Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Risk Management for Computer Security

    Protecting Your Network and Information Assets
    • 1st Edition
    • Andy Jones + 1 more
    • English
    Risk Management for Computer Security provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. The book covers more than just the fundamental elements that make up a good risk program for computer security. It presents an integrated how-to approach to implementing a corporate program, complete with tested methods and processes, flowcharts, and checklists that can be used by the reader and immediately implemented into a computer and overall corporate security program. The challenges are many and this book will help professionals in meeting their challenges as we progress through the twenty-first century. This book is organized into five sections. Section I introduces the reader to the theories of risk management and describes the field's changing environment as well as the art of managing risks. Section II deals with threat assessment and its input to risk assessment; topics covered include the threat assessment method and an example of threat assessment. Section III focuses on operating system vulnerabilities and discusses application vulnerabilities; public domain vs. COTS; and connectivity and dependence. Section IV explains what risk assessment is and Section V explores qualitative vs. quantitative tools and types of risk assessment and concludes with an assessment of the future of risk management. Corporate security professionals around the world will find this book a highly valuable source of information.
  • Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

    • 1st Edition
    • Eric Cole + 3 more
    • English
    Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.
  • Empirical Methods for Evaluating Educational Interventions

    • 1st Edition
    • Gary D. Phye + 2 more
    • English
    New US government requirements state that federally funded grants and school programs must prove that they are based on scientifically proved improvements in teaching and learning. All new grants must show they are based on scientifically sound research to be funded, and budgets to schools must likewise show that they are based on scientifically sound research. However, the movement in education over the past several years has been toward qualitative rather than quantitative measures. The new legislation comes at a time when researchers are ill trained to measure results or even to frame questions in an empirical way, and when school administrators and teachers are no longer remember or were never trained to prove statistically that their programs are effective.Experiment... Methods for Evaluating Educational Interventions is a tutorial on what it means to frame a question in an empirical manner, how one needs to test that a method works, what statistics one uses to measure effectiveness, and how to document these findings in a way so as to be compliant with new empirically based requirements. The book is simplistic enough to be accessible to those teaching and administrative educational professionals long out of schooling, but comprehensive and sophisticated enough to be of use to researchers who know experimental design and statistics but don't know how to use what they know to write acceptable grant proposals or to get governmental funding for their programs.
  • Intrusion Prevention and Active Response

    Deploying Network and Host IPS
    • 1st Edition
    • Michael Rash + 2 more
    • English
    Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims.
  • Law, Libraries and Technology

    • 1st Edition
    • Mark Van Hoorebeek
    • English
    Libraries are continuing to evolve as a result of the dual pressures of technology and user access. The new digital media forms are enabling librarians to find new methods of information delivery. Libraries and librarians need to be aware of the legal ramifications of the new technologies that are available. This book provides an authoritative and practical guide to the subject. Despite the negative prognosis for libraries during the early 1990s in the face of digital technology, libraries have proved to be surprisingly resilient, and have begun the long process of incorporating digital technologies into their service. The legal ramifications, however, always need to be considered. This book does just that.
  • Globalisation, Information and Libraries

    The Implications of the World Trade Organisation’s GATS and TRIPS Agreements
    • 1st Edition
    • Ruth Rikowski
    • English
    This book provides an overview of the World Trade Organisation; in particular, it focuses on two of the agreements being developed at the WTO, which are due to be strengthened in 2005, and are likely to have significant implications for libraries and information: the General Agreement on Trade in Services (the GATS) and the Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS). The book argues that the library and information profession needs to be more aware of these agreements and the way in which they threaten some of the professional ethics and principles (such as the balance in copyright).
  • Aggressive Network Self-Defense

    • 1st Edition
    • Neil R. Wyler
    • English
    Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker.
  • Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services

    • 1st Edition
    • Melissa Craft
    • English
    Almost 100% of all Fortune 500 and Fortune 1000 companies use Citrix. Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services covers the new release to Citrix MetaFrame and how companies can deploy it in their disaster recovery plans. Server Based Computing has been established as a solid networking model for any size business. Why? Because it guarantees cost savings, fast deployment, scalability, performance, security and fast recoverability. Think "mainframe," but updated, pretty, shiny, and effective! Server based computing is the mainframe with a vengeance. Terminal Server and Citrix MetaFrame offer the advantages of the old mainframe coupled with the benefits, gadgets, and appeal of the personal computer.
  • Microsoft Log Parser Toolkit

    A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool
    • 1st Edition
    • Gabriele Giuseppini + 1 more
    • English
    Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products. System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and hardware devices (firewalls, routers, etc.) that generate incredibly long and detailed log files of all activity on the particular application or device. This book will teach administrators how to use Microsoft's Log Parser to data mine all of the information available within these countless logs. The book teaches readers how all queries within Log Parser work (for example: a Log Parser query to an Exchange log may provide information on the origin of spam, viruses, etc.). Also, Log Parser is completely scriptable and customizable so the book will provide the reader with hundreds of original, working scripts that will automate these tasks and provide formatted charts and reports detailing the results of the queries.
  • Forensic DNA Typing

    Biology, Technology, and Genetics of STR Markers
    • 2nd Edition
    • John M. Butler
    • English
    Forensic DNA Typing, Second Edition, is the only book available that specifically covers detailed information on mitochondrial DNA and the Y chromosome. It examines the science of current forensic DNA typing methods by focusing on the biology, technology, and genetic interpretation of short tandem repeat (STR) markers, which encompass the most common forensic DNA analysis methods used today. The book covers topics from introductory level right up to cutting edge research. High-profile cases are addressed throughout the text, near the sections dealing with the science or issues behind these cases. Ten new chapters have been added to accommodate the explosion of new information since the turn of the century. These additional chapters cover statistical genetic analysis of DNA data, an emerging field of interest to DNA research. Several chapters on statistical analysis of short tandem repeat (STR) typing data have been contributed by Dr. George Carmody, a well-respected professor in forensic genetics. Specific examples make the concepts of population genetics more understandable. This book will be of interest to researchers and practitioners in forensic DNA analysis, forensic scientists, population geneticists, military and private and public forensic laboratories (for identifying individuals through remains), and students of forensic science.