Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • C#.Net Developer's Guide

      • 1st Edition
      • January 12, 2002
      • Adrian Turtschi + 3 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 7 6 3 6 0
      Microsoft's C# ("C sharp") is a modern, object-oriented programming language built from the ground up to exploit the power of XML-based Web services on Microsoft's new .NET platform. With its Visual C++ development system heritage, C# will enable millions of C and C++ developers to use existing skills to rapidly build sophisticated XML-based .NET applications.Why Will Web Developers Switch to C#?...Because it's the ideal solution for C and C++ programmers who need to combine rapid development with the power to access all the functionality of the Microsoft.NET platform. They want an environment that is completely in sync with emerging Web standards and one that provides easy integration with existing applications. C#.net Web Developer's Guide will enhance developer productivity and help them eliminate programming errors that can lead to increased development costs. This book teaches Web developers to quickly and easily build solutions for the Microsoft .NET platform. Web developers will learn to use C# components to build Web services and applications that are available across the Internet, from any application running on any platform.
    • Applying Knowledge Management

      • 1st Edition
      • December 20, 2002
      • Ian Watson
      • English
      • Paperback
        9 7 8 1 5 5 8 6 0 7 6 0 6
      • eBook
        9 7 8 0 0 8 0 4 9 9 2 7 7
      The wholesale capture and distribution of knowledge over the last thirty years has created an unprecedented need for organizations to manage their knowledge assets. Knowledge Management (KM) addresses this need by helping an organization to leverage its information resources and knowledge assets by "remembering" and applying its experience. KM involves the acquisition, storage, retrieval, application, generation, and review of the knowledge assets of an organization in a controlled way. Today, organizations are applying KM throughout their systems, from information management to marketing to human resources. Applying Knowledge Management: Techniques for Building Corporate Memories examines why case-based reasoning (CBR) is so well suited for KM. CBR can be used to adapt solutions originally designed to solve problems in the past, to address new problems faced by the organization. This book clearly demonstrates how CBR can be successfully applied to KM problems by presenting several in-depth case-studies. Ian Watson, a well-known researcher in case-based reasoning and author of the introductory book, Applying CBR: Techniques for Enterprise Systems has written this book specifically for IT managers and knowledge management system developers.
    • The Future of Market Transition

      • 1st Edition
      • Volume 19
      • November 26, 2002
      • Kevin T Leicht
      • English
      • Hardback
        9 7 8 0 7 6 2 3 0 8 3 5 4
      • eBook
        9 7 8 0 0 8 0 5 4 4 4 7 2
      The collapse of the state-controlled economies of the former Eastern Bloc will certainly change the way the global economy operates. Bringing together scholars from a wide variety of theoretical perspectives, different nations and different empirical research traditions, this title examines the ongoing transition and the implications of market transitions for individual life chances, state economic policy and social stratification systems. The volume includes scholarship that focuses on both single nation and cross-national research, plus research contributions that compare state socialist/former state socialist political economies with conditions elsewhere in the world.
    • New Frontiers in Socialization

      • 1st Edition
      • Volume 7
      • June 21, 2002
      • Richard A. Settersten Jr. + 1 more
      • English
      • Hardback
        9 7 8 0 7 6 2 3 0 8 6 3 7
      • eBook
        9 7 8 0 0 8 0 5 4 6 1 9 3
    • Cisco Security Specialists Guide to PIX Firewall

      • 1st Edition
      • December 11, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 3 1 8 3 6 6 3 0
      • eBook
        9 7 8 0 0 8 0 4 7 6 5 5 1
      Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more. Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device, provides multiple configurations and administration examples, and fully describes the unique line syntax native to PIX firewall configuration and administration.
    • Biotechnology Organizations in Action

      • 1st Edition
      • Volume 20
      • March 6, 2002
      • J. Norus
      • English
      • Paperback
        9 7 8 0 4 4 4 5 4 9 9 4 5
      • Hardback
        9 7 8 0 4 4 4 5 1 0 3 5 8
      • eBook
        9 7 8 0 0 8 0 5 2 8 1 6 8
      This volume analyzes the dynamics and interactive processes among the players (individuals, institutions, and organizations/firms) that have constituted and legitimized the development of the biotechnology industries. The unit of analysis is small entrepreneurial firms developing biotechnological products and processes. What types of strategies are small entrepreneurs pursuing in order to create markets for their new products and processes, and how have specific strategies emerged? The primary interest is the network process through which the technological field and the development of institutions and routines evolve and co-evolve. The theoretical contribution of the book is its focus on the development of the concept of networks. From being regarded as a relative static concept the book transforms the concept into a dynamic concept of networking. The dynamic view on the creation and development of new technologies through network formations is linked to the concept of strategy that is used throughout the book. Hence the strategies are developed along with the creation of technological knowledge, and it is hoped that the diffusion of this specific knowledge will bring new actors into the technological arena or community. This book will be useful to the academic community, those studying the formation of networks, strategic management, organizational behavior, and management of technology, as well as business observers with a specific interest in the evolution of the biotechnology industry.
    • C# For Java Programmers

