Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Perl Scripting for Windows Security

    Live Response, Forensic Analysis, and Monitoring
    • 1st Edition
    • Harlan Carvey
    • English
    I decided to write this book for a couple of reasons. One was that I’ve now written a couple of books that have to do with incident response and forensic analysis on Windows systems, and I used a lot of Perl in both books. Okay…I’ll come clean…I used nothing but Perl in both books! What I’ve seen as a result of this is that many readers want to use the tools, but don’t know how…they simply aren’t familiar with Perl, with interpreted (or scripting) languages in general, and may not be entirely comfortable with running tools at the command line. This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). My hope is that not only will consultants (such as myself) find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics.
  • Fire Debris Analysis

    • 1st Edition
    • Eric Stauffer + 2 more
    • English
    The study of fire debris analysis is vital to the function of all fire investigations, and, as such, Fire Debris Analysis is an essential resource for fire investigators. The present methods of analysis include the use of gas chromatography and gas chromatography-mass spectrometry, techniques which are well established and used by crime laboratories throughout the world. However, despite their universality, this is the first comprehensive resource that addresses their application to fire debris analysis.Fire Debris Analysis covers topics such as the physics and chemistry of fire and liquid fuels, the interpretation of data obtained from fire debris, and the future of the subject. Its cutting-edge material and experienced author team distinguishes this book as a quality reference that should be on the shelves of all crime laboratories.
  • Forensic Art Essentials

    A Manual for Law Enforcement Artists
    • 1st Edition
    • Lois Gibson
    • English
    Forensic Art Essentials teaches artists to extract information from a witness or victim about a face they have seen, and produce an image good enough to lead detectives to the criminal being described. After reading this book, anyone with adequate drawing skills will be able to learn the tools necessary to develop his or her skills as a forensic artist. Instruction focuses on an explanation of techniques for various scenarios and includes the use of case studies of special situations and how they should be handled. The book covers skull reconstructions of unidentified murder victims and age progressions to aid in the apprehension of known fugitives. It also provides step-by-step illustrations of how to reconstruct a face from a skull, and offers solutions to a multitude of common problems that occur in the field. With 500 full-color illustrations, this book is an essential tool for any forensic artist.
  • Juniper(r) Networks Secure Access SSL VPN Configuration Guide

    • 1st Edition
    • Rob Cameron + 1 more
    • English
    Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.
  • Dr. Tom Shinder's ISA Server 2006 Migration Guide

    • 1st Edition
    • Thomas W Shinder
    • English
    Dr. Tom Shinder’s ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ.* Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.* Learn to Publish Exchange Server 2007 Using ISA Server 2006.* Create a DMZ using ISA Server 2006.
  • The Best Damn Cybercrime and Digital Forensics Book Period

    • 1st Edition
    • Anthony Reyes + 1 more
    • English
    Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market. This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.
  • The Best Damn Server Virtualization Book Period

    Including Vmware, Xen, and Microsoft Virtual Server
    • 1st Edition
    • Rogier Dittner + 1 more
    • English
    Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to troubleshoot. Virtualization allows you to consolidate many servers onto a single physical server reducing hardware, electrical, cooling, and administrative costs. These virtual servers run completely independent of each other so if one crashes the other are not affected. Planning and implementing a server consolidation is a complex process. This book details the requirements for such a project, includes sample forms and templates, and delivers several physical to virtual migration strategies which will save both time and costs. Readers of this book will easily be able to plan and deploy VMware, Microsoft Virtual Server, and Xen.
  • Penetration Tester's Open Source Toolkit

    • 2nd Edition
    • Chris Hurley + 1 more
    • English
    Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms.
  • Practical Oracle Security

    Your Unauthorized Guide to Relational Database Security
    • 1st Edition
    • Josh Shaul + 1 more
    • English
    This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database.
  • Medical Cell Biology

    • 3rd Edition
    • Steven R. Goodman
    • English
    Medical Cell Biology, Third Edition, focuses on the scientific aspects of cell biology important to medical students, dental students, veterinary students, and prehealth undergraduates. With its National Board-type questions, this book is specifically designed to prepare students for this exam. The book maintains a concise focus on eukaryotic cell biology as it relates to human and animal disease, all within a manageable 300-page format. This is accomplished by explaining general cell biology principles in the context of organ systems and disease. This updated version contains 60% new material and all new clinical cases. New topics include apoptosis and cell death from a neural perspective; signal transduction as it relates to normal and abnormal heart function; and cell cycle and cell division related to cancer biology.