Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Securing Windows Server 2008

    Prevent Attacks from Outside and Inside Your Organization
    • 1st Edition
    • Aaron Tiensivu
    • English
    Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack.As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including: 1. Network Access Protection, which gives administrators the power to isolate computers that don't comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.2. Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.3. Protectio... of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.4. Protection against malicious software with User Account Control with a new authentication architecture.5. Incr... control over your user settings with Expanded Group Policy....to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power.
  • Emergency Management and Tactical Response Operations

    Bridging the Gap
    • 1st Edition
    • Thomas D. Phelan
    • English
    Is emergency management education undoing an age-old tradition in the American Fire Service? Has the time arrived to educate emergency managers in college classrooms rather than in twenty years of tactical operations experience? Over one hundred forty-three (143) institutions of higher education are now offering certificate or degree programs in emergency management with no tactical operations experience required for admission. Resistance by veteran law enforcement officers and fire fighters may have to be overcome if we are to prepare emergency managers with required skill sets. Dr. Tom Phelan explores the skills being taught to emergency management students and addresses the concerns of experienced first responders in accepting their leadership.
  • Nessus Network Auditing

    • 2nd Edition
    • Russ Rogers
    • English
    The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.Perform a Vulnerability AssessmentUse Nessus to find programming errors that allow intruders to gain unauthorized access.Obtain and Install NessusInstall from source or binary, set up up clients and user accounts, and update your plug-ins.Modify the Preferences TabSpecify the options for Nmap and other complex, configurable components of Nessus.Understand Scanner Logic and Determine Actual RiskPlan your scanning strategy and learn what variables can be changed.Prioritize VulnerabilitiesPrior... and manage critical vulnerabilities, information leaks, and denial of service errors.Deal with False PositivesLearn the different types of false positives and the differences between intrusive and nonintrusive tests.Get Under the Hood of NessusUnderstand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL).Scan the Entire Enterprise NetworkPlan for enterprise deployment by gauging network bandwith and topology issues.
  • A Quick Guide to Health and Safety

    • 1st Edition
    • R Gilbert
    • English
    Health and safety issues now impose upon almost every part of business life. The system of enforcement is managed and implemented in the UK by The Health and Safety Executive (HSE) – but at times it can be difficult to know exactly which bits of this elaborate spider’s web should be applied in a given instance, and which are most important. This Quick Guide puts the subject into context, providing a rational overview and a valid starting point to applying health and safety in the workplace, and offers a concise and readily accessible interpretation of what health and safety legislation means in practice.
  • Library Project Funding

    A Guide to Planning and Writing Proposals
    • 1st Edition
    • Julie Carpenter
    • English
    Managers and staff in libraries and information services in all sectors are increasingly required to prepare project proposals and bid for funding, usually for external funding, but also as part of internal strategic planning and management processes. The projects proposed must be realistic and feasible, because library managers and staff will be required to deliver their project on time and in budget. If managers get the planning wrong at project proposal stage, the consequences for implementation can be difficult to overcome. This book provides guidance on the various steps involved in project development, planning and the preparation of bids for funding based on the author’s own experience and that of many organisations in the cultural heritage and education sectors. It guides service managers and staff through the task of scoping, developing and writing viable, realistic and winning proposals, drawing on a range of techniques from strategic planning, financial management, project management and business.
  • The Bioarchaeology of Metabolic Bone Disease

    • 1st Edition
    • Megan B. Brickley + 1 more
    • English
    The Bioarchaeology of Metabolic Bone Disease provides a comprehensive and invaluable source of information on this important group of diseases. It is an essential guide for those engaged in either basic recording or in-depth research on human remains from archaeological sites. The range of potential tools for investigating metabolic diseases of bone are far greater than for many other conditions, and building on clinical investigations, this book will consider gross, surface features visible using microscopic examination, histological and radiological features of bone, that can be used to help investigate metabolic bone diseases.
  • Adaptive Behavior Assessment System-II

    Clinical Use and Interpretation
    • 1st Edition
    • Thomas Oakland + 1 more
    • English
    Adaptive Behavior Assessment System-II summarizes information on adaptive behavior and skills as well as general issues in adaptive behavior assessment with the goal of promoting sound assessment practice during uses, interpretations, and applications of the Adaptive Behavior Assessment System-II. Adaptive behavior and skills refer to personal qualities associated with the ability to meet one’s personal needs such as communication, self-care, socialization, etc. and those of others. Data from measures of adaptive behavior have been used most commonly in assessment and intervention services for persons with mental retardation. However, the display of adaptive behaviors and skills is relevant to all persons. The Adaptive Behavior Assessment System-II (ABAS-II) provides a comprehensive, norm-referenced assessment of the adaptive behavior and skills of individuals from birth through age 89. The comprehensive natures of the ABAS-II, ease in administration and scoring, and wide age range have resulted in its widespread use for a large number of assessment purposes. The book provides practical information and thus serves as a valuable resource for those who use the ABAS-II.
  • OS X Exploits and Defense

    Own it...Just Like Windows or Linux!
    • 1st Edition
    • Chris Hurley + 6 more
    • English
    Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security. Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed! Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
  • The Real MCTS/MCITP Exam 70-649 Prep Kit

    Independent and Complete Self-Paced Solutions
    • 1st Edition
    • Brien Posey
    • English
    This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSE skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640, 70-642, and 70-643.The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.
  • The Real MCTS/MCITP Exam 70-643 Prep Kit

    Independent and Complete Self-Paced Solutions
    • 1st Edition
    • Brien Posey + 5 more
    • English
    This exam is designed to validate Windows Server 2008 applications platform configuration skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-643. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.