Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Nessus Network Auditing

      • 1st Edition
      • July 20, 2004
      • Jay Beale + 3 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 7 9 6 2 0
      This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network.
    • Continuing Professional Development

      • 1st Edition
      • November 30, 2004
      • Alan Brine
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 0 8 1 2
      • Hardback
        9 7 8 1 8 4 3 3 4 0 8 2 9
      • eBook
        9 7 8 1 7 8 0 6 3 0 7 2 4
      This book helps information professionals in their continuing professional development (CPD). The book shows them how to examine their own skills and plan their development over a period of time. It also helps them to focus on their career path and begin the acquisition of skills necessary for the route they wish to follow in information work. The book is set against the background of CPD being an essential part of the modern information professional’s career planning. Employers are certain to be able to choose between a number of qualified personnel for every available post. Those individuals that have a proven track record of skills development in both their personal and professional skills are more employable.
    • CYA Securing Exchange Server 2003

      • 1st Edition
      • May 21, 2004
      • Mark Fugatt + 2 more
      • English
      • Paperback
        9 7 8 1 9 3 1 8 3 6 2 4 1
      • eBook
        9 7 8 0 0 8 0 4 7 6 9 7 1
      A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential Exchange Server 2003 features. The book is organized around the 11 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential features. The options within each menu are explained clearly, potential problems are identified up-front, and configurations are subsequently presented in the aptly named "By the Book" section for that MMC. Readers will also appreciate the "Reality Check" sidebars throughout, which present valuable cost/benefit analyses of situations where there is no single "right" answer.
    • Weblogs and Libraries

      • 1st Edition
      • September 30, 2004
      • Laurel Clyde
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 0 8 5 0
      • Hardback
        9 7 8 1 8 4 3 3 4 0 9 6 6
      • eBook
        9 7 8 1 7 8 0 6 3 1 8 2 0
      This book discusses the topic of ‘weblogs and libraries’ from two main perspectives: weblogs as sources of information for libraries and librarians; and weblogs as tools that libraries can use to promote their services and to provide a means of communication with their clients. It begins with an overview of the whole weblog and blogging phenomenon. The many different kinds of weblogs are outlined (including personal weblogs, community weblogs, multimedia weblogs). The problem of locating weblogs is addressed through a discussion of weblog directories, search engines and other finding tools. Chapters include using weblogs as sources of information in the library or information service, the options for creating a weblog, and managing the library’s own weblog.
    • The Manager's Handbook for Corporate Security

      • 1st Edition
      • March 7, 2003
      • Gerald L. Kovacich + 1 more
      • English
      • Hardback
        9 7 8 0 7 5 0 6 7 4 8 7 4
      • Paperback
        9 7 8 0 1 2 3 9 1 1 0 3 2
      • eBook
        9 7 8 0 0 8 0 4 9 6 2 4 5
      Kovacich and Halibozek offer you the benefit of more than 55 years of combined experience in government and corporate security. Throughout the book, the authors use a fictional global corporation as a model to provide continual real-world challenges and solutions. New and experienced managers alike will find a wealth of information and practical advice to help you develop strategic and tactical plans and manage your daily operations.
    • Rethinking Corporate Security in the Post-9/11 Era

      • 1st Edition
      • June 26, 2003
      • Dennis Dalton
      • English
      • Paperback
        9 7 8 0 1 2 3 9 1 1 0 4 9
      • Hardback
        9 7 8 0 7 5 0 6 7 6 1 4 4
      • eBook
        9 7 8 0 0 8 0 5 7 4 8 9 9
      The attacks on the World Trade Center and the Pentagon on September 11, 2001 changed the way the world thinks about security. Everyday citizens learned how national security, international politics, and the economy are inextricably linked to business continuity and corporate security. Corporate leaders were reminded that the security of business, intellectual, and human assets has a tremendous impact on an organization's long-term viability. In Rethinking Corporate Security, Fortune 500 consultant Dennis Dalton helps security directors, CEOs, and business managers understand the fundamental role of security in today's business environment and outlines the steps to protect against corporate loss. He draws on the insights of such leaders as Jack Welch, Bill Gates, Charles Schwab, and Tom Peters in this unique review of security's evolving role and the development of a new management paradigm.
    • Hallucinogens

