Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

    • 1st Edition
    • David Maynor
    • English
    Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code.This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an exploitation platform. With a solid understanding of MSF’s capabilities, the book then details techniques for dramatically reducing the amount of time required for developing functional exploits.By working through a real-world vulnerabilities against popular closed source applications, the reader will learn how to use the tools and MSF to quickly build reliable attacks as standalone exploits. The section will also explain how to integrate an exploit directly into the Metasploit Framework by providing a line-by-line analysis of an integrated exploit module. Details as to how the Metasploit engine drives the behind-the-scenes exploitation process will be covered, and along the way the reader will come to understand the advantages of exploitation frameworks. The final section of the book examines the Meterpreter payload system and teaches readers to develop completely new extensions that will integrate fluidly with the Metasploit Framework.
  • Alternate Data Storage Forensics

    • 1st Edition
    • Amber Schroader + 1 more
    • English
    Learn to pull “digital fingerprints” from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at “not yet every day” devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes.
  • Molecular Photofitting

    Predicting Ancestry and Phenotype Using DNA
    • 1st Edition
    • Tony Frudakis Ph.D.
    • English
    In the field of forensics, there is a critical need for genetic tests that can function in a predictive or inferential sense, before suspects have been identified, and/or for crimes for which DNA evidence exists but eye-witnesses do not. Molecular Photofitting fills this need by describing the process of generating a physical description of an individual from the analysis of his or her DNA. The molecular photofitting process has been used to assist with the identification of remains and to guide criminal investigations toward certain individuals within the sphere of prior suspects. Molecular Photofitting provides an accessible roadmap for both the forensic scientist hoping to make use of the new tests becoming available, and for the human genetic researcher working to discover the panels of markers that comprise these tests. By implementing population structure as a practical forensics and clinical genomics tool, Molecular Photofitting serves to redefine the way science and history look at ancestry and genetics, and shows how these tools can be used to maximize the efficacy of our criminal justice system.
  • Climate, Environment, and Society in the Pacific during the Last Millennium

    • 1st Edition
    • Volume 6
    • Patrick D. Nunn
    • English
    The nature of global change in the Pacific Basin is poorly known compared to other parts of the world. Climate, Environment, and Society in the Pacific during the Last Millennium describes the climate changes that occurred in the Pacific during the last millennium and discusses how these changes controlled the broad evolution of human societies, typically filtered by the effects of changing sea level and storminess on food availability and interaction. Covering the entire period since AD 750 in the Pacific, this book describes the influences of climate change on environments and societies during the Medieval Warm Period and the Little Ice Age, focusing on the 100-year transition between these – a period of rapid change known as the AD 1300 Event.
  • Interpersonal Relations Across the Life Course

    • 1st Edition
    • Volume 12
    • Timothy J Owens + 1 more
    • English
    This volume (number 12) is subtitled Interpersonal Relations across the Life Course. It is inspired by the increased awareness in recent years of the way in which structural and psychosocial dimensions of the life course shape interpersonal relations. Interest in this issue has included both the maintenance of long-term relationships that may span many phases of the life course and the development of relationships that are specific to particular phases. The volume is a combination of invited and author initiated papers--all anonymously peer reviewed--that seeks to present a cohesive source of information on the multiform nature and influences of interpersonal relations from a variety of perspectives, theoretical frames, and substantive areas. Contributions reflect:Macro-micro linkages and interpersonal relations, (i.e., age structures, social institutions, and race/ethnicity) Parenting across the life course Parent-adult child relations and transitionsTransitio... in non-kin relationshipsSocial relationships and well-being
  • How to Cheat at Securing SQL Server 2005

    • 1st Edition
    • Mark Horninger
    • English
    The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help in order to get SQL Server secured as quickly and safely as possible.
  • Practical Embedded Security

    Building Secure Resource-Constrained Systems
    • 1st Edition
    • Timothy Stapko
    • English
    The great strides made over the past decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem: their designs are now being targeted by the same malicious attackers whose predations have plagued traditional systems for years. Rising concerns about data security in embedded devices are leading engineers to pay more attention to security assurance in their designs than ever before. This is particularly challenging due to embedded devices’ inherent resource constraints such as limited power and memory. Therefore, traditional security solutions must be customized to fit their profile, and entirely new security concepts must be explored. However, there are few resources available to help engineers understand how to implement security measures within the unique embedded context. This new book from embedded security expert Timothy Stapko is the first to provide engineers with a comprehensive guide to this pivotal topic. From a brief review of basic security concepts, through clear explanations of complex issues such as choosing the best cryptographic algorithms for embedded utilization, the reader is provided with all the information needed to successfully produce safe, secure embedded devices.
  • The Information Literacy Cookbook

    Ingredients, Recipes and Tips for Success
    • 1st Edition
    • Jane Secker + 2 more
    • English
    This book, aimed at an international audience, provides an overview of Information Literacy (IL) in practice; what it is, why it’s become so important in the library profession and demonstrates how librarians can cultivate a better understanding of IL in their own organisations. It uses the ‘Cookbook’ theme throughout to provide a more informal approach, which will appeal to practitioners, and also reflects the need to provide guidance in the form of recipes, tips for success, regional variations, and possible substitutions if ingredients aren’t available. This approach makes it easy to read and highly valuable for the busy information professional. It includes an overview of information literacy in higher education, the schools sector, public libraries, the health service and the commercial sector. It also includes contributions from international authors.
  • The Corporate Security Professional's Handbook on Terrorism

    • 1st Edition
    • Edward Halibozek + 2 more
    • English
    The Corporate Security Professional's Handbook on Terrorism is a professional reference that clarifies the difference between terrorism against corporations and their assets, versus terrorism against government assets. It addresses the existing misconceptions regarding how terrorism does or does not affect corporations, and provides security professionals and business executives with a better understanding of how terrorism may impact them. Consisting three sections, Section I provides an explanation of what terrorism is, its history, who engages in it, and why. Section II focuses on helping the security professional develop and implement an effective anti-terrorism program in order to better protect the employees and assets of the corporation. Section III discusses the future as it relates to the likelihood of having to deal with terrorism. The book provides the reader with a practitioner’s guide, augmented by a historical assessment of terrorism and its impact to corporations, enabling them to immediately put in place useful security processes and methods to protect their corporate interests against potential acts of terror. This is guide is an essential tool for preparing security professionals and company executives to operate in an increasingly hostile global business environment.
  • The History of Information Security

    A Comprehensive Handbook
    • 1st Edition
    • Karl Maria Michael de Leeuw + 1 more
    • English
    Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered. There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.