Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Surgical Research

    • 1st Edition
    • Wiley W. Souba + 1 more
    • English
    With the recent changes in the health care industry, surgeons face increasing pressure to devote their time to their clinical activities, thus limiting their research efforts. It is essential that young and creative individuals are encouraged to perform research and are given incentives to participate in research under the mentorship of more experienced research investigators.Surgic... Research is the first book to include all the information necessary for the surgical scientist to perform a research experiment. The editors have assembled outstanding, expert investigators in multiple surgical fields and asked them to describe how they achieve their research accomplishments. In Surgical Research, these experts in the field have outlined everything involved in preparing and conducting a research project. Some of the topics covered in the book include how to state a research question, how to review the available information, how to write research protocol, how to obtain grant money for the experiment, how to analyze the data, and how to present the findings. Also discussed are the ethics of animal and human experimentation along with the history and philosophy of surgical research.To continue to advance technologies and surgical methods, research must continually be performed. Potentially great discoveries are being missed because would-be researchers do not know where to start or how to conduct research, and therefore do not even try. This book provides prospective researchers with all the basic steps needed to perform a research experiment in the surgical field. No student, resident, or fellow should start a research project without this book and no senior surgical scientist should be without it occupying a prominent position in the library.
  • Designing SQL Server 2000 Databases

    • 1st Edition
    • Syngress
    • English
    The Microsoft .NET initiative is the future of e-commerce - making it possible for organisations to build a secure, reliable e-commerce infrastructure. This is the first book to outline the capabilities of SQL Server 2000, one of the key components of .NET. SQL Server 2000 introduces powerful new data mining functionality designed specifically to capture and process customer profiles and to predict future buying patterns on e-commerce sites.Designing SQL Server 2000 Databases addresses the needs of IT professionals migrating from the popular SQL 7 databases to the new SQL 2000, as well as those who are starting from scratch.
  • The Internet Security Guidebook

    From Planning to Deployment
    • 1st Edition
    • Juanita Ellis + 1 more
    • English
    The Internet Security Guidebook provides a complete analysis of an enterprise's Internet security. Strategies, steps, and procedures for conducting business securely on the Internet are discussed and reviewed. Very few organizations take the needed precautions to protect their Internet enterprise. Protection is not simply a firewall or technology; it is a strategy that encompasses risk, trust, business goals, security processes, and technology. The holistic approach offered in this book evaluates security needs in relation to business goals and the current attacks on the global Internet. The goal of The Internet Security Guidebook is to protect the business-computing environment by keeping our online enterprises functioning correctly and securely.Unlike other books available, this book contains a complete guide to Internet security that is accessible to both novices and computer professionals. The specific steps discussed and illustrated show the reader how to implement security from the individual process to the complete corporate enterprise. The reader will also learn about resources that can help such as the Computer Emergency Response Team (CERT), the Federal Bureau of Investigation (FBI), and even their own software vendors.
  • Applied Crime Analysis

    • 1st Edition
    • Karim Vellani + 1 more
    • English
    Applied Crime Analysis covers all aspects of crime analysis for private sector businesses including examining the frequency of crimes, the nature of these crimes, the day and time of the incident, the risk to a property and its inhabitants, and the objective analysis of preventative security measures in place. Applied Crime Analysis compares data sources used in conducting crime analysis and explores ways to organize statistical data, crime analysis methodologies, crime prevention theories, and methods of determining patterns and trends. By explaining the significance of crime statistics relative to crime prevention theory and techniques, the book provides readers with a clear, strategic plan to implement crime prevention programs and security resources.
  • International Handbook of Giftedness and Talent

