Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Knowledge Management in Libraries

    Concepts, Tools and Approaches
    • 1st Edition
    • July 24, 2016
    • Mohammad Nazim + 1 more
    • English
    Knowledge Management in Libraries: Concepts, Tools and Approaches brings to the forefront the increasing recognition of the value of knowledge and information to individuals, organizations, and communities, providing an analysis of the concepts of Knowledge Management (KM) that prevails among the Library and Information Science (LIS) community. Thus, the book explores knowledge management from the perspective of LIS professionals. Furthermore, unlike most books on the topic, which address it almost exclusively in the context of a firm or an organization to help gain a competitive advantage, this book looks at knowledge management in the context of not for profit organizations such as libraries.
  • Discover Digital Libraries

    Theory and Practice
    • 1st Edition
    • July 21, 2016
    • Iris Xie + 1 more
    • English
    Discover Digital Libraries: Theory and Practice is a book that integrates both research and practice concerning digital library development, use, preservation, and evaluation. The combination of current research and practical guidelines is a unique strength of this book. The authors bring in-depth expertise on different digital library issues and synthesize theoretical and practical perspectives relevant to researchers, practitioners, and students. The book presents a comprehensive overview of the different approaches and tools for digital library development, including discussions of the social and legal issues associated with digital libraries. Readers will find current research and the best practices of digital libraries, providing both US and international perspectives on the development of digital libraries and their components, including collection, digitization, metadata, interface design, sustainability, preservation, retrieval, and evaluation of digital libraries.
  • Practical Aviation Security

    Predicting and Preventing Future Threats
    • 3rd Edition
    • July 20, 2016
    • Jeffrey Price + 1 more
    • English
    Practical Aviation Security: Predicting and Preventing Future Threats, Third Edition is a complete guide to the aviation security system, from crucial historical events to the policies, policymakers, and major terrorist and criminal acts that have shaped the procedures in use today, as well as the cutting edge technologies that are shaping the future. This text equips readers working in airport security or other aviation management roles with the knowledge to implement effective security programs, meet international guidelines, and responsibly protect facilities or organizations of any size. Using case studies and practical security measures now in use at airports worldwide, readers learn the effective methods and the fundamental principles involved in designing and implementing a security system. The aviation security system is comprehensive and requires continual focus and attention to stay a step ahead of the next attack. Practical Aviation Security, Third Edition, helps prepare practitioners to enter the industry and helps seasoned professionals prepare for new threats and prevent new tragedies.
  • Audio Content Security

    Attack Analysis on Audio Watermarking
    • 1st Edition
    • July 16, 2016
    • Sogand Ghorbani + 1 more
    • English
    Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An additional aspect of this study tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking.
  • Library Consortia

    Practical Guide for Library Managers
    • 1st Edition
    • July 13, 2016
    • Aditya Tripathi + 1 more
    • English
    Libraries are burdened with increased demand for resources and services and inflating expectations against shrinking or stagnant budgets. An individual library cannot cope with the situation. Hence, libraries form alliances for cooperation and sharing. Emerging changes in the publishing industry are phenomenal and have forced libraries to move toward a strategic partnership called library consortia. Information technology has played a vital role in developing such partnerships. Publishers offer packages of resources to library consortia benefitting all member libraries. Library consortia protect the interests of individual members while considering the business interests of publishers. This book is a start-up guide to libraries and librarians desiring to form library consortia. It covers the various facets of library consortia and corresponding activities. The chapters are presented with different consortia models, formations, business negotiations and various licensing schemes.
  • Working with Text

    Tools, Techniques and Approaches for Text Mining
    • 1st Edition
    • July 12, 2016
    • Emma Tonkin + 1 more
    • English
    What is text mining, and how can it be used? What relevance do these methods have to everyday work in information science and the digital humanities? How does one develop competences in text mining? Working with Text provides a series of cross-disciplinary perspectives on text mining and its applications. As text mining raises legal and ethical issues, the legal background of text mining and the responsibilities of the engineer are discussed in this book. Chapters provide an introduction to the use of the popular GATE text mining package with data drawn from social media, the use of text mining to support semantic search, the development of an authority system to support content tagging, and recent techniques in automatic language evaluation. Focused studies describe text mining on historical texts, automated indexing using constrained vocabularies, and the use of natural language processing to explore the climate science literature. Interviews are included that offer a glimpse into the real-life experience of working within commercial and academic text mining.
  • Overcoming Information Poverty

    Investigating the Role of Public Libraries in The Twenty-First Century
    • 1st Edition
    • July 6, 2016
    • Anthony Mckeown
    • English
    Overcoming Information Poverty: Investigating the Role of Public Libraries in The Twenty-First Century considers the role of public libraries in alleviating information poverty and targeting social exclusion, using a three-level information poverty framework. The book proposes a model for understanding the concept of information poverty, develops indicators for its measurement, and provides recommendations for service improvement based on analysis of public library services at macro (strategic), meso (community) and micro (individual) levels. The topic is of theoretical and practical importance when considering the changing role of public libraries today. The book is the first time a macro, meso, and micro model of information poverty indicators has been developed and applied to illustrate the impact of public libraries at strategic, community, and personal levels.
  • Certifiable Software Applications 1

    Main Processes
    • 1st Edition
    • July 4, 2016
    • Jean-Louis Boulanger
    • English
    Certifiable Software Applications 1: Main Processes is dedicated to the establishment of quality assurance and safety assurance. It establishes the context for achieving a certifiable software application. In it, the author covers recent developments such as the module, component and product line approach. Applicable standards are presented and security principles are described and discussed. Finally, the requirements for mastering quality and configuration are explained. In this book the reader will find the fundamental practices from the field and an introduction to the concept of software application.
  • Political Pressure and Economic Policy

    British Government 1970–1974
    • 1st Edition
    • June 23, 2016
    • Martin Holmes
    • English
    Political Pressure and Economic Policy: British Government 1970-1974 discusses the shift in British economic policy following the electoral victory of the Conservatives in 1970. It attempts to explain not just the immediate reasons for the policy reversals, but also the political context in which they were made in terms of the difficulty of sustaining the “Quiet Revolution” policies when they so clearly appeared to contradict the post-war Keynesian consensus to which the Conservative Party was still committed. The book is organized into three parts. Part I discusses the events leading up to the “Quiet Revolution,” which involved major policy reversals that led the Conservative Party towards a path radically different from the status quo. Part II examines specific policy changes such as passage of the Industrial Relations Act; the U-turn over industry policy; the “N minus 1” policy; and the “Health dilemma” strategy. Part III focuses on Mr. Edward Heath's Prime Ministerial style of Government.
  • Information Security Science

    Measuring the Vulnerability to Data Compromises
    • 1st Edition
    • June 21, 2016
    • Carl Young
    • English
    Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.