      • 1st Edition
      • April 10, 2003
      • Richard Laing
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 1 4 2 3
      • Hardback
        9 7 8 0 1 2 4 3 3 9 5 1 4
      • eBook
        9 7 8 0 0 8 0 5 0 7 7 5 0
      Hallucinogens: A Forensic Drug Handbook is a comprehensive reference for everyone involved in the identification, investigation, and forensic analysis of hallucinogenic drugs. The text begins with a review of the history of these drugs and their abuse, and then takes an in-depth look at the many different types of hallucinogens, their chemical make-up, how they affect users, how they are manufactured and distributed, and how they can be detected and analyzed.Hallucinoge... covers the most commonly abused drugs such as LSD, MDMA ("Ecstasy"), and PCP ("Angel Dust"), as well as many lesser-known chemical substances that cause similar effects. Chapters have been contributed by leading analysts and investigators around the world, and are highlighted with numerous illustrations. This unique handbook will serve is a cross-disciplinary source of information for forensic toxicologists, law enforcement officers, and others involved in the fight against drugs.
    • Closed Circuit Television

      • 2nd Edition
      • October 2, 2003
      • Joe Cieszynski
      • English
      • Paperback
        9 7 8 0 7 5 0 6 5 7 2 8 0
      • eBook
        9 7 8 0 0 8 0 5 4 5 7 3 8
      Closed Circuit Television (CCTV) surveillance is one of the fastest growing areas in the security industry. This book is an essential guide for professionals involved the installation and maintenance of CCTV systems, system design, specification and purchasing and the management of CCTV systems. Unlike most existing books on CCTV, this title is not just a discussion of security issues, but a thorough guide to the technical side of the subject - cameras and monitors, video recording, cabling and transmission, installation and maintenance.The concise, accessible text makes it for hard-pressed practitioners and students on training courses.The second edition is fully dual-standard for PAL and NTSC systems. New material in the second edition covers lighting issues and equipment, digital signal transmission, integrated CCTV / intruder alarm systems, CAT5 cabling, digital recording, video printers, ancillary equipment, and a glossary.This book is recommended by SITO (the Security Industry Training Organisation, UK) as suitable for its courses, the City and Guilds 1851 programme, and the underpinning knowledge requirement of Level 3 NVQs from SITO / C & G. Joe Cieszynski is a well known magazine writer and a contributor to the SITO distance learning materials on CCTV. He has extensive experience in the industry and as a lecturer.
    • The Information Systems Security Officer's Guide

      • 2nd Edition
      • August 5, 2003
      • Gerald L. Kovacich
      • English
      • Paperback
        9 7 8 0 7 5 0 6 7 6 5 6 4
      • eBook
        9 7 8 0 0 8 0 4 9 1 5 3 0
      Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information security program, and additional metrics to measure organization performance. It also includes six entirely new chapters on emerging trends such as high-tech fraud, investigative support for law enforcement, national security concerns, and information security consulting. This essential guide covers everything from effective communication to career guidance for the information security officer. You'll turn to it again and again for practical information and advice on establishing and managing a successful information protection program.
    • Computational Chemistry

      • 1st Edition
      • Volume 10
      • May 30, 2003
      • Claude Le Bris
      • English
      • Hardback
        9 7 8 0 4 4 4 5 1 2 4 8 2
      • eBook
        9 7 8 0 4 4 4 5 3 7 3 6 2
      Aiming to provide the reader with a general overview of the mathematical and numerical techniques used for the simulation of matter at the microscopic scale, this book lays the emphasis on the numerics, but modelling aspects are also addressed. The contributors come from different scientific communities: physics, theoretical chemistry, mathematical analysis, stochastic analysis, numerical analysis, and the text should be suitable for graduate students in mathematics, sciences and engineering and technology.