Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Digital Libraries and the Challenges of Digital Humanities

    • 1st Edition
    • Jeffrey Rydberg-Cox
    • English
    One of the major challenges facing librarians and curators of digital repositories are the innovative ‘born digital’ documents created by scholars in the humanities. These documents range from the parsed corpora created by linguists to traditional reference information presented in electronic databases, to rich, multi-media hypertexts combining audio, still and moving video and text, and many other sorts of material. Too often, librarians think of electronic resources solely as providing access to subscription databases. This book encourages librarians to think holistically of the life cycle of electronic resources from new items being created at their institution, to end-user access, to long term preservation of digital resources.
  • Security Metrics Management

    How to Manage the Costs of an Assets Protection Program
    • 1st Edition
    • Gerald L. Kovacich
    • English
    Security metrics is the application of quantitative, statistical, and/or mathematical analyses to measuring security functional trends and workload. In other words, tracking what each function is doing in terms of level of effort (LOE), costs, and productivity. Security metrics management is the managing of an assets protection program and related security functions through the use of metrics. It can be used where managerial tasks must be supported for such purposes as supporting the security professional’s position on budget matters, justifying the cost-effectiveness of decisions, determining the impact of downsizing on service and support to customers, etc. Security Metrics Management is designed to provide basic guidance to security professionals so that they can measure the costs of their assets protection program - their security program - as well as its successes and failures. It includes a discussion of how to use the metrics to brief management, justify budget and use trend analyses to develop a more efficient and effective assets protection program.
  • Encyclopedia of Language and Linguistics

    • 2nd Edition
    • Keith Brown
    • English
    The first edition of ELL (1993, Ron Asher, Editor) was hailed as "the field's standard reference work for a generation". Now the all-new second edition matches ELL's comprehensiveness and high quality, expanded for a new generation, while being the first encyclopedia to really exploit the multimedia potential of linguistics.* The most authoritative, up-to-date, comprehensive, and international reference source in its field* An entirely new work, with new editors, new authors, new topics and newly commissioned articles with a handful of classic articles* The first Encyclopedia to exploit the multimedia potential of linguistics through the online edition* Ground-breaking and International in scope and approach* Alphabetically arranged with extensive cross-referencing* Available in print and online, priced separately. The online version will include updates as subjects developELL2 includes:* c. 7,500,000 words* c. 11,000 pages* c. 3,000 articles* c. 1,500 figures: 130 halftones and 150 colour* Supplementary audio, video and text files online* c. 3,500 glossary definitions* c. 39,000 references* Extensive list of commonly used abbreviations * List of languages of the world (including information on no. of speakers, languagefamily, etc.)* Approximately 700 biographical entries (now includes contemporary linguists)* 200 language maps in print and onlineAlso available online via ScienceDirect – featuring extensive browsing, searching, and internal cross-referencing between articles in the work, plus dynamic linking to journal articles and abstract databases, making navigation flexible and easy. For more information, pricing options and availability visit www.info.sciencedire...
  • Phishing Exposed

    • 1st Edition
    • Dave Jevans + 1 more
    • English
    Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers.
  • Towards an Interdisciplinary Perspective on the Life Course

    • 1st Edition
    • Volume 10
    • René Levy + 4 more
    • English
    Despite the well-established consensus on the need for an interdisciplinary research paradigm to understand the unfolding of human lives within their social context, existing empirical research rarely embraces this belief. This volume aims at examining the feasibility and hurdles of interdisciplinarity specific to given research fields by bringing together leading North-American and European researchers in sociology, psychology, social psychology and social demography, all highly concerned with fostering an interdisciplinary perspective for the study of the human life course. The contributions are organized along four major axes, three of them substantive (agency and structure, transitions, and biographical re-constructions) and one methodological (methodological innovations), leaving ample leeway for the contributions to address the specific gains and difficulties of empirical interdisciplinary research within their particular domain. The editors introduce the volume by discussing general features, theoretical linkages, and transversal substantive themes of interdisciplinarity in life course research. Likewise, the volume is ended by the editors’ conclusions based on the contributions; they single out major challenges and difficulties for the interdisciplinary study of the life course, together with some promising research meant to address such difficulties and improve current knowledge about the life course.The volume speaks to both experienced scholars and graduate students of the life course. Advanced scholars will benefit from the latest in life course research domains and from a comprehensive overview of life course methodologies. Graduate students of the life course will find in the book an original introduction to many empirical aspects of life course research and to the application of innovative methods to various research settings, as well as rich bibliographical references from the research literature in English, German and French.
  • Physical Security Systems Handbook

    The Design and Implementation of Electronic Security Systems
    • 1st Edition
    • Michael Khairallah
    • English
    A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent “How To” for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
  • Vulnerability Assessment of Physical Protection Systems

    • 1st Edition
    • Mary Lynn Garcia
    • English
    Vulnerability Assessment of Physical Protection Systems guides the reader through the topic of physical security with a unique, detailed and scientific approach. The book describes the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. It draws heavily on the principles introduced in the author’s best-selling Design and Evaluation of Physical Protection Systems and allows readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The text covers the full spectrum of a VA, including negotiating tasks with the customer; project management and planning of the VA; team membership; and step-by-step details for performing the VA, data collection and analysis. It also provides important notes on how to use the VA to suggest design improvements and generate multiple design options. The text ends with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools are introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact. This book will be of interest to physical security professionals, security managers, security students and professionals, and government officials.
  • OS X for Hackers at Heart

    • 1st Edition
    • Chris Hurley + 4 more
    • English
    The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker’s eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world’s foremost “true hackers” unleash the power of OS X for everything form cutting edge research and development to just plain old fun.OS X 10.4 Tiger is a major upgrade for Mac OS X for running Apple’s Macintosh computers and laptops. This book is not a reference to every feature and menu item for OS X. Rather, it teaches hackers of all types from software developers to security professionals to hobbyists, how to use the most powerful (and often obscure) features of OS X for wireless networking, WarDriving, software development, penetration testing, scripting administrative tasks, and much more.
  • Serial Crime

    Theoretical and Practical Issues in Behavioral Profiling
    • 1st Edition
    • Wayne Petherick
    • English
    Serial Crime provides a theoretical and practical foundation for understanding the motivation and dynamics in a range of serial offenses . It successfully connects concepts and creates links to criminal behavior across crimes —murder, sexual assault, and arson— something no other book available does. The connection of serial behavior to profiling, the most useful tool in discovering behavior patterns, is new to the body of literature available and serves to examine the ideal manner in which profiling can be used in conjunction with psychology to positively affect criminal investigations. The book includes case examples that offer real-world uses of behavioral profiling in investigations, and highlight a variety of issues in understanding and investigating serial crime. The book's primary audience would include criminal profilers, fire investigators, universities offering forensic science/criminal justice programs, and forensic, police, criminal, and behavioral psychologists. The secondary audience would include attorneys and judges involved in criminal litigation, and forensic scientists and consultants (generalists).
  • How to Cheat at IT Project Management

    • 1st Edition
    • Susan Snedaker
    • English
    This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it provides a unique approach to IT project management, combining strategic business concepts (project ROI, strategic alignment, etc.) with the very practical, step-by-step instructions for developing and managing a successful IT project. It’s short enough to be easily read and used but long enough to be comprehensive in the right places.