Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Acquisitions Go Global

    An Introduction to Library Collection Management in the 21st Century
    • 1st Edition
    • Jim Agee
    • English
    This book is a guide that leads the reader through many aspects of a library’s collection including the user, current holdings, selection, and acquisition of new materials. The reader is also led to consider budgets, and how books are made available in 21st century markets. Methods for assessing library vendors are described. Practical details are frequently included; concepts and theory are alluded to but are not a major emphasis of the text. A global scope creates an inclusive mood for readers in developed or developing nations. The final chapter speculates upon acquisitions librarianship in the 21st century, on influences of biotechnology, nanotechnology, and increased computerization. This is a fundamental book for the student or practicing librarian, a book that shares much about acquisitions but admits an uncertainty about the evolution of the profession.
  • Organising Knowledge

    Taxonomies, Knowledge and Organisational Effectiveness
    • 1st Edition
    • Patrick Lambe
    • English
    Taxonomies are often thought to play a niche role within content-oriented knowledge management projects. They are thought to be ‘nice to have’ but not essential. In this ground-breaking book, Patrick Lambe shows how they play an integral role in helping organizations coordinate and communicate effectively. Through a series of case studies, he demonstrates the range of ways in which taxonomies can help organizations to leverage and articulate their knowledge. A step-by-step guide in the book to running a taxonomy project is full of practical advice for knowledge managers and business owners alike.
  • A Comprehensive Library Staff Training Programme in the Information Age

    • 1st Edition
    • Aileen Wood
    • English
    This book discusses the issues surrounding the implementation and ‘selling’ of a comprehensive library staff training programme. Importantly, it contains many tried and tested techniques used by the author; it also includes standard documentation that readers can use in their own organisation for training purposes.
  • Forensic Science Under Siege

    The Challenges of Forensic Laboratories and the Medico-Legal Investigation System
    • 1st Edition
    • Kelly Pyrek
    • English
    Forensic science laboratories' reputations have increasingly come under fire. Incidents of tainted evidence, false reports, allegations of negligence, scientifically flawed testimony, or - worse yet - perjury in in-court testimony, have all served to cast a shadow over the forensic sciences. Instances of each are just a few of the quality-related charges made in the last few years. Forensic Science Under Siege is the first book to integrate and explain these problematic trends in forensic science. The issues are timely, and are approached from an investigatory, yet scholarly and research-driven, perspective. Leading experts are consulted and interviewed, including directors of highly visible forensic laboratories, as well as medical examiners and coroners who are commandeering the discussions related to these issues. Interviewees include Henry Lee, Richard Saferstein, Cyril Wecht, and many others. The ultimate consequences of all these pressures, as well as the future of forensic science, has yet to be determined. This book examines these challenges, while also exploring possible solutions (such as the formation of a forensic science consortium to address specific legislative issues). It is a must-read for all forensic scientists.
  • Stealing the Network

    How to Own a Shadow
    • 1st Edition
    • Johnny Long + 2 more
    • English
    The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page.
  • RFID+ Study Guide and Practice Exams

    Study Guide and Practice Exams
    • 1st Edition
    • Paul Sanghera
    • English
    Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags (also called transponders). This book is a guide to CompTIA's new RFID+ Security exam and includes the following study elements: Exam objectives covered in a chapter are clearly explained in the beginning of the chapter, Notes and Alerts highlight the crucial points, Exam’s Eye View emphasizes the important points from the exam’s perspective, Key Terms present definitions, Review Questions contain questions modeled after the real exam questions. Answers to these questions are presented with complete explanations in an appendix. Also included is a full practice exam modeled after the real exam. The answers to the exam questions are presented with full explanations.
  • Developer's Guide to Web Application Security

    • 1st Edition
    • Michael Cross
    • English
    Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential.
  • Botnets

    The Killer Web Applications
    • 1st Edition
    • Craig Schiller + 1 more
    • English
    The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.
  • Secure Your Network for Free

    • 1st Edition
    • Eric Seagren
    • English
    This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesn’t want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software.
  • Intruder Alarms

    • 3rd Edition
    • Gerard Honey
    • English
    Intruder Alarms provides a definitive and fully up-to-date guide to the specification, systems design, integration, installation and maintenance of intruder alarm systems. It has been written to be the essential handbook for installation engineers and security professionals working in this rapidly expanding and developing area. The third edition includes new material on systems integration, digital systems, wireless and remote signalling technologies, and electrical safety.The revision has brought coverage fully in line with the new European standards (EN50131 / BS EN 50131-1), with their implications summarised in a new appendix. The coverage has also been carefully matched to the requirements of the new Knowledge of Security and Emergency Alarm Systems from City & Guilds (1852).