Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Being the Best You Can Be

    A Guide on Personal Development for Managers
    • 1st Edition
    • Ian Hunt
    • English
    This management book is published in association with the Institute of Management and Leadership (ILM). Everyone is so busy rushing around doing their own thing – working, parenting, fire-fighting, trying to manage themselves and others, and in many cases just surviving. Being the Best You Can Be examines how individuals can develop themselves, control different aspects of their life, become more organised, welcome change and tackle challenges face on. Chapters discuss organisation skills, how to maintain a positive attitude, managing stress and building a successful team.
  • Building Bridges

    Collaboration Within and Beyond the Academic Library
    • 1st Edition
    • Anne Langley + 2 more
    • English
    Intended for academic libraries, this book covers all aspects of collaboration. Technology has increased the need for, and the ability to, collaborate at work; the first part of the book contains a discussion of: the basic how's and why's of collaboration; building an environment where collaboration can flourish; descriptions and how-to's for using technology tools which aid and enhance the collaborative process; a process of how to get started in collaborative projects; and how to manage them once you begin. The second section of the book presents real-life case studies of collaboration in academic libraries followed by discussions of how each project worked (or not) and why.
  • Ten Steps to Maturity in Knowledge Management

    Lessons in Economy
    • 1st Edition
    • J. K. Suresh + 1 more
    • English
    Presents a comprehensive set of lessons for the KM practitioner, covering all phases of planning, design, implementation and assessment of knowledge management. A central theme of the book is that for the success of KM in an organization, it is critical to ensure that investments and changes are made with sensibility and economy in each phase of the KM solution. The book explains the reasoning behind each of the lessons, illustrates it with scenarios extracted from real-world KM implementations, and provides guidelines for practitioners to implement the lesson in their own organization.
  • Intellectual Property

    The Lifeblood of Your Company
    • 1st Edition
    • Mark Elmslie + 1 more
    • English
    Written by two intellectual property (IP) lawyers, experienced in contentious and non-contentious matters, Intellectual Property deals with different types of intellectual property protection and how to apply for them. It also covers how to cope with the infringement of one’s intellectual property or allegations that it infringes someone else’s intellectual property. Finally, the book advises on how best to exploit one’s intellectual property rights and the sort of commercial agreements that will be entered into as a result. Aimed at business people rather than lawyers. Intellectual Property contains concise, practical, day-to-day advice rather than the study of legal theory or case law.
  • The Institutional Repository

    • 1st Edition
    • Richard E. Jones + 2 more
    • English
    Providing a thorough review of the concept of the Institutional Repository (IR) the book examines how they can be set up, maintained and embedded into general institutional working practice. Specific reference is made to capturing certain types of research material such as E-Theses and E-Prints and what the issues are with regard to obtaining the material, ensuring that all legal grounds are covered and then storing the material in perpetuity. General workflow and administrative processes that may come up during the implementation and maintenance of an IR are discussed. The authors notes that there are a number of different models that have been adopted worldwide for IR management, and these are discussed. Finally, a case study of the inception of the Edinburgh Research Archive is provided which takes the user through the long path from conception to completion of an IR, examining the highs and lows of the process and offering advice for other implementers. This allows the book the opportunity to introduce extensive practical experience in unexpected areas such as mediated deposit.
  • Security Log Management

    Identifying Patterns in the Chaos
    • 1st Edition
    • Jacob Babbin
    • English
    This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the “Top 10” security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the “Top 10” list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site.Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of “log file.” This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity.
  • Statistical Design - Chemometrics

    • 1st Edition
    • Volume 25
    • Roy E Bruns + 2 more
    • English
    Statistical Design-Chemometrics is applicable to researchers and professionals who wish to perform experiments in chemometrics and carry out analysis of the data in the most efficient way possible. The language is clear, direct and oriented towards real applications. The book provides 106 exercises with answers to accompany the study of theoretical principles. Forty two cases studies with real data are presented showing designs and the complete statistical analyses for problems in the areas chromatography, electroanalytical and electrochemistry, calibration, polymers, gas adsorption, semiconductors, food technology, biotechnology, photochemistry, catalysis, detergents and ceramics. These studies serve as a guide that the reader can use to perform correct data analyses.
  • Cybercartography

    Theory and Practice
    • 1st Edition
    • Volume 4
    • D.R. Fraser Taylor + 1 more
    • English
    For generations, the map has been central to how societies function all over the world. Cybercartography is a new paradigm for maps and mapping in the information era. Defined as “the organization, presentation, analysis and communication of spatially referenced information on a wide variety of topics of interest to society,” cybercartography is presented in an interactive, dynamic, multisensory format with the use of multimedia and multimodal interfaces. Cybercartography: Theory and Practice examines the major elements of cybercartography and emphasizes the importance of interaction between theory and practice in developing a paradigm which moves beyond the concept of Geographic Information Systems and Geographical Information Science. It argues for the centrality of the map as part of an integrated information, communication, and analytical package.This volume is a result of a multidisciplinary team effort and has benefited from the input of partners from government, industry and other organizations. The international team reports on major original cybercartographic research and practice from a variety of disciplinary perspectives, including the humanities, social sciences including human factors psychology, cybernetics, English literature, cultural mediation, cartography, and geography. This new synthesis has intrinsic value for industries, the general public, and the relationships between mapping and the development of user-centered multimedia interfaces.
  • Effective Interviewing and Interrogation Techniques

    • 2nd Edition
    • Nathan J. Gordon + 1 more
    • English
    Effective Interviewing and Interrogation Techniques, Second Edition, is completely revised and updated so as to cover all the information a student needs to know to obtain answers from a witness, a victim, or a suspect and how to interpret these answers with the utmost accuracy. Building on the previous edition’s ground-breaking search for truth in criminal and non-criminal investigations, this book contains five new chapters which include coverage of false confessions, interviewing the mentally challenged, and the ethics of interrogation in a post 9/11 world. This new edition includes highly illustrated chapters with topics ranging from the psycho-physiological basis of the forensic assessment to preparation for the interview/interrogat... question formulation; projective analysis of unwitting verbal clues; interviewing children and the mentally challenged; and pre-employment interviewing. Also included are several model worksheets and documents, case studies, and complete instructions for using the authors’ Integrated Interrogation Technique, a 10-point, highly successful approach to obtaining confessions that can stand up in court. The book concludes with an insightful look at the future of truth verification. This book will be of benefit to attorneys, coroners, detectives, educators, forensic psychophysiologists (lie detection), human resource professionals, intelligence professionals, and investigators as well as journalists/authors, jurists, medical professionals, psychological professionals, researchers, and students.
  • Writing Security Tools and Exploits

    • 1st Edition
    • James C Foster
    • English
    Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.