Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Host Integrity Monitoring Using Osiris and Samhain

    • 1st Edition
    • Brian Wotring
    • English
    This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover everything needed to correctly deploy a centralized host integrity monitoring solution. The domain includes home networks on up to large-scale enterprise environments.Through... the book, realistic and practical configurations will be provided for common server and desktop platforms. By the end of the book, the reader will not only understand the strengths and limitations of host integrity tools, but also understand how to effectively make use of them in order to integrate them into a security policy.
  • Computer-Graphic Facial Reconstruction

    • 1st Edition
    • John G. Clement + 1 more
    • English
    This unique books looks at a cost-efficient, fast and accurate means of facial reconstruction--from segmented, decomposed, or skeletal remains--using computer-graphic and computational means.Computer-Graph... Facial Reconstruction is designed as a valuable resource for those scientists designing new research projects and protocols, as well as a practical handbook of methods and techniques for medico-legal practitioners who actually identify the faceless victims of crime. It looks at a variety of approaches: artificial intelligence using neural networks, case-based reasoning, Baysian belief systems, along with a variety of imaging methods: radiological, CT, MRI and the use of imaging devices.The methods described in this book complement, or may even replace, the less-reliable, more traditional means of securing identification by presumptive means, i.e., recognition of clothing, personal effects and clay reconstruction.
  • Stealing the Network: How to Own an Identity

    • 1st Edition
    • Ryan Russell + 5 more
    • English
    The first two books in this series “Stealing the Network: How to Own the Box” and “Stealing the Network: How to Own a Continent” have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.
  • Competition and Variation in Natural Languages

    The Case for Case
    • 1st Edition
    • Mengistu Amberber + 1 more
    • English
    This volume combines different perspectives on case-marking: (1) typological and descriptive approaches of various types and instances of case-marking in the languages of the world as well as comparison with languages that express similar types of relations without morphological case-marking; (2) formal analyses in different theoretical frameworks of the syntactic, semantic, and morphological properties of case-marking; (3) a historical approach of case-marking; (4) a psycholinguistic approach of case-marking. Although there are a number of publications on case related issues, there is no volume such as the present one, which exclusively looks at case marking, competition and variation from a cross-linguistic perspective and within the context of different contemporary theoretical approaches to the study of language. In addition to chapters with broad conceptual orientation, the volume offers detailed empirical studies of case in a number of diverse languages including: Amharic, Basque, Dutch, Hindi, Japanese, Kuuk Thaayorre, Malagasy and Yurakaré.The volume will be of interest to researchers and advanced students in the cognitive sciences, general linguistics, typology, historical linguistics, formal linguistics, and psycholinguistics. The book will interest scholars working within the context of formal syntactic and semantic theories as it provides insight into the properties of case from a cross-linguistic perspective. The book also will be of interest to cognitive scientists interested in the relationship between meaning and grammar, in particular, and the human mind's capacity in the mapping of meaning onto grammar, in general.
  • Knowledge-Based Working

    Intelligent Operating for the Knowledge Age
    • 1st Edition
    • Steve Ellis
    • English
    Covers the priorities and challenges facing organisations who are increasingly focused on ‘knowledge work’; it is written from a human relations – rather than a technological - perspective. It uses real cases, backed up by evidence and analysis from a detailed study into strategic knowledge based working (KBW). The content of the book draws on two chief sources: the author’s own expertise in KBW developed over five years of blue chip KBW consultancy, and the results of a previously unpublished five year study. The book offers clear, step-by-step guidance to executives who need to understand, deploy and implement KBW.
  • RFID Security

    • 1st Edition
    • Frank Thornton + 1 more
    • English
    RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a hacker to lower the pricing on any product products). How to protect the supply chain (malicous/mischievou... hackers can delete/alter/modify all identifying information for an entire shipment of products). How to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits).The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, colour, date of purchase, etc. .
  • BioIndustry Ethics

    • 1st Edition
    • David L. Finegold + 7 more
    • English
    This book is the first systematic, detailed treatment of the approaches to ethical issues taken by biotech and pharmaceutical companies. The application of genetic/genomic technologies raises a whole spectrum of ethical questions affecting global health that must be addressed. Topics covered in this comprehensive survey include considerations for bioprospecting in transgenics, genomics, drug discovery, and nutrigenomics, as well as how to improve stakeholder relations, design ethical clinical trials, avoid conflicts of interest, and establish ethics advisory boards. The expert authors represent multiple disciplines including law, medicine, bioinformatics, pharmaceutics, business, and ethics.
  • Global Competition in Transportation Markets

    Analysis and Policy Making
    • 1st Edition
    • Volume 13
    • Adib Kanafani + 1 more
    • English
    This book represents the proceedings of a conference held at KobeUniversity, that brought together some of the world's leading researchers in the field oftransportation planning and policy.It contains a compendium of papers representing state-of-the-art researchon topics of competition and regulation and system structure in air and maritimetransportati... This book is a valuable resource for researchers and others who can use it as a starting point for advancing the state of knowledge in important topics of transportation systems management. It can also serve as a textbook for an advanced graduate course in transportation, economics, or public policy as applied to maritime transportation and air transportation. As such it is the first text of its kind.
  • Research in Social Stratification and Mobility

    • 1st Edition
    • Volume 23
    • Kevin T Leicht
    • English
    Research in Social Stratification and Mobility continues its tradition of publishing the best and most innovative research on the changing landscape of social inequality the world over. This issue focuses on different dimensions of social closure and their relationship to social inequality processes, including the changing role that education plays in sorting people into favorable and unfavorable labor market positions across a global diversity of cultural settings. This issue also examines the fluid boundaries of race and ethnicity in contentious political settings, relationships between attitudes and collective action, and the role that technology and political context plays in promoting economic development and well-being. These topics and the research methodologies they represent display the vitality of social science research dealing with social stratification and the wide array of methods, contexts, and policies that directly affect the life chances of most of the world's peoples. This issue also marks a continuation of the ties developed between RSSM and the Social Stratification and Mobility section of the International Sociological Association (RC-28). This collaboration promises to promote and disseminate social inequality research throughout the world through an established network of distinguished international contributors and commentators.
  • InfoSec Career Hacking: Sell Your Skillz, Not Your Soul

    • 1st Edition
    • Chris Hurley + 3 more
    • English
    “InfoSec Career Hacking” starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insight on how to develop the requisite soft skills to migrate form the hacker to corporate world.