Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Biometric Technologies and Verification Systems

    • 1st Edition
    • John Vacca
    • English
    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authent... identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system. Only biometrics verification/authent... is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
  • Crime Scene Photography

    • 1st Edition
    • Edward M. Robinson
    • English
    Crime Scene Photography is a book wrought from years of experience, with material carefully selected for ease of use and effectiveness in training, and field tested by the author in his role as a Forensic Services Supervisor for the Baltimore County Police Department.While there are many books on non-forensic photography, none of them adequately adapt standard image-taking to crime scene photography. The forensic photographer, or more specifically the crime scene photographer, must know how to create an acceptable image that is capable of withstanding challenges in court. This book blends the practical functions of crime scene processing with theories of photography to guide the reader in acquiring the skills, knowledge and ability to render reliable evidence.
  • Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators

    • 1st Edition
    • Johnny Long + 7 more
    • English
    “This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and thoughts discussed here are as new as tomorrow’s headlines, whereas others have been around for decades without being properly addressed. I hope you enjoy this book as much as we have enjoyed working with the various authors and friends during its development.” —Donald Withers, CEO and Cofounder of TheTrainingCo.• Jack Wiles, on Social Engineering offers up a potpourri of tips, tricks, vulnerabilities, and lessons learned from 30-plus years of experience in the worlds of both physical and technical security.• Russ Rogers on the Basics of Penetration Testing illustrates the standard methodology for penetration testing: information gathering, network enumeration, vulnerability identification, vulnerability exploitation, privilege escalation, expansion of reach, future access, and information compromise. • Johnny Long on No Tech Hacking shows how to hack without touching a computer using tailgating, lock bumping, shoulder surfing, and dumpster diving.• Phil Drake on Personal, Workforce, and Family Preparedness covers the basics of creating a plan for you and your family, identifying and obtaining the supplies you will need in an emergency.• Kevin O’Shea on Seizure of Digital Information discusses collecting hardware and information from the scene.• Amber Schroader on Cell Phone Forensics writes on new methods and guidelines for digital forensics.• Dennis O’Brien on RFID: An Introduction, Security Issues, and Concerns discusses how this well-intended technology has been eroded and used for fringe implementations.• Ro... Green on Open Source Intelligence details how a good Open Source Intelligence program can help you create leverage in negotiations, enable smart decisions regarding the selection of goods and services, and help avoid pitfalls and hazards. • Raymond Blackwood on Wireless Awareness: Increasing the Sophistication of Wireless Users maintains it is the technologist’s responsibility to educate, communicate, and support users despite their lack of interest in understanding how it works.• Greg Kipper on What is Steganography? provides a solid understanding of the basics of steganography, what it can and can’t do, and arms you with the information you need to set your career path.• Eric Cole on Insider Threat discusses why the insider threat is worse than the external threat and the effects of insider threats on a company.
  • Text Entry Systems

    Mobility, Accessibility, Universality
    • 1st Edition
    • I. Scott MacKenzie + 1 more
    • English
    Text Entry Systems covers different aspects of text entry systems and offers prospective researchers and developers global guidelines for conducting research on text entry, in terms of design strategy, evaluation methodology, and requirements; a discussion of the history and current state of the art of entry systems; and specific guidelines for designing entry systems for a specific target, depending on devices, modalities, language, and different physical conditions of users. Text entry has never been so important as it is today. This is in large part due to the phenomenal, relatively recent success of mobile computing, text messaging on mobile phones, and the proliferation of small devices like the Blackberry and Palm Pilot. Compared with the recent past, when text entry was primarily through the standard "qwerty" keyboard, people today use a diverse array of devices with the number and variety of such devices ever increasing. The variety is not just in the devices, but also in the technologies used: entry modalities have become more varied and include speech recognition and synthesis, handwriting recognition, and even eye-tracking using image processing on web-cams. Statistical language modeling has advanced greatly in the past ten years and so therein is potential to facilitate and improve text entry — increasingly, the way people communicate.
  • Microsoft Vista for IT Security Professionals

