Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Configuring Check Point NGX VPN-1/Firewall-1

    • 1st Edition
    • Barry J Stiefel + 1 more
    • English
    Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection & Tunnel Management, Multiple Entry Points, Route Injection Mechanism, Wire Mode, and SecurePlatform Pro. Many of the new features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available *and* secure. Demand for this book will be strong because Check Point is requiring all of its 3rd party developers to certify their products for this release.
  • Psychopathology and the Family

    • 1st Edition
    • Jennifer Hudson + 1 more
    • English
    Understanding the factors that place an individual at greater risk of developing psychopathology has important implications for both treatment and prevention of psychological disorders. Of critical relevance in this regard is the exploration of the potential influence of the family. Parenting and the family environment are considered to significantly contribute to a child's early development and adjustment. It follows then that parental behavior may also be of importance in the development, maintenance and or the prevention of psychopathology. Over the past 50 years there has been a considerable amount of research as well as controversy surrounding the link between parenting and psychopathology. The purpose of this book is to provide researchers and clinicians with state-of-the art research findings, presented by experts in the field, on the role of the family in the development and maintenance of psychopathology. This edited book is divided into 3 sections. The first addresses broader issues of theory and methodology and the second provides separate chapters relating to the role of the family in the development and maintenance of specific psychopathologies. A final section discusses the involvement of the family in treatment and prevention.
  • Handbook of Biosurveillance

    • 1st Edition
    • Michael M. Wagner + 2 more
    • English
    Provides a coherent and comprehensive account of the theory and practice of real-time human disease outbreak detection, explicitly recognizing the revolution in practices of infection control and public health surveillance.
  • Contemporary Security Management

    • 2nd Edition
    • John Fay
    • English
    Contemporary Security Management, Second Edition, is the most comprehensive and up-to-date security management book available. The book is designed to provide the hard facts on modern practices to efficiently and effectively run a security department.It covers such vital topics as leadership in management, employee relations, risk management and mitigation, terrorism, information security, access control, investigations, substance abuse, workplace violence, and emergency management. New topics covered include terrorism and the post 9/11 government mandate to perform standard vulnerability assessments for various industries.All the chapters have been updated and include the latest trends, technologies, and best practice procedures. Case studies throughout the text provide real-world examples and solutions to management issues. Samples of security plans and procedures, checklists, diagrams and illustrations aid in explaining a wide range of critical concepts.The book serves as an indispensable working tool for students in security management courses, security managers, and other security professionals at all levels of experience.
  • Skype Me! From Single User to Small Enterprise and Beyond

    • 1st Edition
    • Markus Daehne
    • English
    This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin making voice over IP calls immediately. Part II deals with the more advanced features of Skype. Here the reader learns how to use Skype on new “Skype Ready” cell phones, use Skype for more advanced, business-oriented tasks such as scheduling and file transfers, as well as using SkypeOut. Part III discusses how to integrate Skype with third party networking, communication, and security devices such as routers, firewalls, and mail servers, as well as using the brand new Skype for Business. Part IV covers the Skype Application Programming Interface, Plug-ins, Add-ons, and third party tools. Here the reader learns to develop and customize their own applications using the new, powerful, Skype API.
  • The Human Bone Manual

    • 1st Edition
    • Tim D. White + 1 more
    • English
    Building on the success of their previous book, White and Folkens' The Human Bone Manual is intended for use outside the laboratory and classroom, by professional forensic scientists, anthropologists and researchers. The compact volume includes all the key information needed for identification purposes, including hundreds of photographs designed to show a maximum amount of anatomical information.
  • Knowledge Management

    For Teams and Projects
    • 1st Edition
    • Nick Milton
    • English
    The discipline of Knowledge Management (KM) is becoming established as a key productivity enabler in today’s modern organisations. This book describes how KM can be applied at a team and project level: at all scales from small teams working on discrete activities, to large multi-company construction and development projects. The book includes some of the KM techniques that can be applied to projects, such as Peer Assists, Project Retrospect's, Technical Limit meetings, KM self-audits, and KM plans. It is illustrated throughout with examples from successful organisations.
  • The Shape of Social Inequality

    Stratification and Ethnicity in Comparative Perspective
    • 1st Edition
    • Volume 22
    • David Bills
    • English
    This volume brings together former students, colleagues, and others influenced by the sociological scholarship of Archibald O. Haller to celebrate Haller's many contributions to theory and research on social stratification and mobility. All of the chapters respond to Haller's programmatic agenda for stratification research: "A full program aimed at understanding stratification requires: first, that we know what stratification structures consist of and how they may vary; second, that we identify the individual and collective consequences of the different states and rates of change of such structures; and third, seeing that some degree of stratification seems to be present everywhere, that we identify the factors that make stratification structures change." The contributors to this Festschrift address such topics as the changing nature of stratification regimes, the enduring significance of class analysis, the stratifying dimensions of race, ethnicity, and gender, and the interplay between educational systems and labor market outcomes. Many of the chapters adopt an explicitly cross-societal comparative perspective on processes and consequences of social stratification. The volume offers both conceptually and empirically important new analyses of the shape of social stratification.
  • Security Education, Awareness and Training

    SEAT from Theory to Practice
    • 1st Edition
    • Carl Roper + 2 more
    • English
    This book is the only one available on security training for all level of personnel. Chief Security Officers (CSOs), security managers, and heads of security forces often have to design training programs themselves from scratch or rely on outside vendors and outside training companies to provide training which is often dry, stilted, and not always applicable to a specific corporate or government setting. This title addresses the theories of sound security training and awareness, then shows the reader how to put the theories into practice when developing or presenting any form of security education, training, motivation or awareness.
  • Network Security Evaluation Using the NSA IEM

    • 1st Edition
    • Russ Rogers + 3 more
    • English
    Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the consideration of legal issues that may arise during the evaluation. More detailed information is given in later chapters about the core technical processes that need to occur to ensure a comprehensive understanding of the network’s security posture. Ten baseline areas for evaluation are covered in detail. The tools and examples detailed within this book include both Freeware and Commercial tools that provide a detailed analysis of security vulnerabilities on the target network. The book ends with guidance on the creation of customer roadmaps to better security and recommendations on the format and delivery of the final report.