Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Side Effects of Drugs Annual

    • 1st Edition
    • Volume 27
    • English
    The Side Effects of Drugs Annual was first published in 1977. It has been published continuously since then, as a yearly update to the encyclopaedic volume Meyler's Side Effects of Drugs. Each new Annual provides clinicians and medical investigators with a reliable and critical yearly survey of new data and trends in the area of Adverse Drug Reactions and Interactions. An international team of specialists have contributed to the Annuals by selecting from each year's publications all that is truly new and informative, by critically interpreting it, and by pointing out whatever is misleading. The use of the book is enhanced by separate indexes, allowing the reader to enter the text via the drug name, adverse effect, or drug interaction. Special features of the Annuals are the Side Effects of Drugs Essay, usually written by a guest author, and the special reviews: short articles, within the different chapters, that give extra attention to topics of current interest. The Essay in Annual 27 is entitled 'The General Practice Research Database' (by Dr. H. Jick) and there is a Historical Essay entitled 'Louis Lewin - Meyler's Predecessor' (by Dr. J.K. Aronson). The special reviews in this volume include, among others: The effects of NSAIDs on blood pressure Risks of inhaled corticosteroids in children Leukotriene receptor antagonists and Churg-Strauss syndrome Amiodarone and thyroid disease Surveillance of adverse events following immunization Smallpox vaccination Safety aspects of folic acid Inhibitors of topoisomerase I and topoisomerase II Liver damage from kava kava
  • Investigating Child Exploitation and Pornography

    The Internet, Law and Forensic Science
    • 1st Edition
    • Monique M. Ferraro + 1 more
    • English
    Investigating Child Exploitation and Pornography provides the historical, legal, technical, and social background for the laws prohibiting child exploitation, in particular, child pornography. It offers a history of child exploitation cases and studies, outlining the roles of technology in this type of crime and the evidence they can contain, and documenting new research performed by the authors. It details how successful undercover Internet operations are conducted, how the associated evidence is collected, and how to use the evidence to locate and apprehend the offender. The heart of this work is a legal section, detailing all of the legal issues that arise in Internet child exploitation cases. A forensic examination section presents evidentiary issues from a technical perspective and describes how to conduct a forensic examination of digital evidence gathered in the investigative and probative stages of a child exploitation case. The book will become an indispensable resource for those involved in the investigation, prosecution, and study of computer-assisted child sexual exploitation.
  • Private Security and the Law

    • 3rd Edition
    • Charles Nemeth
    • English
    Private Security and the Law, Third Edition is a textbook analysis of significant practices in the security industry that relate to law, regulation, licensure and constitutional dilemmas according to case and statutory authority. It is a treatise on the state of the law that governs the security industry and its operatives. The book fills the void that an increasing number of institutions are seeking as they expand their security programs in response to the growing demand for security education. This book delivers up to date information on the legal requirements witnessed by most security firms. It also explores the liability problems common to security operations, including negligence and tortious liability, civil actions commonly litigated, and strategies to avoid troublesome causes of action that effect business efficiency. From another angle, the work examines the constitutional and due process dimensions of private security work and affords the reader a look at how case law applies certain remedies to wronged parties. Recent cases, and the trends sure to follow, are highlighted throughout the text. Finally, the text is filled with checklists, data and other useful information that aids the security practitioner in applying theory to practice. This book will appeal to students in security and criminal justice programs; private security consultants; corporate security managers; and lawyers.
  • Intellectual Property Licences and Technology Transfer

    A Practical Guide to the New European Licensing Regime
    • 1st Edition
    • Duncan Curley
    • English
    This essential guide vital new changes by the European Commission to the law governing the enforceability of intellectual property licences in Europe. Agreements which contain the grant of a licence by one party to another of intellectual property rights are subject to European competition (anti-trust) laws. In particular, many agreements containing licences of patent rights and rights in confidential information and technical know-how are caught by Article 81(1) of the EC Treaty, which prohibits agreements between undertakings which prevent, restrict or distort competition in the Common Market. However, because licences of intellectual property rights usually facilitate the transfer of technology from one undertaking to another, and the licensor and licensee will often operate at different levels of the market, many licences of intellectual property rights may benefit from an automatic exemption under Article 81(3) of the EC Treaty. On 1 May 2004, this exemption is being radically overhauled, as part of the European Commission’s drive to modernise European competition law. This book examines the changes in that legislation.
  • Weblogs and Libraries

