Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Encyclopedia of Forensic and Legal Medicine

    • 1st Edition
    • Roger W. Byard + 4 more
    • English
    The Encyclopedia of Forensic & Legal Medicine comprehensively covers forensic and legal medicine (including related specialities and scientific, technical and legal issues) and is available online and in three printed volumes, offering any practitioner in a forensic, medical, healthcare, legal, judicial, or investigative field easily accessible and authoritative overviews on a wide range of topics. The work is edited and written by experienced professionals with medical, legal or dual training – and who are internationally renowned for their experience or expertise within their areas of specialty. The Editorial Board reflects the multidisciplinary, multi-jurisdictional and global emphasis of forensic and legal medicine. The individual articles are written in a clear and concise manner and are supplemented by diagrams, tables and full-color images. Key further reading and extensive cross-referencing make this work an invaluable reference source for undergraduates and graduates looking for an introduction to key fields and experts reading outside their specialization.
  • Microbial Forensics

    • 1st Edition
    • Bruce Budowle + 2 more
    • English
    Microbial Forensics describes the new and growing field of Microbial Forensics- the science that will help bring to justice criminals and terrorists who use biological material to cause harm. This book describes the foundation of the field of microbial forensics and will serve as a basic primer to initiate those scientists and officials that have an interest in the topic. It covers a variety of areas from forensic science, to microbiology, to epidemiology, to bioinformatics, and to legal issues.
  • Implementing Database Security and Auditing

    • 1st Edition
    • Ron Ben Natan
    • English
    This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have since been fixed). These will often be explained to an “internals” level. There are many sections which outline the “anatomy of an attack” – before delving into the details of how to combat such an attack. Equally important, you will learn about the database auditing landscape – both from a business and regulatory requirements perspective as well as from a technical implementation perspective.
  • Mergers and Acquisitions Security

    Corporate Restructuring and Security Management
    • 1st Edition
    • Edward Halibozek + 1 more
    • English
    In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability. Companies regularly reshape themselves continually exploring new markets and developing new products. When they can't expand into new markets or develop new products on their own, they seek alternatives. These alternatives include merging with or acquiring other companies to create a single more capable company. Companies acquire other companies for a wide variety of reasons. In some cases company survival may actually be the reason. What does this condition mean to the security professional? In the course of mergers and acquisitions, security plays a vital role in helping to make the endeavor successful. There are numerous titles on the business aspects of M&A such as the ones listed below. However, this unique book focuses on the role security plays in helping to make a merger, acquisition or divestiture successful. It addresses the fundamental security elements that are required to support the effort. In addition, it provides an integrated "how to" approach to implementing M&A security complete with methods and processes that have been quickly and cost-effectively implemented.
  • Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

    • 1st Edition
    • James C Foster
    • English
    The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding – The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets – The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same – communication over TCP and UDP, sockets are implemented differently in nearly ever language. 3. Shellcode – Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access. 4. Porting – Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not “recreate the wheel.”5. Coding Tools – The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.
  • Software Piracy Exposed

    • 1st Edition
    • Ron Honick
    • English
    This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out.
  • Cisco PIX Firewalls

    Configure / Manage / Troubleshoot
    • 1st Edition
    • Umer Khan
    • English
    Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX Firewall configuration. With the market for PIX Firewalls maintaining double digit growth and several major enhancements to both the PIX Firewall and VPN Client product lines, this book will have enormous appeal with the audience already familiar with his first book.
  • Forensic Pathology

    Principles and Practice
    • 1st Edition
    • David Dolinak + 2 more
    • English
    Forensic Pathology is a comprehensive reference that uses a case-oriented format to address, explain and guide the reader through the varied topics encountered by forensic pathologists. Developed in response to a severe void in the literature, the book addresses topics ranging from medicolegal investigation of death to death scene investigation, forensic autopsy, and artifacts of resuscitation as well as complications of medical therapy, forensic osteology, forensic odontology, forensic photography, and death certification. The book includes various types of cases, including sudden natural death, asphyxia, motor vehicle collisions, death in custody, child abuse and elder abuse, acute psychiatric and emotional deaths, and pregnancy. It contains sample descriptions of pathological lesions which serve to aid pathologists in reporting their findings to law enforcement agencies, attorneys, and others involved in investigations of sudden death. The concepts outlined in the text are beautifully illustrated by large, colorful photographs. There are also "Do and Don’t" sections at the end of each chapter that provide guidance for handling the types of cases examined. This work will benefit not only experienced forensic pathologists, but also hospital pathologists who occasionally performs medicolegal autopsies; doctors in training; medical examiners; law enforcement personnel; crime scene investigators; attorneys; and fellows and students of the medical sciences.
  • CCTV

    Networking and Digital Technology
    • 2nd Edition
    • Vlado Damjanovski
    • English
    Closed circuit television (CCTV) is experiencing a leap in technology using digital techniques, networking and the Internet. The new edition of this high-level professional reference retains the particulars that made the first edition a success, including the details of CCD cameras, lenses, coaxial cables, fiber-optics, and system design, but it is expanded to cover all video compression techniques used in the ever increasing assortment of digital video recorders (DVRs) available on the market today. This new edition of the book CCTV demystifies DVR technology. It also serves to clarify the technology of data networking. The theoretical section explains the various compression techniques. Networking is also a new and unknown area for many CCTV installers and this is explained in a brand new section.
  • Enabling End-Users

    Information Skills Training
    • 1st Edition
    • Ann Poyner
    • English
    This introductory book suggests ways of approaching some of the problems library and information professionals face as they prepare to offer end user education or training through personal tuition. Advice is given about how to take stock of existing library and information services in relation to their place and value within organisations. It examines issues about who needs end user education and training, what they might need and how it can be delivered. Guidance on planning and running individual, group and workshop training is provided.