Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Cyber Crime Investigations

    Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
    • 1st Edition
    • James Steele + 3 more
    • English
    Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.The book begins with the chapter “What is Cyber Crime?” This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only will these topics be generally be discussed and explained for the novice, but the hard questions —the questions that have the power to divide this community— will also be examined in a comprehensive and thoughtful manner. This book will serve as a foundational text for the cyber crime community to begin to move past current difficulties into its next evolution.
  • Probabilistic Methods for Financial and Marketing Informatics

    • 1st Edition
    • Richard E. Neapolitan + 1 more
    • English
    Probabilistic Methods for Financial and Marketing Informatics aims to provide students with insights and a guide explaining how to apply probabilistic reasoning to business problems. Rather than dwelling on rigor, algorithms, and proofs of theorems, the authors concentrate on showing examples and using the software package Netica to represent and solve problems. The book contains unique coverage of probabilistic reasoning topics applied to business problems, including marketing, banking, operations management, and finance. It shares insights about when and why probabilistic methods can and cannot be used effectively. This book is recommended for all R&D professionals and students who are involved with industrial informatics, that is, applying the methodologies of computer science and engineering to business or industry information. This includes computer science and other professionals in the data management and data mining field whose interests are business and marketing information in general, and who want to apply AI and probabilistic methods to their problems in order to better predict how well a product or service will do in a particular market, for instance. Typical fields where this technology is used are in advertising, venture capital decision making, operational risk measurement in any industry, credit scoring, and investment science.
  • Biometric Technologies and Verification Systems

    • 1st Edition
    • John Vacca
    • English
    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authent... identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system. Only biometrics verification/authent... is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
  • Crime Scene Photography

    • 1st Edition
    • Edward M. Robinson
    • English
    Crime Scene Photography is a book wrought from years of experience, with material carefully selected for ease of use and effectiveness in training, and field tested by the author in his role as a Forensic Services Supervisor for the Baltimore County Police Department.While there are many books on non-forensic photography, none of them adequately adapt standard image-taking to crime scene photography. The forensic photographer, or more specifically the crime scene photographer, must know how to create an acceptable image that is capable of withstanding challenges in court. This book blends the practical functions of crime scene processing with theories of photography to guide the reader in acquiring the skills, knowledge and ability to render reliable evidence.
  • Text Entry Systems

    Mobility, Accessibility, Universality
    • 1st Edition
    • I. Scott MacKenzie + 1 more
    • English
    Text Entry Systems covers different aspects of text entry systems and offers prospective researchers and developers global guidelines for conducting research on text entry, in terms of design strategy, evaluation methodology, and requirements; a discussion of the history and current state of the art of entry systems; and specific guidelines for designing entry systems for a specific target, depending on devices, modalities, language, and different physical conditions of users. Text entry has never been so important as it is today. This is in large part due to the phenomenal, relatively recent success of mobile computing, text messaging on mobile phones, and the proliferation of small devices like the Blackberry and Palm Pilot. Compared with the recent past, when text entry was primarily through the standard "qwerty" keyboard, people today use a diverse array of devices with the number and variety of such devices ever increasing. The variety is not just in the devices, but also in the technologies used: entry modalities have become more varied and include speech recognition and synthesis, handwriting recognition, and even eye-tracking using image processing on web-cams. Statistical language modeling has advanced greatly in the past ten years and so therein is potential to facilitate and improve text entry — increasingly, the way people communicate.
  • Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators

