Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Principles of E-Learning Systems Engineering

    • 1st Edition
    • Lester Gilbert + 1 more
    • English
    The book integrates the principles of software engineering with the principles of educational theory, and applies them to the problems of e-learning development, thus establishing the discipline of E-learning systems engineering. For the first time, these principles are collected and organised into the coherent framework that this book provides. Both newcomers to and established practitioners in the field are provided with integrated and grounded advice on theory and practice. The book presents strong practical and theoretical frameworks for the design and development of technology-based materials and environments which have teaching, training or educational value. It brings together a complete range of the specific theories and detailed techniques involved in the design, development and delivery of materials such as business presentations, web-based presentations, training courses and academic lessons. Although the methods and theories discussed are generally appropriate to all forms and levels of learning and teaching, the book illustrates their use in and focuses its approach upon e-learning with adults.
  • Emerging Technologies for Knowledge Resource Management

    • 1st Edition
    • M Pandian + 1 more
    • English
    Emerging Technologies for Knowledge Resource Management examines various factors that contribute to an enabled environment for optimum utilisation of information resources. These include the digital form of information resources, which are inherently sharable, consortia as a concept to bring people and materials together and unified portals as technology to bring together disparate and heterogeneous resources for sharing and access. The book provides a step-by-step guideline for system analysis and requirements analysis. The book also provides reviews of existing portal models for sharing resources and identifies the gap in meeting the objectives. The book provides a framework for a cost effective unified portal model to share the electronic information resources available in the participating libraries in a distributed digital environment.
  • Forensic Science

    • 2nd Edition
    • Volume 6
    • English
    Forensic Science, Second Edition presents the applications of separation methods, manly chromatography, in forensic practice. The first part, devoted to forensic toxicology, contains reviews on forensic relevant groups of compounds, like: Opiate agonists, cocaine, amphetamines, hallucinogens, cannabinoids, sedatives and hypnotics, antidepressive and antipsychotic drugs, analgesics, antidiabetics, muscle relaxants, and mushroom toxins.In these parts, the preliminary immunochemical tests were also included, together with separation methods. Screening procedures used in forensic toxicology were presented in separate chapters on forensic screening with GC, GC-MS, HPLC, LC-MS, CE, and LC-ICP-MS. In the part on actual and emerging problems of forensic toxicology, following chapters were included: Analytical markers of alcohol abuse, toxicological aspects of herbal remedies, drugs and driving, analysis in alternative matrices, doping analysis, pharmacogenomics in forensic toxicology, and quality assurance. The second part presents application of separation methods in forensic chemistry, and comprises chapters on: Explosives, chemical warfare agents, arson analysis, and writing media. Third part on forensic identification contains chapter on forensic genetics.All chapters are written up-to-date and present specific information up to 2006. The authors of each chapter are known not only from their scientific activity, but are also reputed experts, proven in everyday forensic casework.
  • How to Cheat at Securing Linux

    • 1st Edition
    • James Stanger
    • English
    Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system. This book teaches Linux system administrators how to protect their servers from malicious threats.As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. This was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact opposite story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers (Source: IDC).This book covers Open Source security, implementing an intrusion detection system, unearthing Rootkits, defending against malware, creating Virtual Private Networks, and much more.
  • InfoSecurity 2008 Threat Analysis

    • 1st Edition
    • Craig Schiller + 3 more
    • English
    An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
  • Security and Loss Prevention

    An Introduction
    • 5th Edition
    • Philip Purpura
    • English
    Security and Loss Prevention, Fifth Edition, encompasses the breadth and depth of considerations involved in implementing general loss prevention concepts and security programs within an organization.It presents proven strategies to prevent and reduce incidents of loss due to legal issues, theft and other crimes, fire, accidental or intentional harm from employees as well as the many ramifications of corporate mismanagement. It contains a brand new terrorism chapter, along with coverage on background investigations, protection of sensitive information, internal threats, and considerations at select facilities (nuclear, DoD, government and federal). Author Philip Purpura once again demonstrates why students and professionals alike rely on this best-selling text as a timely, reliable resource.This book is an ideal resource for criminal justice and security academic programs, physical security professionals, retail security professionals, security managers, security consultants, law enforcement professionals, investigations professionals, risk and contingency planning professionals.
  • High-Security Mechanical Locks

    An Encyclopedic Reference
    • 1st Edition
    • Graham Pulford
    • English
    High-Security Mechanical Locks comprehensively surveys and explains the highly technical area of high security locks in a way that is accessible to a wide audience. Well over 100 different locks are presented, organized into 6 basic types. Each chapter introduces the necessary concepts in a historical perspective and further categorizes the locks. This is followed by detailed 'how it works' descriptions with many pictures, diagrams and references. The descriptions are based on actual dissections of the real locks.The scope is limited to key operated mechanical locks, thus keyless combination locks and digital locks are not covered. The book does not deal with routine locksmithing topics such as installation and servicing of locks. The sensitive area of picking and bypassing of locks is dealt with only at a high level without giving detailed information that would be unacceptable in the wrong hands.
  • TechnoSecurity's Guide to E-Discovery and Digital Forensics

    A Comprehensive Handbook
    • 1st Edition
    • Jack Wiles
    • English
    TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.
  • How to Cheat at Securing Your Network

    • 1st Edition
    • Ido Dubrawsky
    • English
    Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real world, step-by-step instruction. The latest addition to the best selling "How to Cheat..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery.
  • Long-Term Commitment, Trust and the Rise of Foreign Banking in China

    • 1st Edition
    • Qing Lu
    • English
    The rapid growth of foreign banks has aroused a growing interest in the academic field and specifically as regards to the question of why foreign banks exist. This book aims to establish the relationship between trust as contextual knowledge capital built between the Chinese government and foreign banks and foreign banks. knowledge capital and the relationship between the former and foreign banks. long-term commitment. By investigating the development strategy of foreign banks and by examining and explaining the importance of foreign banks. long-term commitment to their development, this book has demonstrated that foreign banks established branches in China not only to follow their home-country customers in order to retain their knowledge capital but also to gain market access. Trust as contextual knowledge capital built between foreign banks and the Chinese government could assist their knowledge capital retention and their market access strategy. Foreign banks. long-term commitment could help them to achieve this contextual knowledge capital. This book thus has major implications for the development strategy of foreign banks in a government-oriented economy with a controlled banking sector.