Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Leading Empowerment

    A Practical Guide to Change
    • 1st Edition
    • Mike Applegarth
    • English
    A toolkit for those at different stages of the spectrum of leadership, Leading Empowerment describes at each level what empowerment looks like, feels like and sounds like. The book offers a structure and framework of 'how to' enable a workforce. Specific examples are drawn from public and private sectors, service and manufacturing, for both large FTSE 250 companies and small and medium sized enterprises. This is a 'hands on' book. It will assist anyone who wants to learn about empowerment, what differentiates it from delegation and how it can be implemented in any kind of organisation to achieve the benefits outlined.
  • Security Log Management

    Identifying Patterns in the Chaos
    • 1st Edition
    • Jacob Babbin
    • English
    This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the “Top 10” security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the “Top 10” list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site.Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of “log file.” This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity.
  • Statistical Design - Chemometrics

    • 1st Edition
    • Volume 25
    • Roy E Bruns + 2 more
    • English
    Statistical Design-Chemometrics is applicable to researchers and professionals who wish to perform experiments in chemometrics and carry out analysis of the data in the most efficient way possible. The language is clear, direct and oriented towards real applications. The book provides 106 exercises with answers to accompany the study of theoretical principles. Forty two cases studies with real data are presented showing designs and the complete statistical analyses for problems in the areas chromatography, electroanalytical and electrochemistry, calibration, polymers, gas adsorption, semiconductors, food technology, biotechnology, photochemistry, catalysis, detergents and ceramics. These studies serve as a guide that the reader can use to perform correct data analyses.
  • Cybercartography

    Theory and Practice
    • 1st Edition
    • Volume 4
    • D.R. Fraser Taylor + 1 more
    • English
    For generations, the map has been central to how societies function all over the world. Cybercartography is a new paradigm for maps and mapping in the information era. Defined as “the organization, presentation, analysis and communication of spatially referenced information on a wide variety of topics of interest to society,” cybercartography is presented in an interactive, dynamic, multisensory format with the use of multimedia and multimodal interfaces. Cybercartography: Theory and Practice examines the major elements of cybercartography and emphasizes the importance of interaction between theory and practice in developing a paradigm which moves beyond the concept of Geographic Information Systems and Geographical Information Science. It argues for the centrality of the map as part of an integrated information, communication, and analytical package.This volume is a result of a multidisciplinary team effort and has benefited from the input of partners from government, industry and other organizations. The international team reports on major original cybercartographic research and practice from a variety of disciplinary perspectives, including the humanities, social sciences including human factors psychology, cybernetics, English literature, cultural mediation, cartography, and geography. This new synthesis has intrinsic value for industries, the general public, and the relationships between mapping and the development of user-centered multimedia interfaces.
  • Effective Interviewing and Interrogation Techniques

    • 2nd Edition
    • Nathan J. Gordon + 1 more
    • English
    Effective Interviewing and Interrogation Techniques, Second Edition, is completely revised and updated so as to cover all the information a student needs to know to obtain answers from a witness, a victim, or a suspect and how to interpret these answers with the utmost accuracy. Building on the previous edition’s ground-breaking search for truth in criminal and non-criminal investigations, this book contains five new chapters which include coverage of false confessions, interviewing the mentally challenged, and the ethics of interrogation in a post 9/11 world. This new edition includes highly illustrated chapters with topics ranging from the psycho-physiological basis of the forensic assessment to preparation for the interview/interrogat... question formulation; projective analysis of unwitting verbal clues; interviewing children and the mentally challenged; and pre-employment interviewing. Also included are several model worksheets and documents, case studies, and complete instructions for using the authors’ Integrated Interrogation Technique, a 10-point, highly successful approach to obtaining confessions that can stand up in court. The book concludes with an insightful look at the future of truth verification. This book will be of benefit to attorneys, coroners, detectives, educators, forensic psychophysiologists (lie detection), human resource professionals, intelligence professionals, and investigators as well as journalists/authors, jurists, medical professionals, psychological professionals, researchers, and students.
  • Writing Security Tools and Exploits

    • 1st Edition
    • James C Foster
    • English
    Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
  • Demography: Analysis and Synthesis, Four Volume Set

