Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Developing .Net Web Services With XML

      • 1st Edition
      • July 24, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 8 1 7
      • eBook
        9 7 8 0 0 8 0 4 7 7 2 1 3
      Prepare for the next generation of the internet with this in-depth, developer's guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased interoperability. Developing .Net Web Services with XML introduces readers to the foundation for the .Net platform. The book covers the history, applications and implementation of the Extensible Markup Language within Microsoft's .NET framework. Readers will be given a thorough introduction to .NET and its XML building blocks while acquiring a firm grasp of how those blocks can be used to build any Web site or service so that it will federate and collaborate seamlessly with others
    • Ruby Developers Guide

      • 1st Edition
      • February 6, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 6 4 0
      • eBook
        9 7 8 0 0 8 0 4 8 0 7 6 3
      An expert guide to Ruby, a popular new Object-Oriented Programming LanguageRuby is quickly becoming a favourite among developers who need a simple, straight forward, portable programming language. Ruby is ideal for quick and easy object-oriented programming such as processing text files or performing system management. Having been compared with other programming languages such as Perl, Python, PCL, Java, Eiffel, and C++; Ruby is popular because of its straight forward syntax and transparent semantics.Using step-by-step examples and real world applications, the Ruby Developer's Guide is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. Readers will learn how to develop, implement, organize and deploy applications using Ruby.
    • Performing Hybridity

      • 1st Edition
      • June 30, 2002
      • Kerry Mallan + 4 more
      • English
      • Paperback
        9 7 8 1 8 7 6 9 3 8 0 0 0
      • eBook
        9 7 8 1 7 8 0 6 3 2 8 2 7
      This publication was the outcome of a research project undertaken by a team of researchers from Queensland University of Technology and Brisbane Catholic Education Office throughout 1999-2000. The report was originally distributed to a limited number of participants and others considered stakeholders in the fields of education and teacher-librarianshi... The publication of the report reflects the interest shown in the project around Australia. The research focused on the impact of new technologies on the day-to-day lives of teacher-librarians, and revealed information that has significant relevance for the training, professional development and infrastructure support for teacher-librarianshi... This research is significant as it provides a sound and scholarly approach to the research topic and provides the field and others associated with schooling and teacher-librarianshi... with documented accounts of the contributions of teacher-librarians, the obstacles they face, and the way technology is affecting their personal and professional lives.Performing Hybridity would be of interest to the teacher-librarianshi... and general education community. The results of the research are not state or site specific and are applicable to other states in Australia. It is important for administrators and policy makers in state, catholic and independent systems as an information source for staff planning and development, and resourcing. The publication also has value for tertiary institutions offering courses in teacher-librarianshi... and more general librarianship programs.
    • Hack Proofing ColdFusion

      • 1st Edition
      • April 25, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 7 7 0
      • eBook
        9 7 8 0 0 8 0 4 7 8 0 9 8
      The only way to stop a hacker is to think like one! ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance.Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications.
    • Hack Proofing Your Network

      • 2nd Edition
      • March 26, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 7 0 1
      • eBook
        9 7 8 0 0 8 0 4 7 8 1 6 6
      A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including:· The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure SystemsThe central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network.
    • XML Net Developers Guide

      • 1st Edition
      • April 22, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 4 7 3
      • eBook
        9 7 8 0 0 8 0 4 8 1 8 1 4
      Compete with the big players in today's E-commerce marketplaceElectroni... Data Interchange (EDI) has long been the standard for large business enterprises to communicate in the B2B marketplace. However, EDI is a difficult technology - the cost and support of EDI standards is often too much for a small or medium business enterprise to bear. To compete in the current E-commerce marketplace, many organizations are beginning to take an interest in the interoperability that exists between XML (Extensible Markup Language) and EDI. XML .NET Developers Guide is written for information technology professionals responsible for supporting data management in both small and large organizations. This book appeals to both individuals working with an existing EDI environment, and small to medium businesses looking to increase their market presence by competing with current EDI players using XML/EDI.
    • Investigative Data Mining for Security and Criminal Detection

      • 1st Edition
      • December 16, 2002
      • Jesus Mena
      • English
      • Paperback
        9 7 8 0 7 5 0 6 7 6 1 3 7
      • eBook
        9 7 8 0 0 8 0 5 0 9 3 8 9
      Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest data mining techniques and shows how they can be used as investigative tools. Readers will learn how to search public and private databases and networks to flag potential security threats and root out criminal activities even before they occur. The groundbreaking book reviews the latest data mining technologies including intelligent agents, link analysis, text mining, decision trees, self-organizing maps, machine learning, and neural networks. Using clear, understandable language, it explains the application of these technologies in such areas as computer and network security, fraud prevention, law enforcement, and national defense. International case studies throughout the book further illustrate how these technologies can be used to aid in crime prevention.Investiga... Data Mining for Security and Criminal Detection will also serve as an indispensable resource for software developers and vendors as they design new products for the law enforcement and intelligence communities.Key Features:* Covers cutting-edge data mining technologies available to use in evidence gathering and collection * Includes numerous case studies, diagrams, and screen captures to illustrate real-world applications of data mining * Easy-to-read format illustrates current and future data mining uses in preventative law enforcement, criminal profiling, counter-terrorist initiatives, and forensic science
    • Dr Tom Shinder's ISA Server and Beyond

      • 1st Edition
      • December 11, 2002
      • Syngress
      • English
      • eBook
        9 7 8 0 0 8 0 4 7 7 3 9 8
      The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "security book." It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers.
    • Information Security Best Practices

      • 1st Edition
      • March 19, 2002
      • George L Stefanek
      • English
      • eBook
        9 7 8 0 0 8 0 4 9 1 5 4 7
      Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security.Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment.
    • 10 Cool Lego Mindstorm Robotics Invention System 2 Projects

      • 1st Edition
      • October 30, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 3 1 8 3 6 6 1 6
      • eBook
        9 7 8 0 0 8 0 5 4 6 3 0 8
      LEGO MINDSTORMS lets you design and program robots that can do just about anything! The LEGO MINDSTORMS RIS 2.0 is the core set for all MINDSTORMS users, that lets users design and program working robots - limited only by their imagination. Initially designed for users 12 and up, LEGO MINDSTORMS has taken off with LEGO enthusiasts of all ages. 10 Cool LEGO MINDSTORMS RIS 2.0 Projects: Amazing Projects You Can Build in Under an Hour provides step-by-step instructions and detailed illustrations for users of all skill levels and proficiencies.