Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Research Methods for Students, Academics and Professionals

      • 2nd Edition
      • July 1, 2002
      • Kirsty Williamson
      • English
      • Paperback
        9 7 8 1 8 7 6 9 3 8 4 2 0
      • eBook
        9 7 8 1 7 8 0 6 3 4 2 0 3
      Research is such an important subject for information professionals that there will always be a need for effective guides to it. Research skills are a prerequisite for those who want to work successfully in information environments, an essential set of tools which enable information workers to become information professionals. This book focuses on producing critical consumers of research. It also goes some way towards producing researchers in the fields of information management and systems.The first edition of this book was enthusiastically received by researchers, students and information professionals in Australia and beyond. Reviews of the first edition considered it a “a worthwhile addition to any information professional’s or research student’s reference shelf” (Archives & Manuscripts). This new edition has an additional chapter on ethics, to address the importance of the ethical implications of research. It also has (as did the first edition) two unique characteristics: it is Australian-focused, distinctive among research texts for information professionals; and it has a multi-disciplinary focus, with its authors being drawn from information management (librarianship, archives and recordkeeping) and information systems. The numerous examples throughout the book are drawn from these multiple disciplines. The first edition of this book was road-tested with students from several disciplines who are studying in several universities. Its Introduction noted that "In research terms, the content have been refereed and found to be authoritative!" To this can be added the many satisfied users of the first edition.
    • ASP.Net Web Developer's Guide

      • 1st Edition
      • January 2, 2002
      • Syngress
      • English
      • eBook
        9 7 8 0 0 8 0 4 7 5 9 4 3
      ASP.Net Web Developer's Guide provides information to make use of Microsoft's newest Web development platform.ASP.NET is a revolutionary programming framework that enables the rapid development of powerful web applications and services. Part of the emerging Microsoft .NET Platform, it provides the easiest and most scalable way to build, deploy and run distributed web applications that can target any browser or device. ASP.NET (formerly referred to as ASP+) is more than the next version of Active Server Pages (ASP); it is a unified Web development platform that provides the services necessary for developers to build enterprise-class Web applications. ASP .net Web Developer's Guide assists Web developers to quickly and easily build solutions for the Microsoft .NET platform. Programmers who are expert in asp and other languages will find this book invaluable.
    • Biz Talk Server 2000 Developer's Guide

      • 1st Edition
      • March 6, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 4 0 4
      • eBook
        9 7 8 0 0 8 0 4 7 6 1 1 7
      The BizTalk 2000 Developer's Guide is written for developers who are responsible for installing, configuring and deploying the BizTalk Server in their organizations IT infrastructure. The opening chapters of the book discuss the benefits of seamless business-to-business application integration, summarize the features and enhancements of BizTalk Server 2000, and offer an introduction to XML - the driving force behind BizTalk. The next chapters explore the multiple tools that are incorporated into BizTalk that will transform the way in which information is created, transmitted and maintained in the server environment. Other chapters include complete coverage of the security considerations for BizTalk, and an examination of the various third-party plug-ins for enhancing BizTalk Server 2000.
    • Hackproofing Your Wireless Network

      • 1st Edition
      • March 22, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 5 9 6
      • eBook
        9 7 8 0 0 8 0 4 7 8 1 8 0
      The only way to stop a hacker is to think like one! Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment. Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks.
    • Bluetooth Application Developer's Guide

      • 1st Edition
      • January 2, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 4 2 8
      • eBook
        9 7 8 0 0 8 0 4 7 6 1 7 9
      "Bluetooth (enabled devices) will ship in the billions of units once it gains momentum." - Martin Reynolds, Gartner Group Bluetooth is the most exciting development in wireless computing this decade! Bluetooth enabled devices can include everything from network servers, laptop computers and PDAs, to stereos and home security systems. Most Bluetooth products to hit the market in 2001 will be PC cards for laptop computers and access points, which allow up to seven Bluetooth devices to connect to a network. Reports indicate that by the end of 2003 there will be over 2 billion Bluetooth-enabled devices. Bluetooth-enabled devices communicate with each other through embedded software applications. Bluetooth Developer's Guide to Embedded Applications will provide embedded applications developers with advanced tutorials and code listings written to the latest Bluetooth's latest specification, version 1.1. Written by Bluetooth pioneers from market leaders in Bluetooth software development, Extended Systems and Cambridge Silicon Radio, this is the first advanced level Bluetooth developer title on the market.
    • Configuring IPv6 For Cisco IOS

      • 1st Edition
      • August 16, 2002
      • Syngress
      • English
      • Paperback
        9 7 8 1 9 2 8 9 9 4 8 4 8
      • eBook
        9 7 8 0 0 8 0 4 7 6 7 6 6
      "By building IPv6 into Cisco IOS software, we are enabling continued growth of the Internet and its expansion into new applications and capabilities in a way that maintains compatibility with existing Internet services." -- Stephen Deering, Cisco Fellow and lead designer of the protocol Internetworking Protocol (IP) addresses are the unique numeric identifiers required of every device connected to the Internet. Two years ago, in response to the exponential increase in demand for new IP addresses, the Internet Engineering Task Force finalized its revision on IP addressing, called IP Version 6 and key hardware vendors such as Cisco and major Internet Service Providers like AOL announced plans to migrate to IP Version 6. That is now happening. Cisco Systems began incorporating Internet Protocol version 6 (IPv6) in its Cisco IOS Software in June, 2001. Cisco is currently the only major networking vendor to deliver IPv6 across multiple platforms. This book provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on your network.
    • CCTV for Security Professionals

      • 1st Edition
      • December 23, 2002
      • Alan Matchett
      • English
      • Hardback
        9 7 8 0 7 5 0 6 7 3 0 3 7
      • eBook
        9 7 8 0 0 8 0 5 0 0 7 8 2
      CCTV for Security Professionals provides the information necessary to design the ideal CCTV system. The chapters are stand-alone sources of information on their subjects and are presented in logical sequence to guide the reader from basic principles to more complex for a complete system understanding.In his straight-forward and informative text, Alan Matchett approaches the camera systems from the user's point of view, providing the security manager with the knowledge to discuss the system, its desired features, and the areas of design concern within the context of an organization's business model. This can prove to be invaluable when evaluating an existing system, the use and components of a given system, or in evaluating a system design proposed by a vendor.Installers and service personnel will benefit from the functions and possibilities that are available with the various components and by gaining an understanding of their customers' needs. Newer technicians will learn how to set up the system properly, and can familiarize themselves with the technologies that go into a CCTV system. Security equipment sales personnel will also gain a better knowledge of the customer's needs as well as learn to determine exactly what questions they should be asking the customer and what the customer's responses mean. In this manner, the book will offer invaluable tips to ensure customers get exactly what they expect in a system.
    • Handbook of Social Choice and Welfare

      • 1st Edition
      • Volume 19
      • August 15, 2002
      • Kenneth J. Arrow + 2 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 2 5 1 2
      • Hardback
        9 7 8 0 4 4 4 8 2 9 1 4 6
      • eBook
        9 7 8 0 0 8 0 9 3 3 4 8 1
      The Handbook of Social Choice and Welfare presents, in two volumes, essays on past and on-going work in social choice theory and welfare economics. The first volume consists of four parts. In Part 1 (Arrovian Impossibility Theorems), various aspects of Arrovian general impossibility theorems, illustrated by the simple majority cycle first identified by Condorcet, are expounded and evaluated. It also provides a critical survey of the work on different escape routes from impossibility results of this kind. In Part 2 (Voting Schemes and Mechanisms), the operation and performance of voting schemes and cost-sharing mechanisms are examined axiomatically, and some aspects of the modern theory of incentives and mechanism design are expounded and surveyed. In Part 3 (structure of social choice rules), the positional rules of collective decision-making (the origin of which can be traced back to a seminal proposal by Borda), the game-theoretic aspects of voting in committees, and the implications of making use of interpersonal comparisons of welfare (with or without cardinal measurability) are expounded, and the status of utilitarianism as a theory of justice is critically examined. It also provides an analytical survey of the foundations of measurement of inequality and poverty. In order to place these broad issues (as well as further issues to be discussed in the second volume of the Handbook) in perspective, Kotaro Suzumura has written an extensive introduction, discussing the historical background of social choice theory, the vistas opened by Arrow's Social Choice and Individual Values, the famous "socialist planning" controversy, and the theoretical and practical significance of social choice theory. The primary purpose of this Handbook is to provide an accessible introduction to the current state of the art in social choice theory and welfare economics. The expounded theory has a strong and constructive message for pursuing human well-being and facilitating collective decision-making.
    • Concise Encyclopedia of Language and Religion

      • 1st Edition
      • May 22, 2001
      • J.F.A. Sawyer + 1 more
      • English
      • Hardback
        9 7 8 0 0 8 0 4 3 1 6 7 3
      • Other
        9 7 8 0 0 8 0 5 0 2 7 6 2
      The Concise Encyclopedia of Language and Religion provides the specialist and the general reader with accurate, up-to-date information on every aspect of the crucial interface between language and religion. Easy access to material in over 320 articles by scholars in many fields is provided both in a clear thematic arrangement, and by means of a comprehensive and detailed general index. Discussion of many topics including the creation of special sacred scripts, religious calligraphy, and the use of religious symbols in meditation, magic and elsewhere, is enriched and elucidated by illustrations, diagrams and tables. The Concise Encyclopedia of Language and Religion brings together articles and bibliographic entries drawn from the award-winning Encyclopedia of Language and Linguistics, all of which have been revised and updated appropriately. These articles are supplemented by a large number of completely new contributions, one of which is an extensive 12,500 word article on 'Basic Concepts and Terms in Linguistics', making this volume accessible to a wide audience.
    • Hospital and Healthcare Security

      • 4th Edition
      • February 28, 2001
      • Tony W. York + 1 more
      • English
      • Hardback
        9 7 8 0 7 5 0 6 9 8 9 2 4
      • eBook
        9 7 8 0 0 8 0 4 9 5 2 8 6
      Hospital and Healthcare Security, Fourth edition, is a complete resource for healthcare protection planning and programming. The book offers thorough and fully updated coverage of the primary health and security issues hospitals and healthcare agencies face including infant protection and security, animal and research laboratory security, hospital watch programs, and the relationship between hospital security and law enforcement.Written primarily for use by the healthcare protection administrator, it also serves as a reference for any hospital security officer, supervisor or administrator. This book presents a complex and diverse security focus in a readable and understandable format.