine to identify anything that may have changed from the original configuration. Now, many of these changes are necessary, harmless, and authorized, such as a system administrator installing a new software upgrade, patch, or application. But, then there are the not-so-harmless changes, like the installation of a rootkit, trojan horse, or virus. Differentiating between the harmless and the not-so-harmless changes determines whether the system administrator or security professional is managing a secure, efficient network or a compromised network which might be funneling credit card numbers out to phishing gangs or storing massive amounts of pornography creating significant liability for that organization. Separating the wheat from the chaff is by no means an easy task. Hence the need for this book. The book is co-authored by Daniel Cid, who is the founder and lead developer of the freely available OSSEC host-based IDS. As such, readers can be certain they are reading the most accurate, timely, and insightful information on OSSEC.
  • Nmap in the Enterprise

    Your Guide to Network Scanning
    • 1st Edition
    • Angela Orebaugh + 1 more
    • English
    Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies.
  • The ABCs of Learning Disabilities

    • 2nd Edition
    • Bernice Wong + 3 more
    • English
    The ABCs of Learning Disabilities, Second Edition, discusses major research findings on learning disabilities in children, adolescents and adults in language, memory, social skills, self-regulation, reading, mathematics, and writing, with an additional chapter on assessment. This concise primer is intended for use as an undergraduate introductory text to the field. Written with an evenness of tone, breadth, and depth, the conveys an engaging style meant to encourage the beginning student to identify the “big picture” and to be interested in conceptual issues as well as research findings.
  • No Tech Hacking

    A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
    • 1st Edition
    • Johnny Long
    • English
    Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology.
  • Retail Crime, Security, and Loss Prevention

    An Encyclopedic Reference
    • 1st Edition
    • Charles A. Sennewald + 1 more
    • English
    Retail Crime, Security, and Loss Prevention is destined to become the "go to" source of crime- and loss prevention- related information in the retail industry. Written and edited by two nationally recognized retail security experts and enhanced with 63 contributions by others who contribute expertise in specialized areas, this book provides over 150 definitions of loss prevention terms, and discusses topics ranging from accident investigations, counterfeit currency, emergency planning, and workplace violence to vendor frauds. No other single work contains such a wealth of retail security information. The co-authors are Charles “Chuck” Sennewald, CSC, CPP former Director of Security at The Broadway Department Stores, a major division of Carter Hawley Hale Stores, Inc., founder of the IAPSC and author of numerous security industry books, and John Christman, CPP, former VP and Director of Security for Macy's West. They have put in one book a wealth of information, techniques, procedures and source material relative to retail crime and loss prevention which will prove an invaluable reference work for professionals at all levels within the industry.
  • Microsoft Forefront Security Administration Guide

    • 1st Edition
    • Jesse Varsalone
    • English
    Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides end-to-end security stretching from Web servers back to the desktop. This book will provide system administrators familiar with Syngress' existing Microsoft networking and security titles with a complete reference to Microsoft's flagship security products.
  • Knowledge Management for Services, Operations and Manufacturing

    • 1st Edition
    • Tom Young
    • English
    This book is aimed at those who are involved in Knowledge Management (KM) or have recently been appointed to deliver KM in services, operational or production environments. The models and techniques for KM are well defined within environments with a distinct start and finish to the activity, for example the learn before, during and after model. Knowledge Management for Services, Operations and Manufacturing focuses on environments where activity and learning are on going, and a different approach to KM has to be taken. The book provides managers and practitioners with the necessary principles, approaches and tools to be able to design their approach from scratch or to be able to compare their existing practices against world class examples. Models and methodologies which can be applied or replicated in a wide variety of industries are examined and numerous case studies illustrate the journey that various companies are taking as they implement KM.
  • A Litigator's Guide to DNA

    From the Laboratory to the Courtroom
    • 1st Edition
    • Ron C. Michaelis + 2 more
    • English
    A Litigator's Guide to DNA educates both criminal law students and forensic science students about all aspects of the use of DNA evidence in criminal and civil trials. It includes discussions of the molecular biological basis for the tests, essential laboratory practices, probability theory and mathematical calculations, and issues relevant to the prosecution and the defense, and to the judge and jury hearing the case. The authors provide a full background on both the molecular biology and the mathematical theory behind forensic tests, describing the molecular biological process in simple mechanical terms that are familiar to everyone, and periodically emphasizing the practical, take-home messages the student truly needs to understand. Pedagogical elements such as Recapping the Main Point boxes and valuable ancillary material (Instructors' Manual, PowerPoint slides) make this an ideal text for professors.