    A Treatise in Population
    • 1st Edition
    • Graziella Caselli + 2 more
    • English
    This four-volume collection of over 140 original chapters covers virtually everything of interest to demographers, sociologists, and others. Over 100 authors present population subjects in ways that provoke thinking and lead to the creation of new perspectives, not just facts and equations to be memorized. The articles follow a theory-methods-appli... approach and so offer a kind of "one-stop shop" that is well suited for students and professors who need non-technical summaries, such as political scientists, public affairs specialists, and others. Unlike shorter handbooks, Demography: Analysis and Synthesis offers a long overdue, thorough treatment of the field.Choosing the analytical method that fits the data and the situation requires insights that the authors and editors of Demography: Analysis and Synthesis have explored and developed. This extended examination of demographic tools not only seeks to explain the analytical tools themselves, but also the relationships between general population dynamics and their natural, economic, social, political, and cultural environments. Limiting themselves to human populations only, the authors and editors cover subjects that range from the core building blocks of population change--fertility, mortality, and migration--to the consequences of demographic changes in the biological and health fields, population theories and doctrines, observation systems, and the teaching of demography. The international perspectives brought to these subjects is vital for those who want an unbiased, rounded overview of these complex, multifaceted subjects. Topics to be covered:* Population Dynamics and the Relationship Between Population Growth and Structure* The Determinants of Fertility* The Determinants of Mortality* The Determinants of Migration* Historical and Geographical Determinants of Population* The Effects of Population on Health, Economics, Culture, and the Environment* Population Policies* Data Collection Methods and Teaching about Population Studies
  • Handbook of the Biology of Aging

    • 6th Edition
    • Edward J. Masoro + 1 more
    • English
    The Handbook of the Biology of Aging, Sixth Edition, provides a comprehensive overview of the latest research findings in the biology of aging. Intended as a summary for researchers, it is also adopted as a high level textbook for graduate and upper level undergraduate courses. The Sixth Edition is 20% larger than the Fifth Edition, with 21 chapters summarizing the latest findings in research on the biology of aging. The content of the work is virtually 100% new. Though a selected few topics are similar to the Fifth Edition, these chapters are authored by new contributors with new information. The majority of the chapters are completely new in both content and authorship. The Sixth Edition places greater emphasis and coverage on competing and complementary theories of aging, broadening the discussion of conceptual issues. Greater coverage of techniques used to study biological issues of aging include computer modeling, gene profiling, and demographic analyses. Coverage of research on Drosophilia is expanded from one chapter to four. New chapters on mammalian models discuss aging in relation to skeletal muscles, body fat and carbohydrate metabolism, growth hormone, and the human female reproductive system. Additional new chapters summarize exciting research on stem cells and cancer, dietary restriction, and whether age related diseases are an integral part of aging. The Handbook of the Biology of Aging, Sixth Edition is part of the Handbooks on Aging series, including Handbook of the Psychology of Aging and Handbook of Aging and the Social Sciences, also in their 6th editions.
  • Shooting Incident Reconstruction

    • 1st Edition
    • Lucien C. Haag
    • English
    Shooting Incident Reconstruction is based on the authors' numerous years of conducting courses and seminars on the subject of shooting incident reconstruction. It seeks to thoroughly address matters from simple to complex in order to provide the reader with an explanation of the factors surrounding ballistics, trajectory, and shooting scenes. The ultimate objectives of this unique book are to assist investigators, crime scene analysts, pathologists, ballistics experts, and lawyers to understand the terminology, science, and factors involved in reconstructing shooting incident events to solve forensic cases. The book covers a full range of related topics, including the range from which a firearm was discharged; the sequence of shots in a multiple discharge shooting incident; the position of a firearm at the moment of discharge; the position of a victim at the moment of impact; the probable flight path of a projectile; the manner by which a firearm was discharged, and much more. It contains over 100 diagrams and photographs, many in full-color, that support and illustrate key concepts.
  • Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

    • 1st Edition
    • Eric Cole + 1 more
    • English
    The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified “Insider Threats” as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely to pose a threat. Next, the reader will learn about the variety of tools and attacks used by insiders to commit their crimes including: encryption, steganography, and social engineering. The book will then specifically address the dangers faced by corporations and government agencies. Finally, the reader will learn how to design effective security systems to prevent insider attacks and how to investigate insider security breeches that do occur. Throughout the book, the authors will use their backgrounds in the CIA to analyze several, high-profile cases involving insider threats.