Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Intruder Alarms

    • 2nd Edition
    • Gerard Honey
    • English
    Intruder Alarms provides a definitive and fully up-to-date guide to the specification, systems design, integration, installation and maintenance of intruder alarm systems. It has been written to be the essential handbook for installation engineers and security professionals working in this rapidly expanding and developing area.The second edition includes new material on the use of remote signalling and networking and an expanded section on the integration of security systems, including real-world case studies. Information on police response policy, and the use of confirmed alarm technology has been updated, along with coverage of accreditation systems, NSI and ICON.This book has been endorsed by SITO (the UK's Security Industry Training Organisation) as a suitable text for students following the relevant SITO courses including the SITO / City & Guilds scheme 1851: Knowledge of Security and Emergency Alarm Systems.
  • MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure(Exam 70-297)

    Study Guide & DVD Training System
    • 1st Edition
    • Syngress
    • English
    MCSE Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure (Exam 70-297) Study Guide and DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives readers 100% coverage of the official Microsoft exam objectives plus test preparation software for the edge needed to pass the exam on your first try.
  • Security + Study Guide and DVD Training System

    • 1st Edition
    • Syngress
    • English
    Why has CompTIA (the high-profile Computer Technology Industry Association behind the wildly popular A+ and Network+ certifications) targeted security for its latest credential? Thanks to soaring e-business initiatives and worldwide Internet connectivity, recent survey stats from the Computer Security Institute (CSI) show we need more network security specialists-fast! Boasting a one-of-a-kind integration of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation, Security+ Study Guide & DVD Training System gives students 100% coverage of official CompTIA Security+ exam objectives plus realistic test prep. Security+ is sure to become an instant industry standard. Leading cert industry publications and Web portals forecast the rapid rise of security certifications in 2003, and CompTIA's growth curve of A+ and Network+ technicians suggests that Security+ certified engineers could easily number 100,000 by the end of next year
  • Lego Software Power Tools With LDraw MLCad and LPub

    • 1st Edition
    • Syngress
    • English
    Create Virtual 3D LEGO Models Using LEGO Software Power ToolsLEGO Master Builders have created a powerful set of tools that are distributed as freeware to the LEGO community to assist LEGO fans in their building adventures. Until now, these tools have been difficult to find, and even more difficult to configure to work with one another. Here, in one book, readers will find steps for installing and using all of the most popular LEGO freeware applications. Also, all of the applications are consolidated into one simple-to-install program that allows readers to be up and running in minutes
  • CCTV for Security Professionals

    • 1st Edition
    • Alan Matchett
    • English
    CCTV for Security Professionals provides the information necessary to design the ideal CCTV system. The chapters are stand-alone sources of information on their subjects and are presented in logical sequence to guide the reader from basic principles to more complex for a complete system understanding.In his straight-forward and informative text, Alan Matchett approaches the camera systems from the user's point of view, providing the security manager with the knowledge to discuss the system, its desired features, and the areas of design concern within the context of an organization's business model. This can prove to be invaluable when evaluating an existing system, the use and components of a given system, or in evaluating a system design proposed by a vendor.Installers and service personnel will benefit from the functions and possibilities that are available with the various components and by gaining an understanding of their customers' needs. Newer technicians will learn how to set up the system properly, and can familiarize themselves with the technologies that go into a CCTV system. Security equipment sales personnel will also gain a better knowledge of the customer's needs as well as learn to determine exactly what questions they should be asking the customer and what the customer's responses mean. In this manner, the book will offer invaluable tips to ensure customers get exactly what they expect in a system.
  • Applying Knowledge Management

    Techniques for Building Corporate Memories
    • 1st Edition
    • Ian Watson
    • English
    The wholesale capture and distribution of knowledge over the last thirty years has created an unprecedented need for organizations to manage their knowledge assets. Knowledge Management (KM) addresses this need by helping an organization to leverage its information resources and knowledge assets by "remembering" and applying its experience. KM involves the acquisition, storage, retrieval, application, generation, and review of the knowledge assets of an organization in a controlled way. Today, organizations are applying KM throughout their systems, from information management to marketing to human resources. Applying Knowledge Management: Techniques for Building Corporate Memories examines why case-based reasoning (CBR) is so well suited for KM. CBR can be used to adapt solutions originally designed to solve problems in the past, to address new problems faced by the organization. This book clearly demonstrates how CBR can be successfully applied to KM problems by presenting several in-depth case-studies. Ian Watson, a well-known researcher in case-based reasoning and author of the introductory book, Applying CBR: Techniques for Enterprise Systems has written this book specifically for IT managers and knowledge management system developers.
  • Investigative Data Mining for Security and Criminal Detection

    • 1st Edition
    • Jesus Mena
    • English
    Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest data mining techniques and shows how they can be used as investigative tools. Readers will learn how to search public and private databases and networks to flag potential security threats and root out criminal activities even before they occur. The groundbreaking book reviews the latest data mining technologies including intelligent agents, link analysis, text mining, decision trees, self-organizing maps, machine learning, and neural networks. Using clear, understandable language, it explains the application of these technologies in such areas as computer and network security, fraud prevention, law enforcement, and national defense. International case studies throughout the book further illustrate how these technologies can be used to aid in crime prevention.Investiga... Data Mining for Security and Criminal Detection will also serve as an indispensable resource for software developers and vendors as they design new products for the law enforcement and intelligence communities.Key Features:* Covers cutting-edge data mining technologies available to use in evidence gathering and collection * Includes numerous case studies, diagrams, and screen captures to illustrate real-world applications of data mining * Easy-to-read format illustrates current and future data mining uses in preventative law enforcement, criminal profiling, counter-terrorist initiatives, and forensic science
  • Dr Tom Shinder's ISA Server and Beyond

    Real World Security Solutions for Microsoft Enterprise Networks
    • 1st Edition
    • Syngress
    • English
    The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "security book." It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers.
  • Cisco Security Specialists Guide to PIX Firewall

    • 1st Edition
    • Syngress
    • English
    Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more. Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device, provides multiple configurations and administration examples, and fully describes the unique line syntax native to PIX firewall configuration and administration.
  • The Future of Market Transition

    • 1st Edition
    • Volume 19
    • Kevin T Leicht
    • English
    The collapse of the state-controlled economies of the former Eastern Bloc will certainly change the way the global economy operates. Bringing together scholars from a wide variety of theoretical perspectives, different nations and different empirical research traditions, this title examines the ongoing transition and the implications of market transitions for individual life chances, state economic policy and social stratification systems. The volume includes scholarship that focuses on both single nation and cross-national research, plus research contributions that compare state socialist/former state socialist political economies with conditions elsewhere in the world.