Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Windows 2000 Server System Administration Handbook

    • 1st Edition
    • Syngress
    • English
    Many organizations and network administrators are looking for information on Windows 2000 and its new features. IT professionals responsible for installing, configuring, and managing Microsoft products will be highly motivated to migrate to this new technology, based on its promise of reducing administrative overhead.Windows 2000 Server System Administration Handbook will help NT4 professionals to administer and support the Windows 2000 Server operating system. NT administrators will be able to differentiate the features and technology changes from Windows NT 4.0 to Windows 2000. In the handbook, readers will find a complete overview of the product, catered to their needs.
  • Digital Evidence and Computer Crime

    Forensic Science, Computers, and the Internet
    • 1st Edition
    • Eoghan Casey
    • English
    Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked,collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime.This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, readers will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations.
  • Managing Windows 2000 Network Services

    • 1st Edition
    • Syngress
    • English
    Many organizations and network administrators are looking for information on Windows 2000 and its new features. IT professionals responsible for installing, configuring and managing Microsoft products will be highly motivated to migrate to this new technology, based on its promise of reducing administrative overhead.Microsoft Windows 2000 Server (the predecessor to Windows NT 4 Server) integrates network services for companies and administrators to set up and manage networks, remote access and extranets, as well as to manage other communications. Managing Windows 2000 Network Services will be the first book to focus exclusively on networking and integrated voice, video, and data on networks. Readers will learn how to deploy and integrate all Windows 2000 networking technologies within an enterprise network.
  • Research Methods for Criminology and Criminal Justice

    A Primer
    • 1st Edition
    • M. L. Dantzker + 1 more
    • English
    Research should be enjoyable - whether it is a college student completing a project for a degree or a professor meeting requirements or expectations associated with his or her position. Learning the basics for conducting research is the first step. This text is a reader-friendly primer which has as its strength the facility to positively and gently ease the reader into the task of conducting research. Each chapter begins with a vignette, describing a hypothetical situation in which students might find themselves. By chapter's end, students should be equipped with the knowledge on how to address the confusion or problem presented in the appropriate scenario. Another pedagogical tool is the Methodological Link which refers to excerpts from actual criminal justice and criminological research, the full text which is available in a companion text Readings for Research Methods in Criminology and Criminal Justice. Each chapter also ends with Methodological Queries, questions and exercises requiring students to apply what has been learned.
  • The Future of Affirmative Action

    • 1st Edition
    • Volume 17
    • K.T. Leicht
    • English
    This second volume in the series presents a coherent set of papers that deal with the challenges of leveraging information technology for designing inter-organizational relationships. Instead of assembling a set of papers that are loosely connected to the broad theme of strategy and information technology, this volume presents a well-knit compendium of papers on a coherent topic.
  • IP Addressing and Subnetting INC IPV6

    Including IPv6
    • 1st Edition
    • Syngress
    • English
    Internetworking Protocol (IP) addresses are the unique numeric identifiers required of every device connected to the Internet. They allow for the precise routing of data across very complex worldwide internetworks. The rules for their format and use are governed by the Internet Engineering Task Force (IETF) of the The Internet SOCiety (ISOC). In response to the exponential increase in demand for new IP addresses, the IETF has finalized its revision on IP addressing as IP Version 6, also know as IPng (ng = Next Generation). Key hardware vendors such as Cisco and major Internet Service Providers such as America Online have already announced plans to migrate to IP Version 6.IP address allocation within an organization requires a lot of long-term planning. This timely publication addresses the administrator and engineer's need to know how IP 6 impacts their enterprise networks.
  • Language and the Brain

    Representation and Processing
    • 1st Edition
    • Yosef Grodzinsky + 2 more
    • English
    The study of language has increasingly become an area of interdisciplinary interest. Not only is it studied by speech specialists and linguists, but by psychologists and neuroscientists as well, particularly in understanding how the brain processes meaning. This book is a comprehensive look at sentence processing as it pertains to the brain, with contributions from individuals in a wide array of backgrounds, covering everything from language acquisition to lexical and syntactic processing, speech pathology, memory, neuropsychology, and brain imaging.
  • The Drug Free Workplace

    How to Get There and Stay There
    • 1st Edition
    • John Fay
    • English
    This is a no-nonsense, practical book for helping organizations rid their workplaces of drug abuse and its serious and costly consequences. The book draws upon the collective experiences of hundreds of organizations that have said "no more, not here" and have grown stronger as a result. The path to a drug-free working environment is straight but narrow. The Drug-Free Workplace: How to Get There and Stay There delineates the path, always with a view toward avoiding missteps that can lead to trouble. Bringing a workplace back to safety and profitability is a collaborative and multi-disciplinary effort. Participation necessarily involves professionals from security, safety, human resources, and health. Central to the effort is an enlightened management. Every specialist and manager committed to developing and maintaining a drug-free workplace will find in the pages of this book a wealth of sensible, meaningful information. A drug-free workplace program cuts costs, increases productivity, reduces loss and wastage, avoids accidents, and literally saves careers, families, and lives. Much is at stake, making the drug-free program deserving of thoughtful deliberation, considerable planning, and careful implementation. Preliminary to the process is understanding the key tasks. All of the tasks are spelled out in this book.
  • Loss Prevention and Security Procedures

    Practical Applications for Contemporary Problems
    • 1st Edition
    • Robert Fischer + 1 more
    • English
    Loss Prevention and Security Procedures assists CEOs, security management and loss prevention specialists in dealing with loss. Losses in an organization may originate from a variety of threats, including natural disasters such as earthquakes, tornadoes, and flooding. However, many of the threats to our assets are posed by individuals and may include drug activity, violence, theft and fraud. Loss Prevention and Security Procedures deals specifically with these and many more problems facing today' s security conscious professional.Written from the management perspective, Loss Prevention and Security Procedures offers discernment and wisdom directed toward the philosophy of anticipatory security, before losses occur and resolving them through the most cost effective initiatives possible.
  • Security Investigations

    A Professional's Guide
    • 1st Edition
    • Larry Gene Nicholson
    • English
    Security Investigations is a comprehensive book that covers the full spectrum of investigative issues. It contains practical self-evaluation exercises that can be applied in both a formal or informal training environment. Corporate security supervisors will find it helpful in establishing policies and procedures for conducting investigations. It is a guide also for those responsible for the security function without prior experience. ie. Director of Human Resources. Forms in the book will assist an organization in standardizing the means to conduct investigations as well as reporting the outcome in a way that ensures that nothing was missed during the investigation. The real worth of an investigator is their ability to adapt to ever changing circumstances. This text gives the investigator a quick reference manual that can be used to: develop the investigation plan, take effective and accurate field notes, conduct an interview, perform surveillance and finally write the report, all within the legal guidelines outlined in the book. As an additional bonus to the reader, the book will include information on how to select and use the proper surveillance equipment.