Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Constructing Adulthood

    Agency and Subjectivity in Adolescence and Adulthood
    • 1st Edition
    • Volume 11
    • Ross Macmillan
    • English
    Advances in Life Course Research publishes original theoretical analyses, integrative reviews, policy analyses and position papers, and theory-based empirical papers on issues involving all aspects of the human life course. Adopting a broad conception of the life course, it invites and welcomes contributions from all disciplines and fields of study interested in understanding, describing, and predicting the antecedents of and consequences for the course that human lives take from birth to death, within and across time and cultures, regardless of methodology, theoretical orientation, or disciplinary affiliation. Each volume is organized around a unifying theme.
  • Elsevier's Dictionary of Mammals

    • 1st Edition
    • Murray Wrobel
    • English
    This authoritative dictionary has been compiled with the aim of giving an overview of the English, German, French and Italian names of mammals. The Basic Table contains, in alphabetical order, the scientific names of families, genera, species and sub-species and synonyms with the identified names detailed in all four languages. These are given in the singular for species and sub-species and in the plural for other terms. The synonyms and subspecies are offered in detail. The editor offers numerous alternative spellings of vernacular names. This dictionary is an outstanding guide for every researcher in mammalogy.
  • The Vein Book

    • 1st Edition
    • John J. Bergan
    • English
    The Vein Book is a comprehensive reference on veins and venous circulation. In one volume it provides complete, authoritative, and up-to-date information about venous function and dysfunction, bridging the gap between clinical medicine and basic science. It is the single authoritative resource which consolidates present knowledge and stimulates further developments in this rapidly changing field.
  • Syngress Force Emerging Threat Analysis

    From Mischief to Malicious
    • 1st Edition
    • Robert Graham
    • English
    A One-Stop Reference Containing the Most Read Topics in the Syngress Security LibraryThis Syngress Anthology Helps You Protect Your Enterprise from Tomorrow’s Threats TodayThis is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the “best of” this year’s top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future..* From Practical VoIP Security, Thomas Porter, Ph.D. and Director of IT Security for the FIFA 2006 World Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security.* From Phishing Exposed, Lance James, Chief Technology Officer of Secure Science Corporation, presents the latest information on phishing and spam.* From Combating Spyware in the Enterprise, Brian Baskin, instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and removal of spyware.* Also from Combating Spyware in the Enterprise, About.com’s security expert Tony Bradley covers the transformation of spyware.* From Inside the SPAM Cartel, Spammer-X shows how spam is created and why it works so well.* From Securing IM and P2P Applications for the Enterprise, Paul Piccard, former manager of Internet Security Systems' Global Threat Operations Center, covers Skype security.* Also from Securing IM and P2P Applications for the Enterprise, Craig Edwards, creator of the IRC security software IRC Defender, discusses global IRC security.* From RFID Security, Brad “Renderman” Haines, one of the most visible members of the wardriving community, covers tag encoding and tag application attacks.* Also from RFID Security, Frank Thornton, owner of Blackthorn Systems and an expert in wireless networks, discusses management of RFID security.* From Hack the Stack, security expert Michael Gregg covers attacking the people layer.* Bonus coverage includes exclusive material on device driver attacks by Dave Maynor, Senior Researcher at SecureWorks.
  • WarDriving and Wireless Penetration Testing

    • 1st Edition
    • Chris Hurley + 3 more
    • English
    Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester’s Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.
  • Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

    • 1st Edition
    • T. Bradley
    • English
    Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely.
  • Scripting VMware Power Tools: Automating Virtual Infrastructure Administration

    • 1st Edition
    • Al Muller
    • English
    This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.This book will cover the native tools that VMware provides with ESX Server. It will then discuss in detail the different scripting API’s and how they can be leveraged to provide some very useful, practical and time saving tools to manage a virtual infrastructure. From virtual server provisioning to backups and everything in between, this book is a one stop shop for virtual tools.
  • Hack the Stack

    Using Snort and Ethereal to Master The 8 Layers of An Insecure Network
    • 1st Edition
    • Stephen Watkins + 5 more
    • English
    This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker’s exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur. What makes this book unique is that it presents the material in a layer by layer approach which offers the readers a way to learn about exploits in a manner similar to which they most likely originally learned networking. This methodology makes this book a useful tool to not only security professionals but also for networking professionals, application programmers, and others. All of the primary protocols such as IP, ICMP, TCP are discussed but each from a security perspective. The authors convey the mindset of the attacker by examining how seemingly small flaws are often the catalyst of potential threats. The book considers the general kinds of things that may be monitored that would have alerted users of an attack.
  • Elsevier's Dictionary of Chemoetymology

    The Whys and Whences of Chemical Nomenclature and Terminology
    • 1st Edition
    • Alexander Senning
    • English
    Noting a marked lack of comprehensiveness and/or contemporaneity among typical reference works on chemical etymology, as well as a somewhat spotty coverage of chemical terms and their etymology in comprehensive dictionaries and textbooks the author decided to write an up-to-date desk reference on chemical etymology which would satisfy the needs of casual readers as well as those of more demanding users of etymological lore. Characteristic user-friendly features of the present work include avoidance of cumbersome abbreviations, avoidance of entries in foreign alphabets, and a broad coverage of all chemical disciplines including mineralogy. Biological, medical, geological, physical and mathematical terms are only considered where they appear of interest to mainstream chemists.This book does not provide definitions of terms (unless required in the etymological context) nor guidance as to the timeliness of different nomenclature systems. The typical user will from the outset be well aware of the exact meaning of the terms he or she focuses on and only require the etymological background to be used. Examples of sources which have been drawn upon in the preparation of this book, apart from the extremely useful Internet resource Google, are listed, but an exhausting enumeration would be tiresome and impractical..
  • Enemy at the Water Cooler

    True Stories of Insider Threats and Enterprise Security Management Countermeasures
    • 1st Edition
    • Brian T Contos
    • English
    The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level. Today’s headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16-year-old hacker. We are talking about insiders like you and me, trusted employees with access to information - consultants, contractors, partners, visitors, vendors, and cleaning crews. Anyone in an organization’s building or networks that possesses some level of trust.