Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Cancer Imaging

    Instrumentation and Applications
    • 1st Edition
    • M. A. Hayat
    • English
    This second of two volumes on Cancer Imaging covers the three major topics of imaging instrumentation, general imaging applications, and imaging of a number of human cancer types. Where the first volume emphasized lung and breast carcinomas, Volume 2 focuses on prostate, colorectal, ovarian, gastrointestinal, and bone cancers. Although cancer therapy is not the main subject of this series, the crucial role of imaging in selecting the type of therapy and its post-treatment assessment are discussed. The major emphasis in this volume is on cancer imaging; however, differentiation between benign tumors and malignant tumors is also discussed. This volume is sold individually, and Cancer Imaging, Volume 1 [ISBN: 978-0-12-370468-9] sells separately for $189 and also as part of a two volume set [ISBN: 978-0-12-374212-4] for $299.
  • Google Hacking for Penetration Testers

    • 1st Edition
    • Bill Gardner + 2 more
    • English
    This book helps people find sensitive information on the Web.Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and “self-police” their own organizations.Reader... will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with MySpace, LinkedIn, and more for passive reconaissance.
  • Security Supervision and Management

    The Theory and Practice of Asset Protection
    • 3rd Edition
    • IFPO
    • Sandi J. Davies
    • English
    The International Foundation for Protection Officers (IFPO) has for many years provided materials to support its certification programs. The current edition of this book is being used as the core text for the Security Supervision and Management Training/Certified in Security Supervision and Management (CSSM) Program at IFPO. The CSSM was designed in 1988 to meet the needs of the security supervisor or senior protection officer. The book has enjoyed tremendous acceptance and success in the past, and the changes in this third edition, vetted by IFPO, make it still more current and relevant. Updates include 14 new chapters, 3 completely revised chapters, "Student Performance Objectives" in each chapter, and added information on related resources (both print and online).
  • Information Assurance

    Dependability and Security in Networked Systems
    • 1st Edition
    • Yi Qian + 3 more
    • English
    In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).
  • Keeping Found Things Found: The Study and Practice of Personal Information Management

    • 1st Edition
    • William Jones
    • English
    Keeping Found Things Found: The Study and Practice of Personal Information Management is the first comprehensive book on new 'favorite child' of R&D at Microsoft and elsewhere, personal information management (PIM). It provides a comprehensive overview of PIM as both a study and a practice of the activities people do, and need to be doing, so that information can work for them in their daily lives. It explores what good and better PIM looks like, and how to measure improvements. It presents key questions to consider when evaluating any new PIM informational tools or systems. This book is designed for R&D professionals in HCI, data mining and data management, information retrieval, and related areas, plus developers of tools and software that include PIM solutions.
  • Principles of E-Learning Systems Engineering

    • 1st Edition
    • Lester Gilbert + 1 more
    • English
    The book integrates the principles of software engineering with the principles of educational theory, and applies them to the problems of e-learning development, thus establishing the discipline of E-learning systems engineering. For the first time, these principles are collected and organised into the coherent framework that this book provides. Both newcomers to and established practitioners in the field are provided with integrated and grounded advice on theory and practice. The book presents strong practical and theoretical frameworks for the design and development of technology-based materials and environments which have teaching, training or educational value. It brings together a complete range of the specific theories and detailed techniques involved in the design, development and delivery of materials such as business presentations, web-based presentations, training courses and academic lessons. Although the methods and theories discussed are generally appropriate to all forms and levels of learning and teaching, the book illustrates their use in and focuses its approach upon e-learning with adults.
  • Emerging Technologies for Knowledge Resource Management

    • 1st Edition
    • M Pandian + 1 more
    • English
    Emerging Technologies for Knowledge Resource Management examines various factors that contribute to an enabled environment for optimum utilisation of information resources. These include the digital form of information resources, which are inherently sharable, consortia as a concept to bring people and materials together and unified portals as technology to bring together disparate and heterogeneous resources for sharing and access. The book provides a step-by-step guideline for system analysis and requirements analysis. The book also provides reviews of existing portal models for sharing resources and identifies the gap in meeting the objectives. The book provides a framework for a cost effective unified portal model to share the electronic information resources available in the participating libraries in a distributed digital environment.
  • How to Cheat at Securing Linux

    • 1st Edition
    • James Stanger
    • English
    Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system. This book teaches Linux system administrators how to protect their servers from malicious threats.As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. This was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact opposite story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers (Source: IDC).This book covers Open Source security, implementing an intrusion detection system, unearthing Rootkits, defending against malware, creating Virtual Private Networks, and much more.
  • Primate Models of Children's Health and Developmental Disabilities

    • 1st Edition
    • Thomas Burbacher + 2 more
    • English
    The rate of neurodevelopmental disabilities, including autism, mental retardation, hearing loss and attention deficit hyperactivity disorder is rising in the United States. Although estimates of the prevalence of these disorders vary, figures from the CDC indicate that 4% of all school age children are developmentally disabled. During infancy, many important milestones in behavioral development are shared between human and nonhuman primates. Learning more about the causes of abnormal development in monkeys has provided important insights into the mechanisms underlying neurodevelopmental disabilities in human infants. This book documents the latest research not commonly found in other references, and provides a comprehensive look at the results from decades of work with nonhuman primates as it relates to child development and disability.
  • Managing IT Security Ultimate CD

    • 1st Edition
    • Russ Rogers + 1 more
    • English
    Most IT Professionals rely on a small core of books that are specifically targeted to their job responsibilities. These dog-eared volumes are used daily and are considered essential. But budgets and space commonly limit just how many books can be added to your core library. The Managing IT Security Ultimate CD solves this problem. It contains seven of our best-selling titles, providing the "next level" of reference you will need for about less than half the price of the hard-copy books purchased separately. The CD contains the complete PDF versions of the following Syngress titles: •Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigations; 1597491381 •Network Security Assessment: From Vulnerability to Patch; 1597491012 •Syngress IT Security Project Management Handbook; 1597490768 •How to Cheat at Managing Information Security; 1597491101 •Syngress Force Emerging Threat Analysis: From Mischief to Malicious; 1597490563 •Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools; 1597490369 •Network Security Evaluation Using the NSA IEM; 1597490350