Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Web Information Management

    A Cross-Disciplinary Textbook
    • 1st Edition
    • Stephen Mutula + 1 more
    • English
    This is a cross-disciplinary text book on web-based information management for students, faculty and practitioners (in business, industry and government). The Web has emerged as a universal space of information, occasioning proliferation of electronic publications. Though efforts have been made in developing tools and methods such as search engines, metadata, portals, subject directories and subject gateways aimed at enhancing the organization of and accessibility to information on the web, more remains to be done. The book addresses gaps in the existing web-based tools and methods for information management.
  • Libraries in the Twenty-First Century

    Charting Directions in Information Services
    • 1st Edition
    • Stuart J. Ferguson
    • English
    Libraries in the Twenty-First Century brings together library educators and practitioners to provide a scholarly yet accessible overview of library and information management and the challenges that the twenty-first century offers the information profession. The papers in this collection illustrate the changing nature of the library as it evolves into its twenty-first century manifestation. The national libraries of Australia and New Zealand, for instance, have harnessed information and communication technologies to create institutions that are far more national, even democratic, in terms of delivery of service and sheer presence than their print-based predecessors.Aimed at practitioners and students alike, this publication covers specific types of library and information agencies, discusses specific aspects of library and information management and places developments in library and information services in a number of broad contexts: socio-economic, ethico-legal, historical and educational.
  • Institutional Repositories

    Content and Culture in an Open Access Environment
    • 1st Edition
    • Catherine Jones
    • English
    A practical guide to current Institutional Repository (IR) issues, focussing on content - both gaining and preserving it and what cultural issues need to be addressed to make a successful IR. Importantly, the book uses real-life experiences to address and highlight issues raised in the book.
  • Security+ Study Guide

    • 2nd Edition
    • Ido Dubrawsky + 1 more
    • English
    Over 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study GuidesThe Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test preparation software for the edge you need to achieve certification on your first try! This system is comprehensive, affordable, and effective!* Completely Guaranteed Coverage of All Exam ObjectivesAll five Security+ domains are covered in full: General Security Concepts, Communication Security, Infrastructure Security, Basics of Cryptography, and Operational / Organizational Security * Fully Integrated LearningThis package includes a Study Guide and one complete practice exam. * Each chapter starts by explaining the exam objectives covered in the chapterYou will always know what is expected of you within each of the exam’s domains.* Exam-Specific Chapter ElementsNotes, Tips, Alerts, Exercises, Exam’s Eyeview, and Self Test with fully explained answers. * Test What You LearnedHundreds of self-test review questions test your knowledge of specific exam objectives. A Self Test Appendix features answers to all questions with complete explanations of correct and incorrect answers.
  • The Art of War for Security Managers

    10 Steps to Enhancing Organizational Effectiveness
    • 1st Edition
    • Scott Watson
    • English
    The classic book The Art of War (or as it is sometimes translated, The Art of Strategy) by Sun Tzu is often used to illustrate principles that can apply to the management of business environments. The Art of War for Security Managers is the first book to apply the time-honored principles of Sun Tzu’s theories of conflict to contemporary organizational security.Corporate leaders have a responsibility to make rational choices that maximize return on investment. The author posits that while conflict is inevitable, it need not be costly. The result is an efficient framework for understanding and dealing with conflict while minimizing costly protracted battles, focusing specifically on the crucial tasks a security manager must carry out in a 21st century organization.
  • How to Cheat at VoIP Security

    • 1st Edition
    • Thomas Porter CISSP CCNP CCDA CCS + 1 more
    • English
    The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn’t Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator’s point of view, VoIP is different. Understand why. * What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network?Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP.* The Security Considerations of Voice MessagingLearn about the types of security attacks you need to protect against within your voice messaging system.* Understand the VoIP Communication ArchitecturesUnderst... what PSTN is and what it does as well as the H.323 protocol specification, and SIP Functions and features.* The Support Protocols of VoIP EnvironmentsLearn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY.* Securing the Whole VoIP InfrastructureLearn about Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks.* Authorized Access Begins with AuthenticationLearn the methods of verifying both the user identity and the device identity in order to secure a VoIP network.* Understand Skype SecuritySkype does not log a history like other VoIP solutions; understand the implications of conducting business over a Skype connection.* Get the Basics of a VoIP Security PolicyUse a sample VoIP Security Policy to understand the components of a complete policy.
  • How to Cheat at Configuring Open Source Security Tools

    • 1st Edition
    • Michael Gregg + 4 more
    • English
    The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.* Take InventorySee how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate.* Use NmapLearn how Nmap has more features and options than any other free scanner.* Implement FirewallsUse netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable.* Perform Basic HardeningPut an IT security policy in place so that you have a concrete set of standards against which to measure. * Install and Configure Snort and WiresharkExplore the feature set of these powerful tools, as well as their pitfalls and other security considerations.* Explore Snort Add-OnsUse tools like Oinkmaster to automatically keep Snort signature files current.* Troubleshoot Network ProblemsSee how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP.* Learn Defensive Monitoring ConsiderationsSee how to define your wireless network boundaries, and monitor to know if they’re being exceeded and watch for unauthorized traffic on your network.
  • XSS Attacks

    Cross Site Scripting Exploits and Defense
    • 1st Edition
    • Seth Fogie + 4 more
    • English
    A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers.
  • Security Design Consulting

    The Business of Security System Design
    • 1st Edition
    • Brian Gouin
    • English
    A crucial reference for the practicing or aspiring design consultant, Security Design Consulting brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, Security Design Consulting gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultant’s important and growing role in an overall security program.
  • Encyclopedia of Security Management

    • 2nd Edition
    • John Fay
    • English
    The Encyclopedia of Security Management is a valuable guide for all security professionals, and an essential resource for those who need a reference work to support their continuing education. In keeping with the excellent standard set by the First Edition, the Second Edition is completely updated. The Second Edition also emphasizes topics not covered in the First Edition, particularly those relating to homeland security, terrorism, threats to national infrastructures (e.g., transportation, energy and agriculture) risk assessment, disaster mitigation and remediation, and weapons of mass destruction (chemical, biological, radiological, nuclear and explosives). Fay also maintains a strong focus on security measures required at special sites such as electric power, nuclear, gas and chemical plants; petroleum production and refining facilities; oil and gas pipelines; water treatment and distribution systems; bulk storage facilities; entertainment venues; apartment complexes and hotels; schools; hospitals; government buildings; and financial centers. The articles included in this edition also address protection of air, marine, rail, trucking and metropolitan transit systems.