Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Configuring Windows 2000 without Active Directory

    • 1st Edition
    • Syngress
    • English
    Eliminate the hassles of Active Directory - install Windows 2000 without it! Windows 2000 is undoubtedly a great product. In one year after its release, Microsoft have sold have sold 10 million licenses. System administrators are praising its impressive abilities to coordinate Internet, intranet, extranets, and management applications creating a complete technical infrastructure. However, there has been a noticeable amount of organizations that are avoiding one of the most talked about features of Windows 2000 - Active Directory. The industry buzz is that Active Directory (although a great product) is a burden to implement and install and is not compatible with non Windows products like Solaris, NetWare and Linux. Configuring Windows 2000 WITHOUT Active Directory is a complete guide to installation and configuration of Windows 2000 (without Active Directory) for system administrators and network consultants. This book details not only the new features and functions of Windows 2000 but also how to integrate several features with existing Windows NT4 domains. The book does not cover the Active Directory function of Windows 2000.
  • Children at the Millennium

    Where Have We Come From? Where Are We Going?
    • 1st Edition
    • Volume 6
    • Timothy J Owens + 1 more
    • English
  • Drug-Facilitated Sexual Assault

    A Forensic Handbook
    • 1st Edition
    • Marc A. LeBeau + 1 more
    • English
    Drug-Facilitated Sexual Assault educates readers on the ways in which drugs are used as weapons in committing sexual assaults and how to successfully investigate these crimes. It looks at the history of these crimes over the years, and includes an in-depth discussion of the drugs and drug classes in use today. It describes the effects of these drugs on the victims, the process for reporting these crimes, details on the type of person who uses drugs to sexually assault an individual, and obstacles to investigating the suspect. The authors show the proper techniques in collecting and analyzing evidence; ways to overcome some of the unique difficulties encountered in these types of investigations; and how to work with other professionals to prosecute these cases successfully. The concluding appendixes are valuable samples of the necessary forms needed to complete these investigations. This book is ideal for anyone involved in investigating these crimes, including forensic scientists, law enforcement officers, lawyers, toxicologists, and medical professionals.
  • Ocean Circulation

    • 2nd Edition
    • Open Open University
    • English
    This second edition retains the general structure of the first edition, buthas been updated in the light of recent oceanographic research, and improvedas a teaching text on the basis of feedback from past students and otherreaders.Notable additions include new sections addressing the topic ofnumerical modelling, and more discussion of natural oscillations in theocean-atmosphere system (previously confined to the El Niño phenomenon). Inparticular, the Chapter on the North Atlantic now includes a discussion ofthe North Atlantic Oscillation, as well as of the Great Salinity Anomaly. Inthe final Chapter, treatment of water mass formation has been updated toreflect recent ideas about the processes involved and how they relate toclimatic change over different time-scales, from decades to millennia.
  • Blood Dynamics

    • 1st Edition
    • Anita Y. Wonder
    • English
    Today's resources on bloodstain analysis are still based on methods that were derived in the 1920s. Although medical and clinical research have provided a growing body of information on blood composition and behavior, this information has been ignored in favor of historical bloodstain analysis methods-until now. With 25 years of experience in the field, author Anita Wonder shows how to use these new methods for interpreting bloodstains, including non-Newtonian fluid behavior (a process that does not conform to Sir Isaac Newton's laws of motion) and three-dimensional dispersion modeling.Blood Dynamics focuses on how to accurately identify eight bloodstain pattern types and their permutations. It covers every aspect of bloodstain analysis, and shows how some standard practices of reconstruction are not only unnecessary for identification of blood dynamics, but can even be misleading. This book presents completely new scientific evaluations of blood dynamics and will fundamentally change the way in which bloodstains are interpreted. As such, it will be required reading for anyone who deals with blood evidence at the crime scene, in the lab, or in the courtroom.
  • Designing A Wireless Network

    • 1st Edition
    • Syngress
    • English
    Business is on the move - mobile computing must keep up!Innovative technology is making the communication between computers a cordless affair. Mobile computing with laptops, hand helds and mobile phones is increasing the demand for reliable and secure wireless networks. Network engineers and consultants need to create and build cutting-edge wireless networks in both the small business and multi-million dollar corporations.Designi... Wireless Networks provides the necessary information on how to design and implement a wireless network. Beginning with detailed descriptions of the various implementations and architectures of wireless technologies and moving to the step-by-step instructions on how to install and deploy a fixed wireless network; this book will teach users with no previous wireless networking experience how to design and build their own wireless network based on the best practices of the Enhanced Services from Lucent Technologies.
  • Palm OS Web Application Developers Guide

    Including PQA and Web Clipping
    • 1st Edition
    • Ben Combee + 3 more
    • English
    With an 80% hand-held device market-share, the Palm Organizer is the platform of choice for Mobile Internet application developers.With its decision to license the Palm OS to rival device manufacturers such as Sony, Motorola, and Handspring, Palm has further strengthened its claim as the industry standard for Mobile Computing architecture. Palm OS Web Application Developers Guide provides step-by-step instructions on how to migrate existing HTML to the Palm platform. The book will be useful for webmasters looking to convert current web pages. It is also ideal for C and Java programmers interested in building more dynamic applications from the ground up.
  • The Process of Investigation

    • 2nd Edition
    • Charles A. Sennewald + 1 more
    • English
    The Process of Investigations is co-authored by professionals with broad experience in both private and public sector investigations spanning five decades. Drawing on their extensive experience, the authors have updated and revised all chapters, targeting corporate executives, shoplifters, organized burglary rings, warehouse thieves, cashiers, workplace drug dealers, and corrupt public officials.Written for both the student and professional alike, this book compares and contrasts public and private sector enforcers, pinpoints the unique problems facing the investigator in a private agency, and provides updated case studies that illustrate the theories and techniques discussed.
  • Hack Proofing Linux

    A Guide to Open Source Security
    • 1st Edition
    • James Stanger + 1 more
    • English
    From the authors of the bestselling E-Mail Virus Protection Handbook!The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need Uses forensics-based analysis to give the reader an insight to the mind of a hacker
  • Henry Lee's Crime Scene Handbook

    • 1st Edition
    • Henry C. Lee + 2 more
    • English
    Henry Lee's Crime Scene Handbook outlines proven methods to help you collect and process physical evidence correctly, analyze it thoroughly, and understand its relevance to the case involved. It evaluates the newest chemical and instrumental techniques, and covers new areas such as forensic analysis of computers and advanced shooting scene reconstruction methods. This "must-have" guide is enhanced with dozens of color photographs, logic trees, check lists, worksheets, case studies, lists of suppliers, and more. Henry Lee has consulted on thousands of criminal cases around the world and is highly sought after to help solve difficult cases. Now he and his co-authors share more than 50 years of combined experience in this systematic approach to crime scene processing. It provides the information you need for initial training, to take with you in the field, and to refer to again and again during the course of each investigation. KEY FEATURES:* Presents a unique, systematic approach to crime scene processing * Covers in detail how to manage a crime scene, collect information, search for, collect, and preserve physical evidence, conduct field tests, and reconstruct a sequence of events * Describes how to use the latest chemical and instrumental techniques for each kind of crime scene * Outlines common problems and provides clear recommendations for overcoming them * Includes logic trees, checklists, and worksheets that help investigators evaluate the evidence in specific types of crimes