    • 1st Edition
    • Anthony Piltzecker
    • English
    Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. The book begins with a discussion of Microsoft's Trustworthy Computing Initiative and Vista's development cycle, which was like none other in Microsoft's history. Expert authors will separate the hype from the reality of Vista’s preparedness to withstand the 24 x 7 attacks it will face from malicious attackers as the world’s #1 desktop operating system.
  • How to Cheat at Configuring Exchange Server 2007

    Including Outlook Web, Mobile, and Voice Access
    • 1st Edition
    • Henrik Walther
    • English
    The Perfect Reference for the Multitasked System AdministratorsThe new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat will help you get Exchange Server 2007 up and running as quickly and safely as possible.• Understand Exchange 2007 PrerequisitesReview hardware and software requirements, Active Directory requirements, and more.• Manage Recipient FilteringCreate a custom MMC that contains the Exchange 2007 Recipients work center, which can be used, for example, by the helpdesk staff in your organization.• Manage Outlook AnywhereOutlook Anywhere makes it possible for your end users to remotely access their mailboxes from the Internet using their full Outlook clients.• Manage Outlook Web Access 2007See how Outlook Web Access 2007 was completely rewritten in managed code to make it scale even better.• Use the Exchange 2007 Queue ViewerYou can now view information about queues and examine the messages held within them.• Master Powerful Out-of-the-Box Spam ProtectionThe Edge Transport server supports SMTP, provides several antispam filtering agents, and supports antivirus extensibility.• Manage a Single-Copy Cluster-Based SetupSCC-based cluster provides service failover and still has a single point of failure when it comes to the databases.• Recover Mailbox DatabasesUse the improved database portability feature to port and recover a Mailbox database to any server in the Exchange 2007 organization.
  • A Comprehensive Library Staff Training Programme in the Information Age

    • 1st Edition
    • Aileen Wood
    • English
    This book discusses the issues surrounding the implementation and ‘selling’ of a comprehensive library staff training programme. Importantly, it contains many tried and tested techniques used by the author; it also includes standard documentation that readers can use in their own organisation for training purposes.
  • Information Architecture for Information Professionals

    • 1st Edition
    • Susan Batley
    • English
    This book covers the key aspects of information architecture: core elements of information management, indexing, cataloguing and classification - organising and recording information in the digital environment. Information Architecture for Information Professionals also focuses on design, specifically user-centred design: designing information systems that support the needs of users, by providing attractive, intuitive interfaces that support a range of information tasks and accommodate a range of individual resources.
  • Acquisitions Go Global

    An Introduction to Library Collection Management in the 21st Century
    • 1st Edition
    • Jim Agee
    • English
    This book is a guide that leads the reader through many aspects of a library’s collection including the user, current holdings, selection, and acquisition of new materials. The reader is also led to consider budgets, and how books are made available in 21st century markets. Methods for assessing library vendors are described. Practical details are frequently included; concepts and theory are alluded to but are not a major emphasis of the text. A global scope creates an inclusive mood for readers in developed or developing nations. The final chapter speculates upon acquisitions librarianship in the 21st century, on influences of biotechnology, nanotechnology, and increased computerization. This is a fundamental book for the student or practicing librarian, a book that shares much about acquisitions but admits an uncertainty about the evolution of the profession.
  • Improving Library Services to People with Disabilities

    • 1st Edition
    • Courtney Deines-Jones
    • English
    The book takes account of the key fact that to maximize their potential, people must have lifelong access to the information and services offered through books and libraries. Whether to address concerns of an ageing population or to enable all citizens to contribute fully through meaningful education and work opportunities, more emphasis is being given to promoting library services to people who have disabilities. This book is a compendium of articles focused on serving adults with disabilities in an international setting. From this book, librarians, policy makers and constituents will understand the importance of serving all potential patrons, will be exposed to best practices and model programs, and will learn techniques and strategies for improving the services their libraries offer.