      • 1st Edition
      • June 26, 2002
      • Harold Cabrera
      • English
      • Paperback
        9 7 8 1 9 3 1 8 3 6 5 4 8
      • eBook
        9 7 8 0 0 8 0 4 7 6 3 5 3
      Java Programmers, Preprare for Microsoft's .NET initiative while enhancing your repertoire and marketability with C# for Java Progammers! C# for Java Programmers will prepare readers for the .NET framework by building on what they already know about object-oriented languages and give them the means to maintain their flexibility and effectiveness in an un-certain marketplace. This book will compare and contrast the advantages and disadvantages of both Java and C# to allow programmers to make their own decisions regarding what each language is best used for. Whatever your feelings are about Microsoft and its .NET initiative, there can be no denying that C# is here to stay. The C# language, a close cousin to Java, is a new object-oriented programming language (OOPL) designed to work within the .NET framework. It improves upon many of the vague or ill-defined areas of C++ that frequently lead programmers into trouble. C# is a strongly-typed, object-oriented language designed to give the optimum blend of simplicity, expressiveness, and performance.
    • Sniffer Pro Network Optimization & Troubleshooting Handbook

      • 1st Edition
      • August 16, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 3 1 8 3 6 5 7 9
      • eBook
        9 7 8 0 0 8 0 4 8 0 9 8 5
      Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite of Sniffer Solutions from Network Associates but ultimately focuses on the affordable and most widely used Sniffer Product - Sniffer Pro LAN Network Analyzer. This book begins with the basic features of Sniffer Pro LAN and then moves the reader through the impressive tips and tools available for gathering data, analyzing, troubleshooting, resolving and securing problems on their network. Sniffer from Network Associates is a suite of tools including Sniffer Portable Analysis Suite, Sniffer Distributed Analysis Suite, Sniffer Reporting, Sniffer Optical, and Sniffer Wireless. With a clear market leadership, Sniffer Solutions are employed in over 80% of the enterprise networks of the Fortune 100. Sniffer has also received wide industry acclaim from the experts and its everyday users. In 2000 Sniffer was named one of the 10 most computer products of the decade by Network Computing Magazine. It also received the "Editor's Choice" award from PC Magazine during the second quarter of 2001. Over 60,000 individuals have taken advantage of the educational services offered by Sniffer Technologies - aptly named Sniffer University. Coupled with the introduction of the Sniffer Certified Professional Program (SCPP) as a replacement for the popular CNX (Certified Network Expert) certification, an aptitude with Sniffer Solutions is a "must-have" for system administrators.
    • Crime Laboratory Management

      • 1st Edition
      • November 1, 2002
      • Jami St. Clair
      • English
      • Hardback
        9 7 8 0 1 2 6 6 4 0 5 1 9
      • Paperback
        9 7 8 0 1 2 3 9 5 4 8 3 1
      • eBook
        9 7 8 0 0 8 0 4 9 0 8 4 7
      Crime Laboratory Management is the first book to address the unique operational, administrative, and political issues involved in managing a forensic laboratory. It guides managers and supervisors through essential tasks ranging from hiring and training of staff to quality control, facilities management, and public relations. Author Jami St. Clair has more than 20 years experience in forensic science and served as President of the American Society of Crime Lab Directors in 1998-1999. She and her colleagues have designed this book to be useful for supervisors at every level. With its combination of classic management theories and practical information, this unique resource will help managers ensure that their laboratories operate efficiently and survive the intense scrutiny of today's criminal justice system. It will also help students and professional with an interest in forensic science and crime laboratory operation to better understand the functions of labs and the critical role they play in handling and analyzing evidence.
    • Checkpoint Next Generation Security Administration

      • 1st Edition
      • April 11, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 7 4 9
      • eBook
        9 7 8 0 0 8 0 4 7 6 4 5 2
      Unparalleled security management that IT professionals have been waiting for.Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking user interface that meets the computer industry's Internet security requirements. The Next Generation User Interface is easy to use and offers unparalleled security management capabilities by creating a visual picture of security operations.CheckPoin... Next Generation Security Administration will be a comprehensive reference to CheckPoint's newest suite of products and will contain coverage of: Next Generation User Interface, Next Generation Management, Next Generation Performance, Next Generation VPN Clients, and Next Generation Systems. CheckPoint are a company to watch, they have captured over 50% of the VPN market and over 40% of the firewall market according to IDC ResearchOver 29,000 IT professionals are CheckPont Certified This is the first book to covers all components of CheckPoint's new suite of market-leading security products - it will be in demand!