    • 1st Edition
    • Johnny Long + 7 more
    • English
    “This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and thoughts discussed here are as new as tomorrow’s headlines, whereas others have been around for decades without being properly addressed. I hope you enjoy this book as much as we have enjoyed working with the various authors and friends during its development.” —Donald Withers, CEO and Cofounder of TheTrainingCo.• Jack Wiles, on Social Engineering offers up a potpourri of tips, tricks, vulnerabilities, and lessons learned from 30-plus years of experience in the worlds of both physical and technical security.• Russ Rogers on the Basics of Penetration Testing illustrates the standard methodology for penetration testing: information gathering, network enumeration, vulnerability identification, vulnerability exploitation, privilege escalation, expansion of reach, future access, and information compromise. • Johnny Long on No Tech Hacking shows how to hack without touching a computer using tailgating, lock bumping, shoulder surfing, and dumpster diving.• Phil Drake on Personal, Workforce, and Family Preparedness covers the basics of creating a plan for you and your family, identifying and obtaining the supplies you will need in an emergency.• Kevin O’Shea on Seizure of Digital Information discusses collecting hardware and information from the scene.• Amber Schroader on Cell Phone Forensics writes on new methods and guidelines for digital forensics.• Dennis O’Brien on RFID: An Introduction, Security Issues, and Concerns discusses how this well-intended technology has been eroded and used for fringe implementations.• Ro... Green on Open Source Intelligence details how a good Open Source Intelligence program can help you create leverage in negotiations, enable smart decisions regarding the selection of goods and services, and help avoid pitfalls and hazards. • Raymond Blackwood on Wireless Awareness: Increasing the Sophistication of Wireless Users maintains it is the technologist’s responsibility to educate, communicate, and support users despite their lack of interest in understanding how it works.• Greg Kipper on What is Steganography? provides a solid understanding of the basics of steganography, what it can and can’t do, and arms you with the information you need to set your career path.• Eric Cole on Insider Threat discusses why the insider threat is worse than the external threat and the effects of insider threats on a company.
  • Microsoft Vista for IT Security Professionals

    • 1st Edition
    • Anthony Piltzecker
    • English
    Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. The book begins with a discussion of Microsoft's Trustworthy Computing Initiative and Vista's development cycle, which was like none other in Microsoft's history. Expert authors will separate the hype from the reality of Vista’s preparedness to withstand the 24 x 7 attacks it will face from malicious attackers as the world’s #1 desktop operating system.
  • How to Cheat at Configuring Exchange Server 2007

    Including Outlook Web, Mobile, and Voice Access
    • 1st Edition
    • Henrik Walther
    • English
    The Perfect Reference for the Multitasked System AdministratorsThe new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat will help you get Exchange Server 2007 up and running as quickly and safely as possible.• Understand Exchange 2007 PrerequisitesReview hardware and software requirements, Active Directory requirements, and more.• Manage Recipient FilteringCreate a custom MMC that contains the Exchange 2007 Recipients work center, which can be used, for example, by the helpdesk staff in your organization.• Manage Outlook AnywhereOutlook Anywhere makes it possible for your end users to remotely access their mailboxes from the Internet using their full Outlook clients.• Manage Outlook Web Access 2007See how Outlook Web Access 2007 was completely rewritten in managed code to make it scale even better.• Use the Exchange 2007 Queue ViewerYou can now view information about queues and examine the messages held within them.• Master Powerful Out-of-the-Box Spam ProtectionThe Edge Transport server supports SMTP, provides several antispam filtering agents, and supports antivirus extensibility.• Manage a Single-Copy Cluster-Based SetupSCC-based cluster provides service failover and still has a single point of failure when it comes to the databases.• Recover Mailbox DatabasesUse the improved database portability feature to port and recover a Mailbox database to any server in the Exchange 2007 organization.
  • Information Architecture for Information Professionals

    • 1st Edition
    • Susan Batley
    • English
    This book covers the key aspects of information architecture: core elements of information management, indexing, cataloguing and classification - organising and recording information in the digital environment. Information Architecture for Information Professionals also focuses on design, specifically user-centred design: designing information systems that support the needs of users, by providing attractive, intuitive interfaces that support a range of information tasks and accommodate a range of individual resources.
  • Improving Library Services to People with Disabilities

    • 1st Edition
    • Courtney Deines-Jones
    • English
    The book takes account of the key fact that to maximize their potential, people must have lifelong access to the information and services offered through books and libraries. Whether to address concerns of an ageing population or to enable all citizens to contribute fully through meaningful education and work opportunities, more emphasis is being given to promoting library services to people who have disabilities. This book is a compendium of articles focused on serving adults with disabilities in an international setting. From this book, librarians, policy makers and constituents will understand the importance of serving all potential patrons, will be exposed to best practices and model programs, and will learn techniques and strategies for improving the services their libraries offer.