Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • The History of Information Security

    A Comprehensive Handbook
    • 1st Edition
    • Karl Maria Michael de Leeuw + 1 more
    • English
    Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered. There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.
  • Fighting Fraud

    How to Establish and Manage an Anti-Fraud Program
    • 1st Edition
    • Gerald L. Kovacich
    • English
    This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company. Fighting Fraud provides an exceptional foundation for security professionals or business executives involved in developing and implementing a corporate anti-fraud program as part of a corporate assets protection program. The author’s intent is to provide the reader with a practitioner’s guide (a “how-to” book), augmented by some background information to put it all in perspective. The approach used should enable the readers to immediately put in place a useful anti-fraud program under the leadership of the corporate security officer (CSO), or other corporate professional.
  • Forensic Neuropathology

    A Practical Review of the Fundamentals
    • 1st Edition
    • Hideo H. Itabashi MD + 4 more
    • English
    Forensic Neuropathology provides superior visual examples of the more commonly encountered conditions in forensic neuropathology and answers questions that arise regarding neuropathological findings. The work includes values for frequently-encounter... clinical assessments, and contains a more comprehensive summary of aging/dating of various neuropathological processes than is available in any other single current source. General pathology residents, forensic pathology and neuropathology fellows, and general pathologists and clinicians involved in referred cases will find this book extremely useful, as will individuals in allied fields such as law enforcement officers and attorneys. Forensic Neuropathology aims to: (1) provide a concise summary of practical information frequently needed in forensic neuropathology cases; (2) include selected material previously known but perhaps not significantly emphasized in current literature; and (3) where possible, to suggest aging/dating parameters for certain neuropathological findings relevant to forensic neuropathology testimony. As a selective reference, the volume emphasizes practical issues and focuses on the most commonly encountered issues among neuropathology and medical examiner professionals.
  • Bloodstain Pattern Evidence

    Objective Approaches and Case Applications
    • 1st Edition
    • Anita Y. Wonder
    • English
    In Bloodstain Pattern Evidence, the concepts introduced in the author's first book, Blood Dynamics, are updated and applied to provide essential answers in the resolution of actual crimes. The book is accessible to all levels of investigators, regardless of academic background, and allows readers to develop a fundamental understanding of the underlying scientific principles behind bloodstain pattern evidence. Bloodstain Pattern Evidence builds on the fundamental ideas brought about by an understanding of Non-Newtonian dynamics, and illustrates through case work the practical forensic science applications of these principles to the analysis of bloodstain patterns.
  • AVIEN Malware Defense Guide for the Enterprise

    • 1st Edition
    • David Harley + 1 more
    • English
    Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you. AVIEN’s sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about malicious code and anti-malware technology, and the top security administrators of AVIEN who use those technologies in real life. This new book uniquely combines the knowledge of these two groups of experts. Anyone who is responsible for the security of business information systems should be aware of this major addition to security literature.* “Customer Power” takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It then considers the roles of the independent researcher, the vendor-employed specialist, and the corporate security specialist.* “Stalkers on Your Desktop” considers the thorny issue of malware nomenclature and then takes a brief historical look at how we got here, before expanding on some of the malware-related problems we face today.* “A Tangled Web” discusses threats and countermeasures in the context of the World Wide Web. * “Big Bad Bots” tackles bots and botnets, arguably Public Cyber-Enemy Number One.* “Crème de la CyberCrime” takes readers into the underworld of old-school virus writing, criminal business models, and predicting future malware hotspots.* “Defense in Depth” takes a broad look at DiD in the enterprise, and looks at some specific tools and technologies.* “Perilous Outsorcery” offers sound advice on how to avoid the perils and pitfalls of outsourcing, incorporating a few horrible examples of how not to do it.* “Education in Education” offers some insights into user education from an educationalist’s perspective, and looks at various aspects of security in schools and other educational establishments.* “DIY Malware Analysis” is a hands-on, hands-dirty approach to security management, considering malware analysis and forensics techniques and tools.* “Antivirus Evaluation & Testing” continues the D-I-Y theme, discussing at length some of the thorny issues around the evaluation and testing of antimalware software.* “AVIEN & AVIEWS: the Future” looks at future developments in AVIEN and AVIEWS.
  • Teaching with Technology

    An Academic Librarian’s Guide
    • 1st Edition
    • Joe Williams + 1 more
    • English
    This practical book introduces readers to the current technology topics and issues facing today’s academic instruction and reference librarians. The book provides up-to-date overviews of cutting edge technologies, offers an insight on current educational uses and applications of these new tools, and discusses common problems and pitfalls librarians may encounter when incorporating current technologies into their instruction services. Chapters are written by experienced practitioners, providing detailed information on best practices and common pitfalls using today’s technologies. Topics include teaching with streaming video, chat-based virtual reference services, wireless networking, weblogs and course management software.
  • Counterterrorist Detection Techniques of Explosives

