Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Writing Security Tools and Exploits

    • 1st Edition
    • James C Foster
    • English
    Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
  • Handbook of the Biology of Aging

    • 6th Edition
    • Edward J. Masoro + 1 more
    • English
    The Handbook of the Biology of Aging, Sixth Edition, provides a comprehensive overview of the latest research findings in the biology of aging. Intended as a summary for researchers, it is also adopted as a high level textbook for graduate and upper level undergraduate courses. The Sixth Edition is 20% larger than the Fifth Edition, with 21 chapters summarizing the latest findings in research on the biology of aging. The content of the work is virtually 100% new. Though a selected few topics are similar to the Fifth Edition, these chapters are authored by new contributors with new information. The majority of the chapters are completely new in both content and authorship. The Sixth Edition places greater emphasis and coverage on competing and complementary theories of aging, broadening the discussion of conceptual issues. Greater coverage of techniques used to study biological issues of aging include computer modeling, gene profiling, and demographic analyses. Coverage of research on Drosophilia is expanded from one chapter to four. New chapters on mammalian models discuss aging in relation to skeletal muscles, body fat and carbohydrate metabolism, growth hormone, and the human female reproductive system. Additional new chapters summarize exciting research on stem cells and cancer, dietary restriction, and whether age related diseases are an integral part of aging. The Handbook of the Biology of Aging, Sixth Edition is part of the Handbooks on Aging series, including Handbook of the Psychology of Aging and Handbook of Aging and the Social Sciences, also in their 6th editions.
  • Demography: Analysis and Synthesis, Four Volume Set

    A Treatise in Population
    • 1st Edition
    • Graziella Caselli + 2 more
    • English
    This four-volume collection of over 140 original chapters covers virtually everything of interest to demographers, sociologists, and others. Over 100 authors present population subjects in ways that provoke thinking and lead to the creation of new perspectives, not just facts and equations to be memorized. The articles follow a theory-methods-appli... approach and so offer a kind of "one-stop shop" that is well suited for students and professors who need non-technical summaries, such as political scientists, public affairs specialists, and others. Unlike shorter handbooks, Demography: Analysis and Synthesis offers a long overdue, thorough treatment of the field.Choosing the analytical method that fits the data and the situation requires insights that the authors and editors of Demography: Analysis and Synthesis have explored and developed. This extended examination of demographic tools not only seeks to explain the analytical tools themselves, but also the relationships between general population dynamics and their natural, economic, social, political, and cultural environments. Limiting themselves to human populations only, the authors and editors cover subjects that range from the core building blocks of population change--fertility, mortality, and migration--to the consequences of demographic changes in the biological and health fields, population theories and doctrines, observation systems, and the teaching of demography. The international perspectives brought to these subjects is vital for those who want an unbiased, rounded overview of these complex, multifaceted subjects. Topics to be covered:* Population Dynamics and the Relationship Between Population Growth and Structure* The Determinants of Fertility* The Determinants of Mortality* The Determinants of Migration* Historical and Geographical Determinants of Population* The Effects of Population on Health, Economics, Culture, and the Environment* Population Policies* Data Collection Methods and Teaching about Population Studies
  • Shooting Incident Reconstruction

    • 1st Edition
    • Lucien C. Haag
    • English
    Shooting Incident Reconstruction is based on the authors' numerous years of conducting courses and seminars on the subject of shooting incident reconstruction. It seeks to thoroughly address matters from simple to complex in order to provide the reader with an explanation of the factors surrounding ballistics, trajectory, and shooting scenes. The ultimate objectives of this unique book are to assist investigators, crime scene analysts, pathologists, ballistics experts, and lawyers to understand the terminology, science, and factors involved in reconstructing shooting incident events to solve forensic cases. The book covers a full range of related topics, including the range from which a firearm was discharged; the sequence of shots in a multiple discharge shooting incident; the position of a firearm at the moment of discharge; the position of a victim at the moment of impact; the probable flight path of a projectile; the manner by which a firearm was discharged, and much more. It contains over 100 diagrams and photographs, many in full-color, that support and illustrate key concepts.
  • How to Cheat at Designing Security for a Windows Server 2003 Network

    • 1st Edition
    • Chris Peiris + 1 more
    • English
    Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization’s security needs.
  • Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

    • 1st Edition
    • Eric Cole + 1 more
    • English
    The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified “Insider Threats” as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely to pose a threat. Next, the reader will learn about the variety of tools and attacks used by insiders to commit their crimes including: encryption, steganography, and social engineering. The book will then specifically address the dangers faced by corporations and government agencies. Finally, the reader will learn how to design effective security systems to prevent insider attacks and how to investigate insider security breeches that do occur. Throughout the book, the authors will use their backgrounds in the CIA to analyze several, high-profile cases involving insider threats.
  • How to Cheat at Managing Windows Server Update Services

    • 1st Edition
    • Volume 1
    • B. Barber
    • English
    Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft’s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
  • Perfect Passwords

    Selection, Protection, Authentication
    • 1st Edition
    • Mark Burnett
    • English
    User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember.
  • Handbook of Evaluation Methods for Health Informatics

    • 1st Edition
    • Jytte Brender McNair
    • English
    The Handbook of Evaluation Methods for Health Informatics provides a complete compendium of methods for evaluation of IT-based systems and solutions within healthcare. Emphasis is entirely on assessment of the IT-system within its organizational environment. The author provides a coherent and complete assessment of methods addressing interactions with and effects of technology at the organizational, psychological, and social levels. It offers an explanation of the terminology and theoretical foundations underlying the methodological analysis presented here. The author carefully guides the reader through the process of identifying relevant methods corresponding to specific information needs and conditions for carrying out the evaluation study. The Handbook takes a critical view by focusing on assumptions for application, tacit built-in perspectives of the methods as well as their perils and pitfalls.
  • Multidisciplinary Approaches to Theory in Medicine

    • 1st Edition
    • Volume 3
    • English
    This volume will be a collection of chapters from authors with wide experience in their research field. The purpose is to produce a coherent book that reflects the common theme of theory in medical thinking and multidisciplinary research practice. In this context "theory" relates to frameworks of concepts, facts, models etc that help to inform practitioners (clinicians, scientists and engineers) both within their own fields and as they seek to share dialogue with colleagues from other fields. Multidisciplinary Approaches to Theory in Medicine will therefore be integrative across a broad spectrum of fields within medicine. To achieve this the chapters will be associated with others in a number of meaningful ways. Each chapter will share a number of points of contact that will include at least two of the following: Similar biomedical area (e.g., immunity, neuroscience, endocrinology, pathology, oncology, haematology, …) Similar multidisciplinary theoretical contexts (e.g., modelling, analysis, description, visualization, complex systems, …) Similar multidisciplinary medical issues and questions (e.g., clinical practice, decision making, informatics, …)