    • 2nd Edition
    • K. A. Heller + 3 more
    • English
    The first edition of this popular reference work was published in 1993 and received critical acclaim for its achievement in bringing together international perspectives on research and development in giftedness and talent. Scholars welcomed it as the first comprehensive volume in the field and it has proved to be an indispensable resource to researchers. Since the first edition, the scholarly field of giftedness and talent studies has expanded and developed, welcoming contributions from researchers in related disciplines. Several theoretical frameworks outlined in the first edition have now been empirically tested and a number of new trends have emerged. The Second Edition of the International Handbook of Giftedness and Talent provides an invaluable research tool to academics, researchers and students interested in the field of giftedness and talent. The contributors are renowned in the field and the broad range of topics on giftedness that have been studied in the past century, right up to the late 1990s, are represented in this volume. It is truly international in scope, bringing together leading scholars and teachers from all around the world. This new edition has been fully updated and rewritten and includes 22 completely new chapters. It provides a comprehensive review and critical synthesis of significant theory; a unique cross-national perspective with contributions from over 100 distinguished authors covering 24 nations; significant contributions from scholars working in related fields; an increased focus on empirically supported scholarship; and is arranged for quick and easy reference with comprehensive subject and author indexes.
  • E-Mail Virus Protection Handbook

    Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks
    • 1st Edition
    • Syngress
    • English
    The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.
  • Building CISCO Networks for Windows 2000

    • 1st Edition
    • Syngress
    • English
    Microsoft Corporation, the world's largest software vendor, and Cisco Systems, the world's largest internetworking vendor, have jointly developed a common software interface for managing Cisco hardware on Microsoft networks: Cisco Network Services for Active Directory (CNS/AD). Until now, network administrators have been forced to master two completely different product interfaces to effectively manage their networks. Configuring Cisco Network Services for Active Directory is the first book announced for this enormous Information Technology audience. This book is a practical guide to managing CNS/AD. It focuses on how to promote system efficiency and improve network service by using CNS/AD to centralize network management, using the directory as a repository for all policies that govern network usage. The book also describes how to manage Cisco Internetworking Operating System (IOS) networking features and network resources in the same unified way as other enterprise resources, such as user access controls, files, and printers.
  • Encyclopedia of Nationalism, Two-Volume Set

    • 1st Edition
    • Alexander J. Motyl
    • English
    Nationalism has unexpectedly become a leading local and international force since the end of the Cold War. Long predicted to give way to pan-national or economic organizations, nationalism exerts its tremendous force on all continents and in a wide variety of ways. The Encyclopedia of Nationalism captures the aims and scope of this force through a wide-ranging examination of concepts, figures, movements, and events. It is the only encyclopedic study of nationalism available today.
  • Transfer of Learning

    Cognition and Instruction
    • 1st Edition
    • Volume .
    • Robert E. Haskell
    • English
    Educators and educational psychologists recognize transfer of learning as perhaps the most significant issue in all fields of instruction. Transfer of learning cuts across all educational domains, curricula, and methods. Despite its importance, research and experience clearly show that significant transfer of learning in either the classroom or in everyday life seldom occurs. Simply put, transfer of learning is illustrated by the phrases "It reminds me of..." or "It's like..." or "It's the same as...". This book addresses the fundamental problem of how past or current learning is applied and adapted to similar and/or new situations. Based on a review of the applied educational and cognitive research, as well as on the author's teaching experience with transfer of learning, this book presents a new framework for understanding and achieving transfer of learning. Current education and educational psychology textbooks either lack or lament the lack of research and guidance to educators on promoting transfer of learning. Thus this book is a necessary basis for all instruction and learning. Based on history and research, the book shows that transfer of learning is not just a technique of learning or instruction, but a way of thinking and knowing.
  • Questioned Documents

    A Lawyer's Handbook
    • 1st Edition
    • Jay Levinson
    • English
    Questioned documents are any documents that may be used as evidence in a trial, ranging from handwritten notes to counterfeit currency to contracts. This concise new handbook is designed specifically to aid lawyers involved in cases that involve questioned documents (QD) evidence. It explains the basics of document examination and helps litigators improve the way they present document evidence and question witnesses. It also provides references to professional literature and other legal sources, making it easy to find further information when needed.Questioned Documents: A Lawyer's Handbook provides analyses applied to many types of investigations and types of documents. It outlines the techniques for determining authenticity, age, ink and paper sources, handwriting identification, equipment used, forgeries, alterations, erasures, and more. In addition to helping the attorneys who mush present the QD evidence and ask the questions, this handbook is also an important resource for the expert witnesses who will be asked those questions at trial.