    • 1st Edition
    • Jehuda Yinon
    • English
    The detection of hidden explosives has become an issue of utmost importance in recent years. While terrorism is not new to the international community, recent terrorist attacks have raised the issue of detection of explosives and have generated a great demand for rapid, sensitive and reliable methods for detecting hidden explosives. Counterterrorist Detection Techniques of Explosives covers recent advances in this area of research including vapor and trace detection techniques (chemiluminescence, mass spectrometry, ion mobility spectrometry, electrochemical methods and micromechanical sensors, such as microcantilevers) and bulk detection techniques (neutron techniques, nuclear quadrupole resonance, x-ray diffraction imaging, millimeter-wave imaging, terahertz imaging and laser techniques). This book will be of interest to any scientists involved in the design and application of security screening technologies including new sensors and detecting devices which will prevent the smuggling of bombs and explosives.
  • How to Cheat at Microsoft Vista Administration

    • 1st Edition
    • Jan Kanclirz
    • English
    The Perfect Reference for the Multitasked SysAdminThe Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and management consoles. It also enhances the system’s reliability, performance, and problem-solving tools. As administrators, Vista will sometimes look like its predecessor, Windows XP, and at other times, look like an all-new operating system. How to Cheat will help you get Vista up and running as quickly and safely as possible and provide you with a solid idea of all the important changes and improvements the new Microsoft Vista OS has to offer.In the book you will:* Automate Windows Vista InstallationSee how Windows installations can be automated for large-scale deployments using the Windows Automated Installation Kit (WAIK).* Install and Maintain DevicesWindows Vista contains device drivers for hundreds of PnP devices, and the Device Manager snap-in is the main utility on a local computer for managing them.* Customize Appearances, Taskbars, and ToolbarsSee how to use a personalization page, use the taskbar, and customize desktop themes.* Manage File System Formats, Partitions, and VolumesLearn how Windows Vista supports basic and dynamic volumes and two partition styles: MBR and GPT.* Increase File System PerformanceLearn how using tools such as disk defragging, cluster size adjustment, removing short filename support, and compression can help with performance.* Administer via RemoteRemote Desktop and Windows Firewall can help administrators perform administrative tasks on remote computers.* Managing ServicesThe Services utility allows you to view the status of services, as well as to disable nonessential services.* Configure TCP/IP in VistaSee how to configure TCP/IP (both IPv4 and IPv6) via the user interface or via the netsh command.* See What’s New with Wireless in VistaUnderstand wireless security and learn how to install a wireless network.* Optimize Windows Startup, the Hard Disk, and MoreOptimize memory, applications, and the network connection, and see how to monitor performance.Contents IncludeIntroducing and Installing Microsoft VistaInstalling and Maintaining Hardware Devices and DriversCustomizing Desktop PropertiesManaging File Systems and DisksGeneral Administration TasksManaging Local Networking EssentialsManaging the Wireless World and Its SecurityManaging Security EssentialsSecuring User AccessTuning for Better Performance Troubleshooting
  • Laboratory Experiments in the Social Sciences

    • 1st Edition
    • Murray Webster + 1 more
    • English
    Laboratory Experiments in the Social Sciences is the only book providing core information for researchers about the ways and means to conduct experiments. Its comprehensive regard for laboratory experiments encompasses “how-to” explanations, investigations of philosophies and ethics, explorations of experiments in specific social science disciplines, and summaries of both the history and future of social science laboratories. No other book offers such a direct avenue to enlarging our knowledge in the social sciences.This collection of original chapters combines instructions and advice about the design of laboratory experiments in the social sciences with the array of other issues. While there are books on experimental design and chapters in more general methods books on design, theory, and ethical issues, no other book attempts to discuss the fundamental ideas of the philosophy of science or lays out the methods comprehensively or in such detail. Experimentation has recently prospered because of increasing interest in cross-disciplinary syntheses, and this book of advice, guidelines, and observations underline its potential and increasing importance.
  • The Evaluation of Worldwide Digital Reference Services in Libraries

    • 1st Edition
    • Jia Liu
    • English
    This book outlines and evaluates the digital reference services in libraries worldwide. The work is based on an international collaborative project between two groups from German and Chinese institutions, during which digital reference services provided by nearly 200 libraries all over the world were evaluated. The book also examines the reasons for the resulting differences; it also contains more generic proposals and perspectives on digital reference services.