Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Inside the SPAM Cartel

    By Spammer-X
    • 1st Edition
    • Spammer-X Spammer-X
    • English
    Authored by a former spammer, Inside the SPAM Cartel is a methodical, technically explicit expose of the inner workings of the SPAM economy. Readers will be shocked by the sophistication and sheer size of this underworld. From the author: "You may hate spam and think all spammers are evil, but listen to my story and see why I do this and more importantly, HOW." For most people, the term "SPAM" conjures up the image of hundreds of annoying, and at times offensive, e-mails flooding their inbox every week. But for a few, SPAM is a way of life that delivers an adrenaline rush fueled by cash, danger, retribution, porn and the avoidance of local, federal, and international law enforcement agencies. Inside the SPAM Cartel offer readers a never-before seen view inside this dark sub-economy. You'll meet the characters that control the flow of money as well as the hackers and programmers committed to keeping the enterprise up and running. You may disagree with their objectives, but you can't help but to marvel at their ingenuity and resourcefulness in defeating spam filters, avoiding being identified, and staying one step ahead of the law.
  • Game Console Hacking

    Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega
    • 1st Edition
    • Joe Grand + 1 more
    • English
    The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed "retro gaming" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of "Hardware Hacking: Have Fun While Voiding Your Warranty", provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do. By definition, video console game players like to have fun. Most of them are addicted to the adrenaline rush associated with "winning", and even more so when the "winning" involves beating the system by discovering the multitude of "cheats" built into most video games. Now, they can have the ultimate adrenaline rush---actually messing around with the soul of the machine and configuring it to behave exactly as the command. This book builds on the motto of "Have Fun While Voiding Your Warranty" and will appeal to the community of hardware geeks who associate unscrewing the back of their video console with para-jumping into the perfect storm.
  • Physical Security for IT

    • 1st Edition
    • Michael Erbschloe
    • English
    The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets.
  • Windows to Linux Migration Toolkit

    Your Windows to Linux Extreme Makeover
    • 1st Edition
    • David Allen
    • English
    This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals who wish to maximize the value of their Windows to Linux migration services will find this book valuable. The book will help them fine-tune their migration services to make them more efficient, thorough, feature-enhanced, and cost-effective by utilizing migration scripts and best practices gleaned from the author's many years of real-world migrations in large and small companies.
  • Freedom of Information

    Working Towards Compliance
    • 1st Edition
    • Liz Taylor
    • English
    As from 1 January 2005, Freedom of Information (FOI) legislation will come fully into force throughout the UK and could potentially change the way in which the public sector manages information. This report provides practical advice on how to achieve compliance with the Acts; the report helps to ensure successful management of the key risks that the Acts may pose to organisations across the UK. The report also introduces some of the change management issues that will need to be addressed within organisations to facilitate the transition to a more open culture of FOI.
  • Electronic Resources in the Virtual Learning Environment

    A Guide for Librarians
    • 1st Edition
    • Jane Secker
    • English
    This book covers the key current topic of electronic library resources and learning in the digital age. The book begins by outlining the changing ‘information environment’ in which librarians now work. It then goes on to discuss: the development of e-learning as a concept and the impact this is having on the further and higher education sector; the changing role of the librarian in supporting online learning; the technical problems associated with connecting up library systems; the copyright and licensing of electronic resources in a digital environment; and, finally the book offers tips for librarians when becoming involved in such initiatives.
  • Biotechnology Annual Review

    • 1st Edition
    • Volume 10
    • M. Raafat El-Gewely
    • English
  • Black Hat Physical Device Security: Exploiting Hardware and Software

    • 1st Edition
    • Drew Miller
    • English
    Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In Black Hat Physical Device Security: Exploiting Hardware and Software, the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more. The Black Hat Briefings held every year in Las Vegas, Washington DC, Amsterdam, and Singapore continually expose the greatest threats to cyber security and provide IT mind leaders with ground breaking defensive techniques. There are no books that show security and networking professionals how to protect physical security devices. This unique book provides step-by-step instructions for assessing the vulnerability of a security device such as a retina scanner, seeing how it might be compromised, and taking protective measures. The book covers the actual device as well as the software that runs it. By way of example, a thumbprint scanner that allows the thumbprint to remain on the glass from the last person could be bypassed by pressing a "gummy bear" piece of candy against the glass so that the scan works against the last thumbprint that was used on the device. This is a simple example of an attack against a physical authentication system.
  • Dr. Tom Shinder's Configuring ISA Server 2004

    • 1st Edition
    • Debra Littlejohn Shinder + 1 more
    • English
    Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft.Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. This book will be featured prominently on the ISAserver.org home page as well as referenced on Microsoft TechNet and ISA Server Web pages. Tom and Deb's unparalleled technical expertise combined with prime on-line marketing opportunities will make this the #1 book again in the ISA Server market.
  • Side Effects of Drugs Annual

    • 1st Edition
    • Volume 27
    • English
    The Side Effects of Drugs Annual was first published in 1977. It has been published continuously since then, as a yearly update to the encyclopaedic volume Meyler's Side Effects of Drugs. Each new Annual provides clinicians and medical investigators with a reliable and critical yearly survey of new data and trends in the area of Adverse Drug Reactions and Interactions. An international team of specialists have contributed to the Annuals by selecting from each year's publications all that is truly new and informative, by critically interpreting it, and by pointing out whatever is misleading. The use of the book is enhanced by separate indexes, allowing the reader to enter the text via the drug name, adverse effect, or drug interaction. Special features of the Annuals are the Side Effects of Drugs Essay, usually written by a guest author, and the special reviews: short articles, within the different chapters, that give extra attention to topics of current interest. The Essay in Annual 27 is entitled 'The General Practice Research Database' (by Dr. H. Jick) and there is a Historical Essay entitled 'Louis Lewin - Meyler's Predecessor' (by Dr. J.K. Aronson). The special reviews in this volume include, among others: The effects of NSAIDs on blood pressure Risks of inhaled corticosteroids in children Leukotriene receptor antagonists and Churg-Strauss syndrome Amiodarone and thyroid disease Surveillance of adverse events following immunization Smallpox vaccination Safety aspects of folic acid Inhibitors of topoisomerase I and topoisomerase II Liver damage from kava kava