Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Cyber Adversary Characterization

    Auditing the Hacker Mind
    • 1st Edition
    • Marcus Sachs + 3 more
    • English
    The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy’s mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.
  • Traffic and Transport Psychology

    Proceedings of the ICTTP 2000
    • 1st Edition
    • Talib Rothengatter + 1 more
    • English
    This volume gives an overview of the trends in Traffic and Transport Psychology. It reflects the considerable development of the most important factors for driving a road vehicle, and the variety of international research approaches. The first part contains basic approaches and integrated models as well as general theories and their implementation into Traffic and Transport Psychology. The second part deals with the driver, especially cognition, performance, social and differential effects and impairment. Important aspects are treated, such as speed perception, reaction times, interaction, risk acceptance, aggression and gender differences. Special chapters refer to performance and fatigue. The third part focuses on safety, driver support, selection and influencing drivers by enforcement, training and programs for the rehabilitation of traffic offenders. Classic ergonomic methods are discussed as well as modern telematic devices, or trends regarding driver-assessment. In the last part, current developments are presented in relation to better mobility and the protection of the environment. Questions are asked, such as whether we could reduce the use of cars, how travel behaviour can be modified or to what extent the use of alternatives to motor vehicles benefits safety as well as the environment. This work is not only important for psychologists. It should be read by all transport professionals interested in the application of psychology to traffic.
  • Security Consulting

    • 3rd Edition
    • Charles A. Sennewald
    • English
    Since 9/11, business and industry has paid close attention to security within their own organizations. In fact, no other time in modern history has business and industry been more concerned with security issues. A new concern for security measures to combat potential terrorism, sabotage, theft and disruption- which could bring any business to it's knees- has swept the nation. This has opened up a huge opportunity for private investigators and security professionals as consultants. Many retiring law enforcement and security management professionals look to enter the private security consulting market. Security consulting often involves conducting in depth security surveys so businesses will know exactly where security holes are present and where they need improvement to limit their exposure to various threats. The Third Edition of Security Consulting introduces security and law enforcement professionals to the career and business of security consulting. It provides new and potential consultants with the practical guidelines needed to start up and maintain a successful independent practice. This new edition includes updated and expanded information on marketing, fees and expenses, forensic consulting, the use of computers, and the need for professional growth. The useful sample forms will be updated in addition to the new promotion opportunities and keys to conducting research on the Web.
  • Online Information Services in the Social Sciences

    • 1st Edition
    • Neil Jacobs + 1 more
    • English
    Information professionals are increasingly responsible not only for running traditional information and library services but also for providing an online presence for their organisation. This book shows how best practice in delivering online information services should be based on actual user needs and behaviour. A series of case studies provide real life examples of how social science information is being used in the community. The book then draws on these case studies to outline the main issues facing service providers: such as usability, metadata and management. The book concludes with a look to the future and how both technological and organisational changes will shape online information services.
  • CYA Securing IIS 6.0

    • 1st Edition
    • Chris Peiris + 1 more
    • Bernard Cheah
    • English
    A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential IIS 6.0 features.The book is organized around the 15 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential features. The options within each menu are explained clearly, potential problems are identified up-front, and configurations are subsequently presented in the aptly named "By the Book" section for that MMC. Readers will also appreciate the "Reality Check" sidebars througout, which present valuable cost/benefit analyses of situations where there is no single "right" answer.
  • Stealing the Network

    How to Own a Continent
    • 1st Edition
    • Ryan Russell + 2 more
    • English
    This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box"
  • CYA Securing Exchange Server 2003

    • 1st Edition
    • Mark Fugatt + 2 more
    • English
    A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential Exchange Server 2003 features. The book is organized around the 11 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential features. The options within each menu are explained clearly, potential problems are identified up-front, and configurations are subsequently presented in the aptly named "By the Book" section for that MMC. Readers will also appreciate the "Reality Check" sidebars throughout, which present valuable cost/benefit analyses of situations where there is no single "right" answer.
  • Evidence-Based Educational Methods

    • 1st Edition
    • Daniel J. Moran + 1 more
    • English
    Evidence-Based Educational Methods answers the challenge of the No Child Left Behind Act of 2001 by promoting evidence-based educational methods designed to improve student learning. Behavioral scientists have been refining these instructional methods for decades before the current call for evidence-based education. Precision Teaching, Direct Instruction, Computerized Teaching, Personalized System of Instruction, and other unique applications of behavior analysis are all informed by the scientific principles of learning, have been tested in the laboratory, and are often shown to have significant success in field applications. This book details each of these approaches to education based on the principles of behavior analysis. Individuals and agencies responsible for instruction that leaves no child behind will find this compendium an important resource for meeting that challenge, and young educators will greatly benefit from this text, as they will see a blueprint of the evidence-based education systems being planned for the future.
  • Security Sage's Guide to Hardening the Network Infrastructure

    • 1st Edition
    • Steven Andres + 2 more
    • English
    This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.
  • Hacking the Code

    Auditor's Guide to Writing Secure Code for the Web
    • 1st Edition
    • Mark Burnett
    • English
    Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking the Code dives right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations is included in both the Local and Remote Code sections of the book. The book is accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD also contains a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.