Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Google Talking

    • 1st Edition
    • Johnny Long + 1 more
    • English
    Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool. Google Talking takes communication to the next level, combining the awesome power of Text and Voice! This book teaches readers how to blow the lid off of Instant Messaging and Phone calls over the Internet.This book will cover the program “Google Talk” in its entirety. From detailed information about each of its features, to a deep-down analysis of how it works. Also, we will cover real techniques from the computer programmers and hackers to bend and tweak the program to do exciting and unexpected things.
  • CD and DVD Forensics

    • 1st Edition
    • Paul Crowley
    • English
    CD and DVD Forensics will take the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corporate and system security in the private sector, the interest in this subject has just begun to blossom.CD and DVD Forensics is a how to book that will give the reader tools to be able to open CDs and DVDs in an effort to identify evidence of a crime. These tools can be applied in both the public and private sectors. Armed with this information, law enforcement, corporate security, and private investigators will be able to be more effective in their evidence related tasks. To accomplish this the book is divided into four basic parts: (a) CD and DVD physics dealing with the history, construction and technology of CD and DVD media, (b) file systems present on CDs and DVDs and how these are different from that which is found on hard disks, floppy disks and other media, (c) considerations for handling CD and DVD evidence to both recover the maximum amount of information present on a disc and to do so without destroying or altering the disc in any way, and (d) using the InfinaDyne product CD/DVD Inspector to examine discs in detail and collect evidence.
  • Configuring Juniper Networks NetScreen and SSG Firewalls

    • 1st Edition
    • Rob Cameron + 3 more
    • English
    Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform.
  • Terrorism and Homeland Security

    An Introduction with Applications
    • 1st Edition
    • Philip Purpura
    • English
    Terrorism and Homeland Security: An Introduction with Applications provides a comprehensive introduction to the problem of terrorism and to its solution, Homeland Security. In addition to its extensive treatment of terrorism, the book describes public and private sector counterterrorism as well as all hazards emergency management. It presents national, state, and local perspectives and up-to-date information, including the reorganization of the Department of Homeland Security, the renewed Patriot Act, and intelligence reform. This book covers a wide range of issues, including such topics as the effectiveness of terrorism; weapons of mass destruction; privatization of counterterrorism; and wars of globalization. Learning objectives and key terms outline chapter content and highlight important topics. Scenarios are placed at the beginning of each chapter to explain concepts and relate theory to practice. The book includes Reality Check sections and critical thinking boxes to help the reader to formulate alternative perspectives on issues and events in order to seek creative and improved solutions to problems. At the end of each chapter are discussion questions that reinforce content and provide an opportunity for the reader to review, synthesize, and debate the key issues; applications that use assessment center and red team techniques to help the student develop analytical and decision-making skills in the context of understanding the mindset and planning processes of terrorist; and web links that provide direction for additional resources, information, and research. This book's primary market are students attending community college homeland security programs, as well as state, federal, and private security training programs. Its secondary market are professionals of the Department of Homeland Security and security professionals belonging to ASIS.
  • The Profit Impact of Business Intelligence

    • 1st Edition
    • Steve Williams + 1 more
    • English
    The Profit Impact of Business Intelligence presents an A-to-Z approach for getting the most business intelligence (BI) from a company's data assets or data warehouse. BI is not just a technology or methodology, it is a powerful new management approach that – when done right – can deliver knowledge, efficiency, better decisions, and profit to almost any organization that uses it. When BI first came on the scene, it promised a lot but often failed to deliver. The missing element was the business-centric focus explained in this book. It shows how you can achieve the promise of BI by connecting it to your organization’s strategic goals, culture, and strengths while correcting your BI weaknesses. It provides a practical, process-oriented guide to achieve the full promise of BI; shows how world-class companies used BI to become leaders in their industries; helps senior business and IT executives understand the strategic impact of BI and how they can ensure a strong payoff from their BI investments; and identifies the most common mistakes organizations make in implementing BI. The book also includes a helpful glossary of BI terms; a BI readiness assessment for your organization; and Web links and extensive references for more information.
  • Security Operations Management

    • 2nd Edition
    • Robert McCrie
    • English
    The second edition of Security Operations Management continues as the seminal reference on corporate security management operations. Revised and updated, topics covered in depth include: access control, selling the security budget upgrades to senior management, the evolution of security standards since 9/11, designing buildings to be safer from terrorism, improving relations between the public and private sectors, enhancing security measures during acute emergencies, and, finally, the increased security issues surrounding the threats of terrorism and cybercrime. An ideal reference for the professional, as well as a valuable teaching tool for the security student, the book includes discussion questions and a glossary of common security terms. Additionally, a brand new appendix contains contact information for academic, trade, and professional security organizations.
  • CCTV Surveillance

    Video Practices and Technology
    • 2nd Edition
    • Herman Kruegle
    • English
    This revision of the classic book on CCTV technology, CCTV Surveillance, provides a comprehensive examination of CCTV, covering the applications of various systems, how to design and install a system, and how to choose the right hardware. Taking into account the ever-changing advances in technology using digital techniques and the Internet, CCTV Surveillance, Second Edition, is completely updated with the recent advancements in digital cameras and digital recorders, remote monitoring via the Internet, and CCTV integration with other security systems. Continuing in the celebrated tradition of the first edition, the second edition is written to serve as a useful resource for the end-user as well as the technical practitioner. Each chapter begins with an overview, and presents the latest information on the relevant equipment, describing the characteristics, features and application of each device. Coverage of aging or obsolete technology is reduced to a historical perspective, and eight brand new chapters cover digital video technology, multiplexers, integrated camera-lens-housing, smart domes, and rapid deployment CCTV systems.
  • Cryptography for Developers

    • 1st Edition
    • Tom St Denis
    • English
    The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptogr... for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.
  • Electronic Security Systems

    A Manager's Guide to Evaluating and Selecting System Solutions
    • 1st Edition
    • Robert Pearson
    • English
    Electronic Security Systems is a book written to help the security professional understand the various electronic security functional components and the ways these components interconnect. Providing a holistic approach to solving security issues, this book discusses such topics as integrating electronic functions, developing a system, component philosophy, possible long-term issues, and the culture within a corporation. The book uses a corporate environment as its example; however, the basic issues can be applied to virtually any environment.For a security professional to be effective, he or she needs to understand the electronics as they are integrated into a total security system. Electronic Security Systems allows the professional to do just that, and is an invaluable addition to any security library.
  • FISMA Certification and Accreditation Handbook

    • 1st Edition
    • L. Taylor + 1 more
    • English
    The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C&A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C&A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requirements. Once this phase of the C&A project is complete, the reader will learn to perform the security tests and evaluations, business impact assessments system risk assessments, business risk assessments, contingency plans, business impact assessments, and system security plans. Finally the reader will learn to audit their entire C&A project and correct any failures.