Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Library Management

    A Case Study Approach
    • 1st Edition
    • Ravonne Green
    • English
    An essential reference for professionals within the Library and Information Science field, this book provides library managers with the requisite skills to utilize the case study approach as an effective method for problem solving and deliberation. The first chapter discusses the case study as a research tool. The second chapter outlines the processes involved in conducting a case study. An actual case model is presented in the third chapter. The succeeding chapters include case studies written by library management students at Valdosta State University in the USA. The chapters include discussion questions, analyses, and alternative scenarios to provoke further thought and discussion.
  • Design and Evaluation of Physical Protection Systems

    • 2nd Edition
    • Mary Lynn Garcia
    • English
    Design and Evaluation of Physical Security Systems, Second Edition, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.
  • Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

    • 1st Edition
    • David Maynor
    • English
    Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code.This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an exploitation platform. With a solid understanding of MSF’s capabilities, the book then details techniques for dramatically reducing the amount of time required for developing functional exploits.By working through a real-world vulnerabilities against popular closed source applications, the reader will learn how to use the tools and MSF to quickly build reliable attacks as standalone exploits. The section will also explain how to integrate an exploit directly into the Metasploit Framework by providing a line-by-line analysis of an integrated exploit module. Details as to how the Metasploit engine drives the behind-the-scenes exploitation process will be covered, and along the way the reader will come to understand the advantages of exploitation frameworks. The final section of the book examines the Meterpreter payload system and teaches readers to develop completely new extensions that will integrate fluidly with the Metasploit Framework.
  • Alternate Data Storage Forensics

    • 1st Edition
    • Amber Schroader + 1 more
    • English
    Learn to pull “digital fingerprints” from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at “not yet every day” devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes.
  • Molecular Photofitting

    Predicting Ancestry and Phenotype Using DNA
    • 1st Edition
    • Tony Frudakis Ph.D.
    • English
    In the field of forensics, there is a critical need for genetic tests that can function in a predictive or inferential sense, before suspects have been identified, and/or for crimes for which DNA evidence exists but eye-witnesses do not. Molecular Photofitting fills this need by describing the process of generating a physical description of an individual from the analysis of his or her DNA. The molecular photofitting process has been used to assist with the identification of remains and to guide criminal investigations toward certain individuals within the sphere of prior suspects. Molecular Photofitting provides an accessible roadmap for both the forensic scientist hoping to make use of the new tests becoming available, and for the human genetic researcher working to discover the panels of markers that comprise these tests. By implementing population structure as a practical forensics and clinical genomics tool, Molecular Photofitting serves to redefine the way science and history look at ancestry and genetics, and shows how these tools can be used to maximize the efficacy of our criminal justice system.
  • Climate, Environment, and Society in the Pacific during the Last Millennium

    • 1st Edition
    • Volume 6
    • Patrick D. Nunn
    • English
    The nature of global change in the Pacific Basin is poorly known compared to other parts of the world. Climate, Environment, and Society in the Pacific during the Last Millennium describes the climate changes that occurred in the Pacific during the last millennium and discusses how these changes controlled the broad evolution of human societies, typically filtered by the effects of changing sea level and storminess on food availability and interaction. Covering the entire period since AD 750 in the Pacific, this book describes the influences of climate change on environments and societies during the Medieval Warm Period and the Little Ice Age, focusing on the 100-year transition between these – a period of rapid change known as the AD 1300 Event.
  • How to Cheat at Securing SQL Server 2005

    • 1st Edition
    • Mark Horninger
    • English
    The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help in order to get SQL Server secured as quickly and safely as possible.
  • The Information Literacy Cookbook

    Ingredients, Recipes and Tips for Success
    • 1st Edition
    • Jane Secker + 2 more
    • English
    This book, aimed at an international audience, provides an overview of Information Literacy (IL) in practice; what it is, why it’s become so important in the library profession and demonstrates how librarians can cultivate a better understanding of IL in their own organisations. It uses the ‘Cookbook’ theme throughout to provide a more informal approach, which will appeal to practitioners, and also reflects the need to provide guidance in the form of recipes, tips for success, regional variations, and possible substitutions if ingredients aren’t available. This approach makes it easy to read and highly valuable for the busy information professional. It includes an overview of information literacy in higher education, the schools sector, public libraries, the health service and the commercial sector. It also includes contributions from international authors.
  • Practical Embedded Security

    Building Secure Resource-Constrained Systems
    • 1st Edition
    • Timothy Stapko
    • English
    The great strides made over the past decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem: their designs are now being targeted by the same malicious attackers whose predations have plagued traditional systems for years. Rising concerns about data security in embedded devices are leading engineers to pay more attention to security assurance in their designs than ever before. This is particularly challenging due to embedded devices’ inherent resource constraints such as limited power and memory. Therefore, traditional security solutions must be customized to fit their profile, and entirely new security concepts must be explored. However, there are few resources available to help engineers understand how to implement security measures within the unique embedded context. This new book from embedded security expert Timothy Stapko is the first to provide engineers with a comprehensive guide to this pivotal topic. From a brief review of basic security concepts, through clear explanations of complex issues such as choosing the best cryptographic algorithms for embedded utilization, the reader is provided with all the information needed to successfully produce safe, secure embedded devices.
  • The Corporate Security Professional's Handbook on Terrorism

    • 1st Edition
    • Edward Halibozek + 2 more
    • English
    The Corporate Security Professional's Handbook on Terrorism is a professional reference that clarifies the difference between terrorism against corporations and their assets, versus terrorism against government assets. It addresses the existing misconceptions regarding how terrorism does or does not affect corporations, and provides security professionals and business executives with a better understanding of how terrorism may impact them. Consisting three sections, Section I provides an explanation of what terrorism is, its history, who engages in it, and why. Section II focuses on helping the security professional develop and implement an effective anti-terrorism program in order to better protect the employees and assets of the corporation. Section III discusses the future as it relates to the likelihood of having to deal with terrorism. The book provides the reader with a practitioner’s guide, augmented by a historical assessment of terrorism and its impact to corporations, enabling them to immediately put in place useful security processes and methods to protect their corporate interests against potential acts of terror. This is guide is an essential tool for preparing security professionals and company executives to operate in an increasingly hostile global business environment.