Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • InfoSecurity 2008 Threat Analysis

    • 1st Edition
    • Craig Schiller + 3 more
    • English
    An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
  • Security and Loss Prevention

    An Introduction
    • 5th Edition
    • Philip Purpura
    • English
    Security and Loss Prevention, Fifth Edition, encompasses the breadth and depth of considerations involved in implementing general loss prevention concepts and security programs within an organization.It presents proven strategies to prevent and reduce incidents of loss due to legal issues, theft and other crimes, fire, accidental or intentional harm from employees as well as the many ramifications of corporate mismanagement. It contains a brand new terrorism chapter, along with coverage on background investigations, protection of sensitive information, internal threats, and considerations at select facilities (nuclear, DoD, government and federal). Author Philip Purpura once again demonstrates why students and professionals alike rely on this best-selling text as a timely, reliable resource.This book is an ideal resource for criminal justice and security academic programs, physical security professionals, retail security professionals, security managers, security consultants, law enforcement professionals, investigations professionals, risk and contingency planning professionals.
  • High-Security Mechanical Locks

    An Encyclopedic Reference
    • 1st Edition
    • Graham Pulford
    • English
    High-Security Mechanical Locks comprehensively surveys and explains the highly technical area of high security locks in a way that is accessible to a wide audience. Well over 100 different locks are presented, organized into 6 basic types. Each chapter introduces the necessary concepts in a historical perspective and further categorizes the locks. This is followed by detailed 'how it works' descriptions with many pictures, diagrams and references. The descriptions are based on actual dissections of the real locks.The scope is limited to key operated mechanical locks, thus keyless combination locks and digital locks are not covered. The book does not deal with routine locksmithing topics such as installation and servicing of locks. The sensitive area of picking and bypassing of locks is dealt with only at a high level without giving detailed information that would be unacceptable in the wrong hands.
  • Handbook of Longitudinal Research

    Design, Measurement, and Analysis
    • 1st Edition
    • Scott Menard
    • English
    Longitudinal research is a broad field in which substantial advances have been made over the past decade. Unlike many of the existing books that only address the analysis of information. The Handbook of Longitudinal Research covers design and measurement as well as the data analysis. Designed for use by a wide-ranging audience, this Handbook not only includes perspective on the methodological and data analysis problems in longitudinal research but it also includes contributors' data sets that enable readers who lack sophisticated statistics skills to move from theories about longitudinal data into practice. As the comprehensive reference, this Handbook has no direct competition as most books in this subject area are more narrowly specialized and are pitched at a high mathematical level.
  • TechnoSecurity's Guide to E-Discovery and Digital Forensics

    A Comprehensive Handbook
    • 1st Edition
    • Jack Wiles
    • English
    TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.
  • How to Cheat at Securing Your Network

    • 1st Edition
    • Ido Dubrawsky
    • English
    Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real world, step-by-step instruction. The latest addition to the best selling "How to Cheat..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery.
  • Guide to MARC 21 for Cataloging Books and Serials

    • 1st Edition
    • Asoknath Mukhopadhyay
    • English
    A comprehensive handbook for MARC catalogers and a valuable learning resource for students. The book represents a subset of MARC21 fields delineating scope, content designations, interpretations and examples. The terminology and definitions used are in tune with MARC documentation, CCP, OCLC, AACR2 and ISBD. Based on updates to MARC, the book offers field- and subfield-specific interpretations of rules and provides many examples for the appropriate use of tags, delimiters and date renderings.The book also contains a detailed bibliography and webography, plus a list of gateways that provide authentic information sources about MARC-compatible library software, utilities, freely accessible databases of MARC records and online cataloguing norms and practices.
  • Library Management

    A Case Study Approach
    • 1st Edition
    • Ravonne Green
    • English
    An essential reference for professionals within the Library and Information Science field, this book provides library managers with the requisite skills to utilize the case study approach as an effective method for problem solving and deliberation. The first chapter discusses the case study as a research tool. The second chapter outlines the processes involved in conducting a case study. An actual case model is presented in the third chapter. The succeeding chapters include case studies written by library management students at Valdosta State University in the USA. The chapters include discussion questions, analyses, and alternative scenarios to provoke further thought and discussion.
  • Long-Term Commitment, Trust and the Rise of Foreign Banking in China

    • 1st Edition
    • Qing Lu
    • English
    The rapid growth of foreign banks has aroused a growing interest in the academic field and specifically as regards to the question of why foreign banks exist. This book aims to establish the relationship between trust as contextual knowledge capital built between the Chinese government and foreign banks and foreign banks. knowledge capital and the relationship between the former and foreign banks. long-term commitment. By investigating the development strategy of foreign banks and by examining and explaining the importance of foreign banks. long-term commitment to their development, this book has demonstrated that foreign banks established branches in China not only to follow their home-country customers in order to retain their knowledge capital but also to gain market access. Trust as contextual knowledge capital built between foreign banks and the Chinese government could assist their knowledge capital retention and their market access strategy. Foreign banks. long-term commitment could help them to achieve this contextual knowledge capital. This book thus has major implications for the development strategy of foreign banks in a government-oriented economy with a controlled banking sector.
  • Design and Evaluation of Physical Protection Systems

    • 2nd Edition
    • Mary Lynn Garcia
    • English
    Design and Evaluation of Physical Security Systems, Second Edition, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.