Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Towards an Interdisciplinary Perspective on the Life Course

    • 1st Edition
    • Volume 10
    • René Levy + 4 more
    • English
    Despite the well-established consensus on the need for an interdisciplinary research paradigm to understand the unfolding of human lives within their social context, existing empirical research rarely embraces this belief. This volume aims at examining the feasibility and hurdles of interdisciplinarity specific to given research fields by bringing together leading North-American and European researchers in sociology, psychology, social psychology and social demography, all highly concerned with fostering an interdisciplinary perspective for the study of the human life course. The contributions are organized along four major axes, three of them substantive (agency and structure, transitions, and biographical re-constructions) and one methodological (methodological innovations), leaving ample leeway for the contributions to address the specific gains and difficulties of empirical interdisciplinary research within their particular domain. The editors introduce the volume by discussing general features, theoretical linkages, and transversal substantive themes of interdisciplinarity in life course research. Likewise, the volume is ended by the editors’ conclusions based on the contributions; they single out major challenges and difficulties for the interdisciplinary study of the life course, together with some promising research meant to address such difficulties and improve current knowledge about the life course.The volume speaks to both experienced scholars and graduate students of the life course. Advanced scholars will benefit from the latest in life course research domains and from a comprehensive overview of life course methodologies. Graduate students of the life course will find in the book an original introduction to many empirical aspects of life course research and to the application of innovative methods to various research settings, as well as rich bibliographical references from the research literature in English, German and French.
  • Vulnerability Assessment of Physical Protection Systems

    • 1st Edition
    • Mary Lynn Garcia
    • English
    Vulnerability Assessment of Physical Protection Systems guides the reader through the topic of physical security with a unique, detailed and scientific approach. The book describes the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. It draws heavily on the principles introduced in the author’s best-selling Design and Evaluation of Physical Protection Systems and allows readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources. The text covers the full spectrum of a VA, including negotiating tasks with the customer; project management and planning of the VA; team membership; and step-by-step details for performing the VA, data collection and analysis. It also provides important notes on how to use the VA to suggest design improvements and generate multiple design options. The text ends with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools are introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact. This book will be of interest to physical security professionals, security managers, security students and professionals, and government officials.
  • Physical Security Systems Handbook

    The Design and Implementation of Electronic Security Systems
    • 1st Edition
    • Michael Khairallah
    • English
    A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent “How To” for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
  • OS X for Hackers at Heart

    • 1st Edition
    • Chris Hurley + 4 more
    • English
    The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker’s eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world’s foremost “true hackers” unleash the power of OS X for everything form cutting edge research and development to just plain old fun.OS X 10.4 Tiger is a major upgrade for Mac OS X for running Apple’s Macintosh computers and laptops. This book is not a reference to every feature and menu item for OS X. Rather, it teaches hackers of all types from software developers to security professionals to hobbyists, how to use the most powerful (and often obscure) features of OS X for wireless networking, WarDriving, software development, penetration testing, scripting administrative tasks, and much more.
  • Serial Crime

    Theoretical and Practical Issues in Behavioral Profiling
    • 1st Edition
    • Wayne Petherick
    • English
    Serial Crime provides a theoretical and practical foundation for understanding the motivation and dynamics in a range of serial offenses . It successfully connects concepts and creates links to criminal behavior across crimes —murder, sexual assault, and arson— something no other book available does. The connection of serial behavior to profiling, the most useful tool in discovering behavior patterns, is new to the body of literature available and serves to examine the ideal manner in which profiling can be used in conjunction with psychology to positively affect criminal investigations. The book includes case examples that offer real-world uses of behavioral profiling in investigations, and highlight a variety of issues in understanding and investigating serial crime. The book's primary audience would include criminal profilers, fire investigators, universities offering forensic science/criminal justice programs, and forensic, police, criminal, and behavioral psychologists. The secondary audience would include attorneys and judges involved in criminal litigation, and forensic scientists and consultants (generalists).
  • How to Cheat at IT Project Management

    • 1st Edition
    • Susan Snedaker
    • English
    This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it provides a unique approach to IT project management, combining strategic business concepts (project ROI, strategic alignment, etc.) with the very practical, step-by-step instructions for developing and managing a successful IT project. It’s short enough to be easily read and used but long enough to be comprehensive in the right places.
  • Psychopathology and the Family

    • 1st Edition
    • Jennifer Hudson + 1 more
    • English
    Understanding the factors that place an individual at greater risk of developing psychopathology has important implications for both treatment and prevention of psychological disorders. Of critical relevance in this regard is the exploration of the potential influence of the family. Parenting and the family environment are considered to significantly contribute to a child's early development and adjustment. It follows then that parental behavior may also be of importance in the development, maintenance and or the prevention of psychopathology. Over the past 50 years there has been a considerable amount of research as well as controversy surrounding the link between parenting and psychopathology. The purpose of this book is to provide researchers and clinicians with state-of-the art research findings, presented by experts in the field, on the role of the family in the development and maintenance of psychopathology. This edited book is divided into 3 sections. The first addresses broader issues of theory and methodology and the second provides separate chapters relating to the role of the family in the development and maintenance of specific psychopathologies. A final section discusses the involvement of the family in treatment and prevention.
  • Configuring Check Point NGX VPN-1/Firewall-1

    • 1st Edition
    • Barry J Stiefel + 1 more
    • English
    Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection & Tunnel Management, Multiple Entry Points, Route Injection Mechanism, Wire Mode, and SecurePlatform Pro. Many of the new features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available *and* secure. Demand for this book will be strong because Check Point is requiring all of its 3rd party developers to certify their products for this release.
  • Handbook of Biosurveillance

    • 1st Edition
    • Michael M. Wagner + 2 more
    • English
    Provides a coherent and comprehensive account of the theory and practice of real-time human disease outbreak detection, explicitly recognizing the revolution in practices of infection control and public health surveillance.
  • Contemporary Security Management

    • 2nd Edition
    • John Fay
    • English
    Contemporary Security Management, Second Edition, is the most comprehensive and up-to-date security management book available. The book is designed to provide the hard facts on modern practices to efficiently and effectively run a security department.It covers such vital topics as leadership in management, employee relations, risk management and mitigation, terrorism, information security, access control, investigations, substance abuse, workplace violence, and emergency management. New topics covered include terrorism and the post 9/11 government mandate to perform standard vulnerability assessments for various industries.All the chapters have been updated and include the latest trends, technologies, and best practice procedures. Case studies throughout the text provide real-world examples and solutions to management issues. Samples of security plans and procedures, checklists, diagrams and illustrations aid in explaining a wide range of critical concepts.The book serves as an indispensable working tool for students in security management courses, security managers, and other security professionals at all levels of experience.