Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Managing Medical Devices within a Regulatory Framework

      • 1st Edition
      • Beth Ann Fiedler
      • English
      Managing Medical Devices within a Regulatory Framework helps administrators, designers, manufacturers, clinical engineers, and biomedical support staff to navigate worldwide regulation, carefully consider the parameters for medical equipment patient safety, anticipate problems with equipment, and efficiently manage medical device acquisition budgets throughout the total product life cycle. This contributed book contains perspectives from industry professionals and academics providing a comprehensive look at health technology management (HTM) best practices for medical records management, interoperability between and among devices outside of healthcare, and the dynamics of implementation of new devices. Various chapters advise on how to achieve patient confidentiality compliance for medical devices and their software, discuss legal issues surrounding device use in the hospital environment of care, the impact of device failures on patient safety, methods to advance skillsets for HTM professionals, and resources to assess digital technology. The authors bring forth relevant challenges and demonstrate how management can foster increased clinical and non-clinical collaboration to enhance patient outcomes and the bottom line by translating the regulatory impact on operational requirements.
    • Data Hiding Techniques in Windows OS

      A Practical Approach to Investigation and Defense
      • 1st Edition
      • Nihad Ahmad Hassan + 1 more
      • English
      "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics – it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®. This is your hands-on guide to understand, detect and use today’s most popular techniques in hiding and exploring hidden data under Windows® machines, covering all Windows® versions from XP till Windows® 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows® functions, techniques are presented in a way to easily implement them directly on your computer.
    • The Experiential Library

      Transforming Academic and Research Libraries through the Power of Experiential Learning
      • 1st Edition
      • Pete McDonnell
      • English
      The Experiential Library: Transforming Academic and Research Libraries through the Power of Experiential Learning features contributions—in a relatively conversational, practical, and "how-to" format—from various academic libraries across broad educational levels that have implemented experiential learning programs, services, or resources to enhance the learning and development of both students and library employees. As academic libraries and academic librarians are seeking ways to transform themselves and create collaborative synergies within and without their institutions, this timely book suggests exciting ways to integrate experiential learning into the library’s offerings. Ranging from integrated service learning and Information Literacy instruction that "takes the class out of the classroom," to unique experiential approaches to programming like Course Exhibits and the Human Library, the book is a one-stop-shop for libraries looking to expand their repertoire. It will also help them create connections between experiential learning and their institutions' missions and contributions to student success, by grounding these programs and services on a sure methodological footing. Librarians and educators wishing to learn more about the connections between experiential learning/experientia... education and academic libraries would benefit from the advice from authors in this book.
    • Coding for Penetration Testers

      Building Better Tools
      • 2nd Edition
      • Jason Andress + 1 more
      • English
      Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.
    • Eleventh Hour CISSP®

      Study Guide
      • 3rd Edition
      • Joshua Feldman + 2 more
      • English
      Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.
    • Intelligent Vehicular Networks and Communications

      Fundamentals, Architectures and Solutions
      • 1st Edition
      • Anand Paul + 3 more
      • English
      Intelligent Vehicular Network and Communications: Fundamentals, Architectures and Solutions begins with discussions on how the transportation system has transformed into today’s Intelligent Transportation System (ITS). It explores the design goals, challenges, and frameworks for modeling an ITS network, discussing vehicular network model technologies, mobility management architectures, and routing mechanisms and protocols. It looks at the Internet of Vehicles, the vehicular cloud, and vehicular network security and privacy issues. The book investigates cooperative vehicular systems, a promising solution for addressing current and future traffic safety needs, also exploring cooperative cognitive intelligence, with special attention to spectral efficiency, spectral scarcity, and high mobility. In addition, users will find a thorough examination of experimental work in such areas as Controller Area Network protocol and working function of On Board Unit, as well as working principles of roadside unit and other infrastructural nodes. Finally, the book examines big data in vehicular networks, exploring various business models, application scenarios, and real-time analytics, concluding with a look at autonomous vehicles.
    • Navigation Design and SEO for Content-Intensive Websites

      A Guide for an Efficient Digital Communication
      • 1st Edition
      • Mario Pérez-Montoro + 1 more
      • English
      Navigation Design and SEO for Content-Intensive Websites: A Guide for an Efficient Digital Communication presents the characteristics and principal guidelines for the analysis and design of efficient navigation and information access systems on content-intensive websites, such as magazines and other media publications. Furthermore, the book aims to present the tools of information processing, including information architecture (IA) and content categorization systems, so that such designs can ensure a good navigation experience based on the semantic relations between content items. The book also presents best practices in the design of information access systems with regard to their main structures, including search query forms and search result pages. Finally, the book describes the foundations of search engine optimization (SEO), emphasizing SEO oriented to publications focused on communication and the coverage of current affairs, including images and videos.
    • The Basics of Cyber Safety

      Computer and Mobile Device Safety Made Easy
      • 1st Edition
      • John Sammons + 1 more
      • English
      The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to—or themselves—secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.
    • Intelligent Data Analysis for e-Learning

      Enhancing Security and Trustworthiness in Online Learning Systems
      • 1st Edition
      • Jorge Miguel + 2 more
      • English
      Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct—most notably cheating—however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time. The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS
    • Cathedrals of Learning

      Great and Ancient Universities of Western Europe
      • 1st Edition
      • Blaise Cronin
      • English
      Cathedrals of Learning: Great and Ancient Universities of Western Europe provides a conspectus of the great Western European universities, pithily tells their life stories, showcases their architectural heritage, and describes the art, literary, and natural history collections they have accumulated over the centuries. This book profiles the ancient universities and their distinctive organizational cultures, reveals their customs, ceremonies, and traditions, their quirks and quiddities, recounts their complicated histories, describes their architectural wonders (libraries, museums, anatomy theaters, botanical gardens) and treasures (rare manuscripts, antiquities, paintings, and objects d’art of all kinds), and introduces their famous alumni, distinguished scholars, Nobel Prize-winning scientists, and famously eccentric personalities. It is a book for scholars, researchers, and anyone interested in these ancient institutions that remain centers of learning in the contemporary world.