Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Engineering Ethics

    An Industrial Perspective
    • 1st Edition
    • Gail Baura
    • English
    Engineering Ethics is the application of philosophical and moral systems to the proper judgment and behavior by engineers in conducting their work, including the products and systems they design and the consulting services they provide. In light of the work environment that inspired the new Sarbanes/Oxley federal legislation on “whistle-blowing” protections, a clear understanding of Engineering Ethics is needed like never before. Beginning with a concise overview of various approaches to engineering ethics, the real heart of the book will be some 13 detailed case studies, delving into the history behind each one, the official outcome and the “real story” behind what happened. Using a consistent format and organization for each one—giving background, historical summary, news media effects, outcome and interpretation--thes... case histories will be used to clearly illustrate the ethics issues at play and what should or should not have been done by the engineers, scientists and managers involved in each instance.
  • Working Memory and Education

    • 1st Edition
    • English
    Psychologists have been trying to understand the factors that underpin children's success and failure in different educational domains for many years. One psychological function that has been found to play an important role in educational achievement is 'working memory', the processes involved in the temporary maintenance and manipulation of information. This book provides the reader with an up-to-date review of the research that has identified how working memory relates to academic attainment in: reading, reading comprehension, arithmetic and writing, as well as looking at how children with difficulties relating to hearing impairment and attention deficits differ in terms of their working memory. Other chapters focus on how working memory is called upon in classroom settings, how working memory can be assessed, and approaches to remediation. The opening chapter of the book provides an account of working memory from the architect of the model that has dominated psychological theory for over two decades. This book is a valuable resource for psychologists, educationalists, and anyone seeking to understand more about the cognitive basis of educational achievement in children.
  • Scenarios and Information Design

    A User-Oriented Practical Guide
    • 1st Edition
    • Mary Rice-Lively + 1 more
    • English
    Developers of digital media require new skills in information design. Information designers developing web sites, software or online system interfaces, games and other digital media often overlook critical steps to ensure the usability of their product. Scenarios and Information Design introduces readers to both the theory and practice of the use of scenarios to create usable information spaces. Through practical applications, such as step-by-step guidelines for scenario development and case studies with analysis tools, the book outlines crucial steps to develop user and use scenarios to achieve competencies for and tools to implement prescribed tasks for user-oriented information design.
  • Practical VoIP Security

    • 1st Edition
    • Thomas Porter CISSP CCNP CCDA CCS
    • English
    Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation.This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive
  • Writing and Presenting in English

    The Rosetta Stone of Science
    • 1st Edition
    • Petey Young
    • English
    The Rosetta Stone of Science is a useful and practical guide to presenting scientific research in the English language. It is written specifically for scientists who would like to improve the effectiveness with which they use the English language and improve their communicative skills in order to become published and develop more confidence in presenting their work at international conferences.Part 1 of the book covers the style preferred by today's leading journals, discusses how to prepare models for writing research papers, and provides advice for writing abstracts, proposals, and editing. Examples of cover letters are also given. Part 2 discusses the various arts and techniques used by successful presenters at scientific conferences. The content of the book is presented in a light, simple and informative manner making The Rosetta Stone of Science an entertaining and instructive read. This book will prove invaluable to all scientists, research fellows, post-docs, and graduate students whose first language is not English.
  • Introduction to Homeland Security

    • 2nd Edition
    • Jane Bullock + 1 more
    • English
    INTRODUCTION TO HOMELAND SECURITY was the first book to provide practitioners, educators, and students with a comprehensive account of the original and ongoing developments in the Department of Homeland Security’s reorganization, as well as the practices, policies and programs enacted in relation to the government restructure. The new edition continues to prove the standard in providing the latest information on the developments in national security in the context of DHS.Continuing in the tradition of the first edition, the book recounts US Government and private sector actions taken since 9/11 in the areas of legislation, government organization, communications, technology, and emergency management practices. It is packed with reference sections, notations directing the reader to relevant publications and websites, and contributions from media reports or experts. Case studies provide insightful guidance for security managers having to deal effectively with similar situations.
  • Video Conferencing over IP: Configure, Secure, and Troubleshoot

    • 1st Edition
    • Michael Gough
    • English
    This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.For many years, the promise of high quality, low cost video conferencing has been an attractive solution for businesses interested in cutting travel costs while maintaining the benefits of face-to-face contact. Unfortunately, most solutions never lived up to the promise, due primarily to lack of internet bandwidth and poorly developed protocols. That's no all changed. The capacity has been created, the hardware works, and businesses are more eager than ever to cut down on travel costs.
  • How to Cheat at Configuring ISA Server 2004

    • 1st Edition
    • Debra Littlejohn Shinder + 1 more
    • English
    How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day.How to Cheat at Configuring ISA Server 2004 is written for the vast majority of Windows System Administrators with too much to do and too little time in which to do it. Unlike books twice its size, this is a concise, to-the-point guide.
  • How to Cheat at Managing Microsoft Operations Manager 2005

    • 1st Edition
    • Anthony Piltzecker
    • English
    Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever find them, thereby enabling administrators to lower their costs of operations and simplify management of their Windows Server System infrastructure. MOM can notify system administrators of overloaded processors, depleted memory, or failed network connections affecting their Windows servers long before these problems bother users.Microsoft Operations Manager (MOM) 2005 delivers open and scalable enterprise-class operational management by providing comprehensive event management, proactive monitoring and alerting, reporting and trend analysis, and system and application specific knowledge and tasks to improve the manageability of Windows Server System environments, including Windows, Exchange, SQL, IIS, Active Directory etc.
  • Descriptive and Subject Cataloguing

    A Workbook
    • 1st Edition
    • Jaya Raju + 1 more
    • English
    A workbook on descriptive and subject cataloguing featuring practical examples and suggested solutions to reinforce theoretical concepts and practical application in descriptive cataloguing (using Anglo-American Cataloguing Rules, 2nd ed., 1998 rev.), bibliographic classification (using Dewey Decimal Classification, 21st ed.) and assigning subject headings (using Sears List of Subject Headings, 17th ed.).