Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Political Pressure and Economic Policy

      • 1st Edition
      • June 23, 2016
      • Martin Holmes
      • English
      • Paperback
        9 7 8 1 4 8 3 1 3 1 1 0 8
      • eBook
        9 7 8 1 4 8 3 1 6 3 5 2 9
      Political Pressure and Economic Policy: British Government 1970-1974 discusses the shift in British economic policy following the electoral victory of the Conservatives in 1970. It attempts to explain not just the immediate reasons for the policy reversals, but also the political context in which they were made in terms of the difficulty of sustaining the “Quiet Revolution” policies when they so clearly appeared to contradict the post-war Keynesian consensus to which the Conservative Party was still committed. The book is organized into three parts. Part I discusses the events leading up to the “Quiet Revolution,” which involved major policy reversals that led the Conservative Party towards a path radically different from the status quo. Part II examines specific policy changes such as passage of the Industrial Relations Act; the U-turn over industry policy; the “N minus 1” policy; and the “Health dilemma” strategy. Part III focuses on Mr. Edward Heath's Prime Ministerial style of Government.
    • Windows Registry Forensics

      • 2nd Edition
      • March 3, 2016
      • Harlan Carvey
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 2 9 1 6
      • eBook
        9 7 8 0 1 2 8 0 3 3 3 5 7
      Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and values that can have a significant impact on forensic investigations. Tools and techniques for post mortem analysis are discussed at length to take users beyond the current use of viewers and into real analysis of data contained in the Registry. This second edition continues a ground-up approach to understanding so that the treasure trove of the Registry can be mined on a regular and continuing basis.
    • Protecting Patient Information

      • 1st Edition
      • April 7, 2016
      • Paul Cerrato
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 3 9 2 9
      • eBook
        9 7 8 0 1 2 8 0 4 4 1 1 7
      Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tighten the information security of any healthcare IT system and reduce the risk of exposing patient health information (PHI) to the public. The book offers a systematic, 3-pronged approach for addressing the IT security deficits present in healthcare organizations of all sizes. Healthcare decision-makers are shown how to conduct an in-depth analysis of their organization’s information risk level. After this assessment is complete, the book offers specific measures for lowering the risk of a data breach, taking into account federal and state regulations governing the use of patient data. Finally, the book outlines the steps necessary when an organization experiences a data breach, even when it has taken all the right precautions.
    • The End of Wisdom?

      • 1st Edition
      • November 22, 2016
      • Wendy Evans + 1 more
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 1 4 2 4
      • eBook
        9 7 8 0 0 8 1 0 0 1 7 7 6
      The End of Wisdom? The Future of Libraries in a Digital Age assembles opinion pieces, forecasts, strategy options, and case studies from leading worldwide politicians, academics, educators, authors, publishers, captains of industry, senior public sector workers, library directors, IT gurus and other key players in the field of information provision who discuss their views on the hypothesis surrounding the "end of libraries" and the "death of books." The contributions – ranging in length from 500 to 2000 words are analyzed and summarized to create a rich picture of current trends and likely futures for libraries of all types, with digital options discussed in detail.
    • Information Security Science

      • 1st Edition
      • June 21, 2016
      • Carl Young
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 6 4 3 7
      • eBook
        9 7 8 0 1 2 8 0 9 6 4 6 8
      Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.
    • Pathways into Information Literacy and Communities of Practice

      • 1st Edition
      • September 26, 2016
      • Dora Sales + 1 more
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 6 7 3 3
      • eBook
        9 7 8 0 0 8 1 0 0 6 8 0 1
      Pathways into Information Literacy and Communities of Practice: Teaching Approaches and Case Studies considers the specific information literacy needs of communities of practice. As such, the book fills a gap in the literature, which has treated information literacy extensively, but has not applied it to the area of communities of practice. Since every community of practice generates, seeks, retrieves, and uses resources and sources related to the cognitive structure being researched or studied, and the tasks being performed, the need arises to undertake studies focused on real user communities, especially at a graduate level. This edited collection presents contributions from an international perspective on this key topic in library and information science. Contributions are arranged into two sections, the first exploring teaching and learning processes, and the second presenting case studies in communities of practice, including, but not limited to, health, research environments, college students, and higher education.
    • Presenting an Effective and Dynamic Technical Paper

      • 1st Edition
      • November 16, 2016
      • William B. Krantz
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 4 1 8 5
      • eBook
        9 7 8 0 1 2 8 0 9 4 2 5 9
      Presenting an Effective and Dynamic Technical Paper: A Guidebook for Novice and Experienced Speakers in a Multicultural World is intended for inexperienced speakers as well as those aspiring to improve their communication skills in making either formal or informal presentations on a technical subject. The book focuses on how to make presentations to a cross-cultural audience, including such tactics as how to list the names of the co-authors on your presentation, how to handle eye contact and use humor, both of which can differ across the global spectrum of cultures. The cross-cultural focus of this book relates not only to the audience, but also to the speaker. This book also includes helpful tips for non-native English speakers.
    • Effective Physical Security

      • 5th Edition
      • November 14, 2016
      • Lawrence J. Fennelly
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 4 6 2 9
      • eBook
        9 7 8 0 1 2 8 0 4 4 9 5 7
      Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the author’s work that set the standard. This book contains important coverage of environmental design, security surveys, locks, lighting, and CCTV, the latest ISO standards for risk assessment and risk management, physical security planning, network systems infrastructure, and environmental design.
    • Insider Threat

      • 1st Edition
      • May 26, 2016
      • Michael G. Gelles
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 4 1 0 2
      • eBook
        9 7 8 0 1 2 8 0 2 6 2 2 9
      Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of insider threat. This includes espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft from current or former employees. This book outlines a step-by-step path for developing an insider threat program within any organization, focusing on management and employee engagement, as well as ethical, legal, and privacy concerns. In addition, it includes tactics on how to collect, correlate, and visualize potential risk indicators into a seamless system for protecting an organization’s critical assets from malicious, complacent, and ignorant insiders. Insider Threat presents robust mitigation strategies that will interrupt the forward motion of a potential insider who intends to do harm to a company or its employees, as well as an understanding of supply chain risk and cyber security, as they relate to insider threat.
    • Beyond Mentoring

      • 1st Edition
      • November 17, 2016
      • Dawn Lowe-Wincentsen
      • English
      • Paperback
        9 7 8 0 0 8 1 0 1 2 9 4 9
      • eBook
        9 7 8 0 0 8 1 0 1 2 9 5 6
      Beyond Mentoring: A Guide for Librarians and Information Professionals looks at mentorship, mentorship programs, what works, what doesn’t, and different techniques, such as group and peer mentoring. The book considers many aspects of mentoring, various programs, and their successes and failures, going beyond the usual types of mentoring by looking at newer models. An example of the cohort model from the American Library Association Emerging Leader model is included as a case study. In addition, another case study on the Sunshine State leadership Institute provides a toolkit for building your own program. The final section of the book offers perspectives and tools that people can use in designing their own programs.