Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Hack the Stack

    Using Snort and Ethereal to Master The 8 Layers of An Insecure Network
    • 1st Edition
    • Stephen Watkins + 5 more
    • English
    This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker’s exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur. What makes this book unique is that it presents the material in a layer by layer approach which offers the readers a way to learn about exploits in a manner similar to which they most likely originally learned networking. This methodology makes this book a useful tool to not only security professionals but also for networking professionals, application programmers, and others. All of the primary protocols such as IP, ICMP, TCP are discussed but each from a security perspective. The authors convey the mindset of the attacker by examining how seemingly small flaws are often the catalyst of potential threats. The book considers the general kinds of things that may be monitored that would have alerted users of an attack.
  • Microsoft Windows Security Fundamentals

    For Windows 2003 SP1 and R2
    • 1st Edition
    • Jan De Clercq + 1 more
    • English
    This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks. Since its release in 2003 the Microsoft Exchange server has had two important updates, SP1 and SP2. SP1, allows users to increase their security, reliability and simplify the administration of the program. Within SP1, Microsoft has implemented R2 which improves identity and access management across security-related boundaries. R2 also improves branch office server management and increases the efficiency of storage setup and management. The second update, SP2 minimizes spam, pop-ups and unwanted downloads. These two updated have added an enormous amount of programming security to the server software.
  • Elsevier's Dictionary of Chemoetymology

    The Whys and Whences of Chemical Nomenclature and Terminology
    • 1st Edition
    • Alexander Senning
    • English
    Noting a marked lack of comprehensiveness and/or contemporaneity among typical reference works on chemical etymology, as well as a somewhat spotty coverage of chemical terms and their etymology in comprehensive dictionaries and textbooks the author decided to write an up-to-date desk reference on chemical etymology which would satisfy the needs of casual readers as well as those of more demanding users of etymological lore. Characteristic user-friendly features of the present work include avoidance of cumbersome abbreviations, avoidance of entries in foreign alphabets, and a broad coverage of all chemical disciplines including mineralogy. Biological, medical, geological, physical and mathematical terms are only considered where they appear of interest to mainstream chemists.This book does not provide definitions of terms (unless required in the etymological context) nor guidance as to the timeliness of different nomenclature systems. The typical user will from the outset be well aware of the exact meaning of the terms he or she focuses on and only require the etymological background to be used. Examples of sources which have been drawn upon in the preparation of this book, apart from the extremely useful Internet resource Google, are listed, but an exhausting enumeration would be tiresome and impractical..
  • Enemy at the Water Cooler

    True Stories of Insider Threats and Enterprise Security Management Countermeasures
    • 1st Edition
    • Brian T Contos
    • English
    The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level. Today’s headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16-year-old hacker. We are talking about insiders like you and me, trusted employees with access to information - consultants, contractors, partners, visitors, vendors, and cleaning crews. Anyone in an organization’s building or networks that possesses some level of trust.
  • Network Security Assessment: From Vulnerability to Patch

    • 1st Edition
    • Steve Manzuik + 2 more
    • English
    This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detailed timelines of exploit development, vendors’ time to patch, and corporate path installations. Next, the differences between security assessment s and penetration tests will be clearly explained along with best practices for conducting both. Next, several case studies from different industries will illustrate the effectiveness of varying vulnerability assessment methodologies. The next several chapters will define the steps of a vulnerability assessment including: defining objectives, identifying and classifying assets, defining rules of engagement, scanning hosts, and identifying operating systems and applications. The next several chapters provide detailed instructions and examples for differentiating vulnerabilities from configuration problems, validating vulnerabilities through penetration testing. The last section of the book provides best practices for vulnerability management and remediation.
  • Security Law and Methods

    • 1st Edition
    • James Pastor
    • English
    Security Law and Methods examines suggested security methods designed to diminish or negate the consequence of crime and misconduct, and is an attempt to understand both the legal exposures related to crime and the security methods designed to prevent crime. The clear and concise writing of this groundbreaking work, as well as its insightful analysis of specific cases, explains crime prevention methods in light of legal and security principles. Divided into five parts, Security Law and Methods discusses the topics of premises liability and negligence, intentional torts and claims, agency and contract based claims, legal authority and liability, and the subject of terrorism. It also offers an evocative look at security issues that may arise in the future. The book serves as a comprehensive and insightful treatment of security, and is an invaluable addition to the current literature on security and the law.
  • Introduction to International Disaster Management

    • 1st Edition
    • Damon Coppola
    • English
    Written from a global perspective on risk, hazards, and disasters, Introduction to International Disaster Management provides practitioners, educators and students with a comprehensive overview of the players, processes and special issues involved in the management of large-scale natural and technological disasters. The book discusses special issues encountered in the management of international disasters, and explains the various private, non-governmental, national, and international agencies that assist in preparedness, mitigation, response and recovery during national and regional events. Concentrating on the four major phases of emergency management – mitigation, preparedness, response, and recovery – Introduction to International Disaster Management deals with such timely topics as Hurricane Katrina, the 2004 Asian tsunami, and SARS. It also serves as a reference to governmental and other agencies involved in international disaster management activities. This book is the first of its kind to take a global approach to the topic of international disaster management.
  • Crime Reconstruction

    • 1st Edition
    • W. Jerry Chisum + 1 more
    • English
    Crime Reconstruction is a guide to the interpretation of physical evidence. It was developed to aid forensic reconstructionists with the formulation of hypotheses and conclusions that stay within the known limits of forensic evidence. The book begins with chapters on the history and ethics of crime reconstruction, and then shifts to the more applied subjects of general reconstruction methods and practice standards. It concludes with chapters on courtroom conduct and evidence admissibility, to prepare forensic reconstructionists for what awaits them when they take the witness stand. This book is a watershed collaborative effort by internationally known, qualified, and respected forensic science practitioners with generations of case experience. Forensic pioneers such as John D. DeHaan, John I. Thornton, and W. Jerry Chisum contribute chapters on arson reconstruction, trace evidence interpretation, advanced bloodstain interpretation, and reconstructionist ethics. Other chapters cover the subjects of shooting incident reconstruction, interpreting digital evidence, staged crime scenes, and examiner bias. Rarely have so many forensic giants collaborated, and never before have the natural limits of physical evidence been made so clear. This book is ideal for forensic examiners, forensic scientists, crime lab personnel, and special victim and criminal investigators. Others who will benefit from this book are law enforcement officials, forensic medical personnel, and criminal lawyers.
  • Virtualization with Microsoft Virtual Server 2005

    • 1st Edition
    • Andy Jones + 6 more
    • English
    A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how.This book will detail the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort. Furthermore, the book will provide a thorough understanding of the benefits of a virtual infrastructure and a comprehensive examination of how Virtual Server can ease administration and lower overall IT costs. Lastly, the book delivers a thorough understanding of the virtual evolution which is underway in many IT organizations and how the reader will benefit from shifting from the physical to a virtual world.
  • Strategic Security Management

    A Risk Assessment Guide for Decision Makers
    • 1st Edition
    • Karim Vellani
    • English
    Strategic Security Management supports data driven security that is measurable, quantifiable and practical. Written for security professionals and other professionals responsible for making security decisions as well as for security management and criminal justice students, this text provides a fresh perspective on the risk assessment process. It also provides food for thought on protecting an organization’s assets, giving decision makers the foundation needed to climb the next step up the corporate ladder. Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures. Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald.