Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Configuring VMware ESX Server 2.5

    • 1st Edition
    • Al Muller + 1 more
    • English
    This book will detail the default and custom installation of VMware’s ESx server as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort. Furthermore, the book will provide a thorough understanding of the benefits of a virtual infrastructure and a comprehensive examination of how VMware eases administration and lowers overall IT costs. Lastly, the book delivers a thorough understanding of the virtual evolution which is underway in many IT organizations and how the reader will benefit from shifting from the physical to a virtual
  • Engineering Catastrophes

    Causes and Effects of Major Accidents
    • 3rd Edition
    • J. F. Lancaster
    • English
    There is much to be gained from the study of catastrophes. Likewise the records of accidents in industry and transport are of great importance, not only by indicating trends in the incidence of loss or casualties, but also as a measure of human behaviour. The third edition of this well received book places emphasis on the human factor, with the first two chapters providing a method of analysing the records of accident and all-cause mortality rates to show their relationship with levels of economic development and growth rates, and to make suggestions as to the way in which such processes may be linked. Case histories are given throughout the book. These are designed to show how human frailty, or the unexpected weakness of materials, or a combination of both, can lead to dire and tragic circumstances.
  • The Structure of the Life Course: Standardized? Individualized? Differentiated?

    • 1st Edition
    • Volume 9
    • Ross Macmillan
    • English
    Current debates in life course studies increasingly reference theories of individualization, standardization, and differentiation in the structure of the life course. This volume brings together leading scholars from a variety of fields to assess the theoretical underpinnings, the empirical evidence, and the implications of existing arguments. The contributions include comparative-historic... work, demographic analysis, and detailed survey research. The topics covered include historical, cross-cultural, and racioethnic variation in the transition to adulthood, the school-to-work transition, educational careers, retirement, activity characteristics over the life span and the life course context of psychological well-being. The various contributions expand our understanding of the contemporary life course and its implications. The authors offer innovative theoretical and methodological approaches that demonstrate the utility of holistic approaches to conceptualizing the life course and understanding its implications for modern society.
  • Securing IM and P2P Applications for the Enterprise

    • 1st Edition
    • Marcus Sachs + 1 more
    • English
    This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic.
  • Host Integrity Monitoring Using Osiris and Samhain

    • 1st Edition
    • Brian Wotring
    • English
    This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover everything needed to correctly deploy a centralized host integrity monitoring solution. The domain includes home networks on up to large-scale enterprise environments.Through... the book, realistic and practical configurations will be provided for common server and desktop platforms. By the end of the book, the reader will not only understand the strengths and limitations of host integrity tools, but also understand how to effectively make use of them in order to integrate them into a security policy.
  • Computer-Graphic Facial Reconstruction

    • 1st Edition
    • John G. Clement + 1 more
    • English
    This unique books looks at a cost-efficient, fast and accurate means of facial reconstruction--from segmented, decomposed, or skeletal remains--using computer-graphic and computational means.Computer-Graph... Facial Reconstruction is designed as a valuable resource for those scientists designing new research projects and protocols, as well as a practical handbook of methods and techniques for medico-legal practitioners who actually identify the faceless victims of crime. It looks at a variety of approaches: artificial intelligence using neural networks, case-based reasoning, Baysian belief systems, along with a variety of imaging methods: radiological, CT, MRI and the use of imaging devices.The methods described in this book complement, or may even replace, the less-reliable, more traditional means of securing identification by presumptive means, i.e., recognition of clothing, personal effects and clay reconstruction.
  • Stealing the Network: How to Own an Identity

    • 1st Edition
    • Ryan Russell + 5 more
    • English
    The first two books in this series “Stealing the Network: How to Own the Box” and “Stealing the Network: How to Own a Continent” have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.
  • Knowledge-Based Working

    Intelligent Operating for the Knowledge Age
    • 1st Edition
    • Steve Ellis
    • English
    Covers the priorities and challenges facing organisations who are increasingly focused on ‘knowledge work’; it is written from a human relations – rather than a technological - perspective. It uses real cases, backed up by evidence and analysis from a detailed study into strategic knowledge based working (KBW). The content of the book draws on two chief sources: the author’s own expertise in KBW developed over five years of blue chip KBW consultancy, and the results of a previously unpublished five year study. The book offers clear, step-by-step guidance to executives who need to understand, deploy and implement KBW.
  • RFID Security

    • 1st Edition
    • Frank Thornton + 1 more
    • English
    RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a hacker to lower the pricing on any product products). How to protect the supply chain (malicous/mischievou... hackers can delete/alter/modify all identifying information for an entire shipment of products). How to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits).The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, colour, date of purchase, etc. .
  • Global Competition in Transportation Markets

    Analysis and Policy Making
    • 1st Edition
    • Volume 13
    • Adib Kanafani + 1 more
    • English
    This book represents the proceedings of a conference held at KobeUniversity, that brought together some of the world's leading researchers in the field oftransportation planning and policy.It contains a compendium of papers representing state-of-the-art researchon topics of competition and regulation and system structure in air and maritimetransportati... This book is a valuable resource for researchers and others who can use it as a starting point for advancing the state of knowledge in important topics of transportation systems management. It can also serve as a textbook for an advanced graduate course in transportation, economics, or public policy as applied to maritime transportation and air transportation. As such it is the first text of its kind.