Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Windows Server 2003 Security Infrastructures

      • 1st Edition
      • March 5, 2004
      • Jan De Clercq
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 2 8 3 8
      • eBook
        9 7 8 0 0 8 0 5 2 1 1 2 1
      Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS.
    • Google Hacking for Penetration Testers

      • 1st Edition
      • December 17, 2004
      • Johnny Long
      • English
      • eBook
        9 7 8 0 0 8 0 4 7 8 0 5 0
      Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don’t realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker’s search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.
    • Freedom of Information

      • 1st Edition
      • October 31, 2004
      • Liz Taylor
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 1 0 3 1
      • eBook
        9 7 8 1 7 8 0 6 3 0 6 9 4
      As from 1 January 2005, Freedom of Information (FOI) legislation will come fully into force throughout the UK and could potentially change the way in which the public sector manages information. This report provides practical advice on how to achieve compliance with the Acts; the report helps to ensure successful management of the key risks that the Acts may pose to organisations across the UK. The report also introduces some of the change management issues that will need to be addressed within organisations to facilitate the transition to a more open culture of FOI.
    • Security Assessment

      • 1st Edition
      • January 21, 2004
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 3 2 2 6 6 9 6 2
      • eBook
        9 7 8 0 0 8 0 4 8 0 8 2 4
      The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. Security Assessment shows how to do a complete security assessment based on the NSA's guidelines. Security Assessment also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc). Security Assessment is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.
    • Delivering E-Learning for Information Services in Higher Education

      • 1st Edition
      • December 31, 2004
      • Paul Catherall
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 0 9 5 9
      • Paperback
        9 7 8 1 8 4 3 3 4 0 8 8 1
      • eBook
        9 7 8 1 7 8 0 6 3 0 7 3 1
      This book provides a comprehensive overview of e-learning (online learning) systems in the context of system delivery for Higher Education Information Services. The book considers practical issues in choosing a virtual learning environment and discusses a range of issues in implementing, managing and maintaining the service for users. In particular, the issue of accessibility and usability is discussed in the context of recent legislation (e.g. Disability Discrimination Act / SENDA.).
    • Understanding Digital Libraries

      • 2nd Edition
      • December 2, 2004
      • Michael Lesk
      • English
      • Paperback
        9 7 8 1 5 5 8 6 0 9 2 4 2
      • eBook
        9 7 8 0 0 8 0 4 8 1 5 1 7
      This fully revised and updated second edition of Understanding Digital Libraries focuses on the challenges faced by both librarians and computer scientists in a field that has been dramatically altered by the growth of the Web. At every turn, the goal is practical: to show you how things you might need to do are already being done, or how they can be done. The first part of the book is devoted to technology and examines issues such as varying media requirements, indexing and classification, networks and distribution, and presentation. The second part of the book is concerned with the human contexts in which digital libraries function. Here you’ll find specific and useful information on usability, preservation, scientific applications, and thorny legal and economic questions.
    • Hacking the Code

      • 1st Edition
      • April 24, 2004
      • Mark Burnett
      • English
      • Hardback
        9 7 8 1 9 3 2 2 6 6 6 5 8
      • eBook
        9 7 8 0 0 8 0 4 7 8 1 7 3
      Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking the Code dives right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations is included in both the Local and Remote Code sections of the book. The book is accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD also contains a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
    • Evidence-Based Educational Methods

      • 1st Edition
      • May 7, 2004
      • Daniel J. Moran + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 5 0 6 0 4 1 7
      • Paperback
        9 7 8 1 4 9 3 3 0 1 6 3 8
      • eBook
        9 7 8 0 0 8 0 4 9 1 3 0 1
      Evidence-Based Educational Methods answers the challenge of the No Child Left Behind Act of 2001 by promoting evidence-based educational methods designed to improve student learning. Behavioral scientists have been refining these instructional methods for decades before the current call for evidence-based education. Precision Teaching, Direct Instruction, Computerized Teaching, Personalized System of Instruction, and other unique applications of behavior analysis are all informed by the scientific principles of learning, have been tested in the laboratory, and are often shown to have significant success in field applications. This book details each of these approaches to education based on the principles of behavior analysis. Individuals and agencies responsible for instruction that leaves no child behind will find this compendium an important resource for meeting that challenge, and young educators will greatly benefit from this text, as they will see a blueprint of the evidence-based education systems being planned for the future.
    • Digital Dilemmas and Solutions

      • 1st Edition
      • February 28, 2004
      • Peter Limb
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 0 4 0 9
      • Paperback
        9 7 8 1 8 4 3 3 4 0 3 9 3
      • eBook
        9 7 8 1 7 8 0 6 3 0 6 4 9
      Today, all librarians face daunting challenges posed by trends in technology, publishing, and education as the impact of a globalising information economy forces a rethink of both library strategic directions and everyday library operations. This book brings together the main issues and dilemmas facing libraries; the book clearly shows how to deal with them, and provides a best-practice guide to the solutions.
    • WarDriving: Drive, Detect, Defend

      • 1st Edition
      • March 26, 2004
      • Chris Hurley
      • English
      • Paperback
        9 7 8 1 9 3 1 8 3 6 0 3 6
      • eBook
        9 7 8 0 0 8 0 4 8 1 6 8 5
      The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers.