Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Building a Cisco Wireless Lan

    • 1st Edition
    • Syngress
    • English
    Enable enterprise-wide information access using Cisco wireless networksWireless networks are rapidly becoming a viable alternative to traditional wired LANs (Local Area Networks), mainly because of the convenience they provide. By implementing a wireless network, companies eliminate the need and expense of installing fixed cables, outlet ports or patch panels. Building a Cisco Wireless LAN is for individuals designing and supporting a Cisco wireless LAN. The book contains detailed information on the process for the thorough and accurate network design for the Cisco 340, 350, and UBR 7200 series. The contains detailed information on the configuration and troubleshooting of a Cisco WLAN installation. The book offers an introduction to wireless technology from the fundamental principles to the actual implementation.
  • Managing Cisco Network Security

    • 2nd Edition
    • Syngress
    • English
    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world "There's no question that attacks on enterprise networks are increasing in frequency and sophistication..." -Mike Fuhrman, Cisco Systems Manager, Security Consulting Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.
  • Hack Proofing ColdFusion

    • 1st Edition
    • Syngress
    • English
    The only way to stop a hacker is to think like one! ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance.Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications.
  • XML Net Developers Guide

    • 1st Edition
    • Syngress
    • English
    Compete with the big players in today's E-commerce marketplaceElectroni... Data Interchange (EDI) has long been the standard for large business enterprises to communicate in the B2B marketplace. However, EDI is a difficult technology - the cost and support of EDI standards is often too much for a small or medium business enterprise to bear. To compete in the current E-commerce marketplace, many organizations are beginning to take an interest in the interoperability that exists between XML (Extensible Markup Language) and EDI. XML .NET Developers Guide is written for information technology professionals responsible for supporting data management in both small and large organizations. This book appeals to both individuals working with an existing EDI environment, and small to medium businesses looking to increase their market presence by competing with current EDI players using XML/EDI.
  • Criminal Profiling

    An Introduction to Behavioral Evidence Analysis
    • 2nd Edition
    • Brent E. Turvey
    • English
    Criminal Profiling is a unique work centered on the deductive profiling method developed by the author and motivated by the limited knowledge available regarding the criminal profiling process. Deductive profiling is different from other forms of profiling in that it focuses on criminal profiling as an investigative process, solving real crime through an honest understanding of the nature and behavior of criminals. It approaches each criminal incident as its own universe of behaviors and relationships. Throughout the text, the author illustrates and emphasizes the most crucial tenet that any good criminal profiler should adhere to: the enthusiastic desire to investigate and examine the facts. This Second Edition contains the same core knowledge that made the first edition a best-seller while introducing a wealth of new material. This expanded and thoroughly revised edition includes a completely new set of case studies including the Sam Sheppard trial. New chapters include expanded coverage on false reports, psychological autopsies, criminal profiling in court, stalking, domestic homicide, sexual asphyxia, and staged crime scenes. Contributors include: John J. Baeza, Eoghan Casey, W. Jerry Chisum, Dana S. La Fon, Michael McGrath, Wayne Petherick.
  • Checkpoint Next Generation Security Administration

    • 1st Edition
    • Syngress
    • English
    Unparalleled security management that IT professionals have been waiting for.Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking user interface that meets the computer industry's Internet security requirements. The Next Generation User Interface is easy to use and offers unparalleled security management capabilities by creating a visual picture of security operations.CheckPoin... Next Generation Security Administration will be a comprehensive reference to CheckPoint's newest suite of products and will contain coverage of: Next Generation User Interface, Next Generation Management, Next Generation Performance, Next Generation VPN Clients, and Next Generation Systems. CheckPoint are a company to watch, they have captured over 50% of the VPN market and over 40% of the firewall market according to IDC ResearchOver 29,000 IT professionals are CheckPont Certified This is the first book to covers all components of CheckPoint's new suite of market-leading security products - it will be in demand!
  • Hack Proofing Your Network

    • 2nd Edition
    • Syngress
    • English
    A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including:· The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure SystemsThe central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network.
  • Hackproofing Your Wireless Network

    • 1st Edition
    • Syngress
    • English
    The only way to stop a hacker is to think like one! Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment. Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks.
  • Information Security Best Practices

    205 Basic Rules
    • 1st Edition
    • George L Stefanek
    • English
    Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their information technology managers. This book draws upon the author's years of experience in computer security to describe a set of over 200 "rules" designed to enhance the security of a computer network (and its data) and to allow quick detection of an attack and development of effective defensive responses to attacks. Both novice and experienced network administrators will find this book an essential part of their professional "tool kit." It is also essential reading for a corporate or organization manager who needs a solid understanding of the issues involved in computer security.Much literature is available on network and data security that describes security concepts, but offers so many different solutions to information security problems that it typically overwhelms both the novice and the experienced network administrator. This book presents a simple set of rules important in maintaining good information security. These rules or best practices are intended to be a recipe for setting up network and information security. This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as experienced network administrator can follow and adapt to their network and data environment.
  • Biotechnology Organizations in Action

    Turning Knowledge into Business
    • 1st Edition
    • Volume 20
    • J. Norus
    • English
    This volume analyzes the dynamics and interactive processes among the players (individuals, institutions, and organizations/firms) that have constituted and legitimized the development of the biotechnology industries. The unit of analysis is small entrepreneurial firms developing biotechnological products and processes. What types of strategies are small entrepreneurs pursuing in order to create markets for their new products and processes, and how have specific strategies emerged? The primary interest is the network process through which the technological field and the development of institutions and routines evolve and co-evolve. The theoretical contribution of the book is its focus on the development of the concept of networks. From being regarded as a relative static concept the book transforms the concept into a dynamic concept of networking. The dynamic view on the creation and development of new technologies through network formations is linked to the concept of strategy that is used throughout the book. Hence the strategies are developed along with the creation of technological knowledge, and it is hoped that the diffusion of this specific knowledge will bring new actors into the technological arena or community. This book will be useful to the academic community, those studying the formation of networks, strategic management, organizational behavior, and management of technology, as well as business observers with a specific interest in the evolution of the biotechnology industry.