    • 1st Edition
    • Laurel Clyde
    • English
    This book discusses the topic of ‘weblogs and libraries’ from two main perspectives: weblogs as sources of information for libraries and librarians; and weblogs as tools that libraries can use to promote their services and to provide a means of communication with their clients. It begins with an overview of the whole weblog and blogging phenomenon. The many different kinds of weblogs are outlined (including personal weblogs, community weblogs, multimedia weblogs). The problem of locating weblogs is addressed through a discussion of weblog directories, search engines and other finding tools. Chapters include using weblogs as sources of information in the library or information service, the options for creating a weblog, and managing the library’s own weblog.
  • Introduction to Homeland Security

    • 1st Edition
    • Jane Bullock + 1 more
    • English
    "Introduction to Homeland Security" provides educators, students, and practitioners with a comprehensive account of past and current homeland security reorganization and practices, policies and programs in relation to the government restructure.The structure of each chapter is designed to accommodate useful pedagogical elements such as learning objectives for each chapter; definitions of the terms used in homeland security, a comprehensive contact list of Federal and State government homeland security offices and officials; case studies of past terrorism events; and an Instructor Guide complete with chapter summaries, exam questions and discussion topics. In addition the book provides an historic context for current homeland security activities. It recounts US government and private sector actions taken in the aftermath of 9/11 in the areas of legislation, government organization, communications, technology, and emergency management practices. Case studies and best practices will be included as well as a comprehensive glossary of homeland security terms and acronyms.
  • How to Cheat at Managing Windows Small Business Server 2003

    In the Land of the Blind, the One-Eyed Man is King
    • 1st Edition
    • Susan Snedaker
    • English
    How to Cheat at Managing Windows Small Business Server 2003 deals only with the vital, and will be a huge relief to the hundreds of thousands of managers who probably never imagined they would be managing the operating system equivalent of the Space Shuttle.
  • Transportation Labor Issues and Regulatory Reform

    • 1st Edition
    • Volume 10
    • James H Peoples + 1 more
    • English
    Regulatory reform in the late 1970s and early 1980s vastly transformed the labor market for transportation workers. Most research in this area focuses on the effect of deregulation on the earnings of nonmanagement company workers in airline, trucking and rail. Deregulation of transportation industries, though, has had a broader effect on workers. For instance, deregulation also influences workers’ hours worked per week, working conditions, worker safety, and a host of other labor issues. Deregulation might also influence the earnings of managers and self-employed workers in transportation industries. Examining these issues is valuable because such analysis provides a more complete assessment of labor market changes following the shift to a more market oriented business environment.Transpor... Labor Issues and Regulatory Reform adds to the debate on deregulation’s influence on transportation labor markets by presenting empirical evidence on an array of labor market outcomes in transportation industries. Contributions to this volume are categorized by their analysis on worker safety, working conditions and employment opportunities, and by their analysis on managerial and self-employed earnings
  • Trojans, Worms, and Spyware

    A Computer Security Professional's Guide to Malicious Code
    • 1st Edition
    • Michael Erbschloe
    • English
    Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements. This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats – new and advanced variants of Trojans, as well as spyware (both hardware and software) and “bombs” – and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
  • Defense Transportation: Algorithms, Models and Applications for the 21st Century

    • 1st Edition
    • Robert T. Brigantic + 1 more
    • English
    Defense Transportation: Algorithms, Models and Applications for the 21st Century contains papers divided into three general sections according to the title of this text: algorithms, models, and applications. The first section on algorithms contains papers that are theoretical in nature or contain new techniques that relate to Defense Transportation System (DTS) processes. A sampling of the papers contained in this section deals with group theoretic "tabu" search techniques, shortest path sailing distance algorithms, and strategic airlift model validation methods. The second section contains papers on various transportation models used throughout the DoD and transportation industry, as well as some newly developed transportation modelling methods that may eventually find their way into larger scale transportation models. A review of the major strategic mobility models is also contained in this section. The third section contains papers on various transportation applications that have been used to support various DTS studies and analyses. This section also contains a diverse set of topics, with articles ranging from a paper on North Atlantic Treaty Organization (NATO) strategic lift requirements to an analysis paper on theater reception, staging, onward movement, and integration.