Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • How to Cheat at Designing Security for a Windows Server 2003 Network

    • 1st Edition
    • Chris Peiris + 1 more
    • English
    Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization’s security needs.
  • How to Cheat at Managing Windows Server Update Services

    • 1st Edition
    • Volume 1
    • B. Barber
    • English
    Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft’s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
  • Perfect Passwords

    Selection, Protection, Authentication
    • 1st Edition
    • Mark Burnett
    • English
    User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember.
  • Handbook of Evaluation Methods for Health Informatics

    • 1st Edition
    • Jytte Brender McNair
    • English
    The Handbook of Evaluation Methods for Health Informatics provides a complete compendium of methods for evaluation of IT-based systems and solutions within healthcare. Emphasis is entirely on assessment of the IT-system within its organizational environment. The author provides a coherent and complete assessment of methods addressing interactions with and effects of technology at the organizational, psychological, and social levels. It offers an explanation of the terminology and theoretical foundations underlying the methodological analysis presented here. The author carefully guides the reader through the process of identifying relevant methods corresponding to specific information needs and conditions for carrying out the evaluation study. The Handbook takes a critical view by focusing on assumptions for application, tacit built-in perspectives of the methods as well as their perils and pitfalls.
  • Multidisciplinary Approaches to Theory in Medicine

    • 1st Edition
    • Volume 3
    • English
    This volume will be a collection of chapters from authors with wide experience in their research field. The purpose is to produce a coherent book that reflects the common theme of theory in medical thinking and multidisciplinary research practice. In this context "theory" relates to frameworks of concepts, facts, models etc that help to inform practitioners (clinicians, scientists and engineers) both within their own fields and as they seek to share dialogue with colleagues from other fields. Multidisciplinary Approaches to Theory in Medicine will therefore be integrative across a broad spectrum of fields within medicine. To achieve this the chapters will be associated with others in a number of meaningful ways. Each chapter will share a number of points of contact that will include at least two of the following: Similar biomedical area (e.g., immunity, neuroscience, endocrinology, pathology, oncology, haematology, …) Similar multidisciplinary theoretical contexts (e.g., modelling, analysis, description, visualization, complex systems, …) Similar multidisciplinary medical issues and questions (e.g., clinical practice, decision making, informatics, …)
  • Procurement and Financing of Motorways in Europe

    • 1st Edition
    • Volume 15
    • Giorgio Ragazzi + 1 more
    • English
    This volume raises many challenging and controversial issues surrounding motorway procurement and finance in Europe. A somewhat surprising outcome is that a general appraisal bias can be identified in the following sense: Experts from countries which have introduced concession schemes for managing and financing of their motorways are very critical of these schemes, stressing their shortcomings and caveats. Some even conclude that public management under a regime of welfare maximisation would be desirable as a sustainable option. Experts from countries which have been sticking to public procurement and tax finance of motorways strongly attack the inefficiency of public planning regimes and the general tendency to allocate the revenues from special transport related taxes to the public budget, eventually spending them on other purposes rather than transport. A typical feature of the latter regime seems to be the chronic lack of funds for infrastructure investment. Although a single ideal country concept for motorway procurement and finance obviously cannot be identified, every paper gives some insights into possible future improvements. Therefore, beyond the rich documentation of national solutions it is the perspective on workable future concepts which makes the book a valuable guide through the jungle of manifold options for public/private partnerships.This book is a selection of papers presented to the international conference "Highways: Costs and Regulation in Europe", held in Bergamo on the 26th - 27th of November 2004. The Conference was organised by the University of Bergamo, and sponsored by the European Investment Bank.
  • Digital Libraries and the Challenges of Digital Humanities

    • 1st Edition
    • Jeffrey Rydberg-Cox
    • English
    One of the major challenges facing librarians and curators of digital repositories are the innovative ‘born digital’ documents created by scholars in the humanities. These documents range from the parsed corpora created by linguists to traditional reference information presented in electronic databases, to rich, multi-media hypertexts combining audio, still and moving video and text, and many other sorts of material. Too often, librarians think of electronic resources solely as providing access to subscription databases. This book encourages librarians to think holistically of the life cycle of electronic resources from new items being created at their institution, to end-user access, to long term preservation of digital resources.
  • Security Metrics Management

    How to Manage the Costs of an Assets Protection Program
    • 1st Edition
    • Gerald L. Kovacich
    • English
    Security metrics is the application of quantitative, statistical, and/or mathematical analyses to measuring security functional trends and workload. In other words, tracking what each function is doing in terms of level of effort (LOE), costs, and productivity. Security metrics management is the managing of an assets protection program and related security functions through the use of metrics. It can be used where managerial tasks must be supported for such purposes as supporting the security professional’s position on budget matters, justifying the cost-effectiveness of decisions, determining the impact of downsizing on service and support to customers, etc. Security Metrics Management is designed to provide basic guidance to security professionals so that they can measure the costs of their assets protection program - their security program - as well as its successes and failures. It includes a discussion of how to use the metrics to brief management, justify budget and use trend analyses to develop a more efficient and effective assets protection program.
  • Encyclopedia of Language and Linguistics

    • 2nd Edition
    • Keith Brown
    • English
    The first edition of ELL (1993, Ron Asher, Editor) was hailed as "the field's standard reference work for a generation". Now the all-new second edition matches ELL's comprehensiveness and high quality, expanded for a new generation, while being the first encyclopedia to really exploit the multimedia potential of linguistics.* The most authoritative, up-to-date, comprehensive, and international reference source in its field* An entirely new work, with new editors, new authors, new topics and newly commissioned articles with a handful of classic articles* The first Encyclopedia to exploit the multimedia potential of linguistics through the online edition* Ground-breaking and International in scope and approach* Alphabetically arranged with extensive cross-referencing* Available in print and online, priced separately. The online version will include updates as subjects developELL2 includes:* c. 7,500,000 words* c. 11,000 pages* c. 3,000 articles* c. 1,500 figures: 130 halftones and 150 colour* Supplementary audio, video and text files online* c. 3,500 glossary definitions* c. 39,000 references* Extensive list of commonly used abbreviations * List of languages of the world (including information on no. of speakers, languagefamily, etc.)* Approximately 700 biographical entries (now includes contemporary linguists)* 200 language maps in print and onlineAlso available online via ScienceDirect – featuring extensive browsing, searching, and internal cross-referencing between articles in the work, plus dynamic linking to journal articles and abstract databases, making navigation flexible and easy. For more information, pricing options and availability visit www.info.sciencedire...
  • Phishing Exposed

    • 1st Edition
    • Dave Jevans + 1 more
    • English
    Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers.