Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • The Best Damn Cybercrime and Digital Forensics Book Period

    • 1st Edition
    • Anthony Reyes + 1 more
    • English
    Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market. This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.
  • The Best Damn Server Virtualization Book Period

    Including Vmware, Xen, and Microsoft Virtual Server
    • 1st Edition
    • Rogier Dittner + 1 more
    • English
    Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to troubleshoot. Virtualization allows you to consolidate many servers onto a single physical server reducing hardware, electrical, cooling, and administrative costs. These virtual servers run completely independent of each other so if one crashes the other are not affected. Planning and implementing a server consolidation is a complex process. This book details the requirements for such a project, includes sample forms and templates, and delivers several physical to virtual migration strategies which will save both time and costs. Readers of this book will easily be able to plan and deploy VMware, Microsoft Virtual Server, and Xen.
  • Penetration Tester's Open Source Toolkit

    • 2nd Edition
    • Chris Hurley + 1 more
    • English
    Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.
  • Practical Oracle Security

    Your Unauthorized Guide to Relational Database Security
    • 1st Edition
    • Josh Shaul + 1 more
    • English
    This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database.
  • Medical Cell Biology

    • 3rd Edition
    • Steven R. Goodman
    • English
    Medical Cell Biology, Third Edition, focuses on the scientific aspects of cell biology important to medical students, dental students, veterinary students, and prehealth undergraduates. With its National Board-type questions, this book is specifically designed to prepare students for this exam. The book maintains a concise focus on eukaryotic cell biology as it relates to human and animal disease, all within a manageable 300-page format. This is accomplished by explaining general cell biology principles in the context of organ systems and disease. This updated version contains 60% new material and all new clinical cases. New topics include apoptosis and cell death from a neural perspective; signal transduction as it relates to normal and abnormal heart function; and cell cycle and cell division related to cancer biology.
  • Cancer Imaging

    Instrumentation and Applications
    • 1st Edition
    • M. A. Hayat
    • English
    This second of two volumes on Cancer Imaging covers the three major topics of imaging instrumentation, general imaging applications, and imaging of a number of human cancer types. Where the first volume emphasized lung and breast carcinomas, Volume 2 focuses on prostate, colorectal, ovarian, gastrointestinal, and bone cancers. Although cancer therapy is not the main subject of this series, the crucial role of imaging in selecting the type of therapy and its post-treatment assessment are discussed. The major emphasis in this volume is on cancer imaging; however, differentiation between benign tumors and malignant tumors is also discussed. This volume is sold individually, and Cancer Imaging, Volume 1 [ISBN: 978-0-12-370468-9] sells separately for $189 and also as part of a two volume set [ISBN: 978-0-12-374212-4] for $299.
  • Google Hacking for Penetration Testers

    • 1st Edition
    • Bill Gardner + 2 more
    • English
    This book helps people find sensitive information on the Web.Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and “self-police” their own organizations.Reader... will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with MySpace, LinkedIn, and more for passive reconaissance.
  • Security Supervision and Management

    The Theory and Practice of Asset Protection
    • 3rd Edition
    • IFPO
    • Sandi J. Davies
    • English
    The International Foundation for Protection Officers (IFPO) has for many years provided materials to support its certification programs. The current edition of this book is being used as the core text for the Security Supervision and Management Training/Certified in Security Supervision and Management (CSSM) Program at IFPO. The CSSM was designed in 1988 to meet the needs of the security supervisor or senior protection officer. The book has enjoyed tremendous acceptance and success in the past, and the changes in this third edition, vetted by IFPO, make it still more current and relevant. Updates include 14 new chapters, 3 completely revised chapters, "Student Performance Objectives" in each chapter, and added information on related resources (both print and online).
  • Information Assurance

    Dependability and Security in Networked Systems
    • 1st Edition
    • Yi Qian + 3 more
    • English
    In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).
  • Keeping Found Things Found: The Study and Practice of Personal Information Management

    • 1st Edition
    • William Jones
    • English
    Keeping Found Things Found: The Study and Practice of Personal Information Management is the first comprehensive book on new 'favorite child' of R&D at Microsoft and elsewhere, personal information management (PIM). It provides a comprehensive overview of PIM as both a study and a practice of the activities people do, and need to be doing, so that information can work for them in their daily lives. It explores what good and better PIM looks like, and how to measure improvements. It presents key questions to consider when evaluating any new PIM informational tools or systems. This book is designed for R&D professionals in HCI, data mining and data management, information retrieval, and related areas, plus developers of tools and software that include PIM solutions.