Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Political Pressure and Economic Policy

      British Government 1970–1974
      • 1st Edition
      • Martin Holmes
      • English
      Political Pressure and Economic Policy: British Government 1970-1974 discusses the shift in British economic policy following the electoral victory of the Conservatives in 1970. It attempts to explain not just the immediate reasons for the policy reversals, but also the political context in which they were made in terms of the difficulty of sustaining the “Quiet Revolution” policies when they so clearly appeared to contradict the post-war Keynesian consensus to which the Conservative Party was still committed. The book is organized into three parts. Part I discusses the events leading up to the “Quiet Revolution,” which involved major policy reversals that led the Conservative Party towards a path radically different from the status quo. Part II examines specific policy changes such as passage of the Industrial Relations Act; the U-turn over industry policy; the “N minus 1” policy; and the “Health dilemma” strategy. Part III focuses on Mr. Edward Heath's Prime Ministerial style of Government.
    • Information Security Science

      Measuring the Vulnerability to Data Compromises
      • 1st Edition
      • Carl Young
      • English
      Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.
    • Successes and Failures of Knowledge Management

      • 1st Edition
      • Jay Liebowitz
      • English
      Successes and Failures of Knowledge Management highlights examples from across multiple industries, demonstrating where the practice has been implemented well—and not so well—so others can learn from these cases during their knowledge management journey. Knowledge management deals with how best to leverage knowledge both internally and externally in organizations to improve decision-making and facilitate knowledge capture and sharing. It is a critical part of an organization’s fabric, and can be used to increase innovation, improve organizational internal and external effectiveness, build the institutional memory, and enhance organizational agility. Starting by establishing KM processes, measures, and metrics, the book highlights ways to be successful in knowledge management institutionalization through learning from sample mistakes and successes. Whether an organization is already implementing KM or has been reluctant to do so, the ideas presented will stimulate the application of knowledge management as part of a human capital strategy in any organization.
    • Accidental Information Discovery

      Cultivating Serendipity in the Digital Age
      • 1st Edition
      • Tammera M. Race + 1 more
      • English
      Accidental Information Discovery: Cultivating Serendipity in the Digital Age provides readers with an interesting discussion on the ways serendipity—defined as the accidental discovery of valued information—plays an important role in creative problem-solving. This insightful resource brings together discussions on serendipity and information discovery, research in computer and information science, and interesting thoughts on the creative process. Five thorough chapters explore the significance of serendipity in creativity and innovation, the characteristics of serendipity-friendly tools and minds, and how future discovery environments may encourage serendipity.
    • Cyber Guerilla

      • 1st Edition
      • Jelle Van Haaster + 2 more
      • English
      Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors’ own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.
    • Crime Scene Photography

      • 3rd Edition
      • Edward M. Robinson
      • English
      Crime Scene Photography, Third Edition, covers the general principles and concepts of photography, while also delving into the more practical elements and advanced concepts of forensic photography. Robinson assists the reader in understanding and applying essential concepts in order to create images that are able to withstand challenges in court. This text is a required reading by both the International Association for Identification’s Crime Scene Certification Board and the Forensic Photography Certification Board. Includes an instructor website with lecture slides, practical exercises, a test bank, and image collection and many videos which can be used.
    • Socializing Children through Language

      • 1st Edition
      • Pamela Davis-Kean + 1 more
      • English
      Using psychological theory as a basis, Socializing Children through Language examines naturally occurring conversations between mothers and children in the context of achievement, self-regulation, food consumption, and television watching to illustrate how families of different socioeconomic means interact and discuss a variety of topics in the home. Specifically, the chapters in this book draw on enhanced audio recordings of over 40 families across a range of education and income levels to investigate how mothers’ language relates to child behaviors over time. The unique pairing of this digital observer data with empirical data on achievement tests, regulation tasks, and parenting information on the home environment collected one year later presents an altogether revolutionary way to understand and think about how family socialization works across socioeconomic levels.
    • Executing Windows Command Line Investigations

      While Ensuring Evidentiary Integrity
      • 1st Edition
      • Chet Hosmer + 2 more
      • English
      The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.
    • Participatory Health Through Social Media

      • 1st Edition
      • Shabbir Syed-Abdul + 2 more
      • English
      Participatory Health through Social Media explores how traditional models of healthcare can be delivered differently through social media and online games, and how these technologies are changing the relationship between patients and healthcare professionals, as well as their impact on health behavior change. The book also examines how the hospitals, public health authorities, and inspectorates are currently using social media to facilitate both information distribution and collection. Also looks into the opportunities and risks to record and analyze epidemiologically relevant data retrieved from the Internet, social media, sensor data, and other digital sources. The book encompasses topics such as patient empowerment, gamification and social games, and the relationships between social media, health behavior change, and health communication crisis during epidemics. Additionally, the book analyzes the possibilities of big data generated through social media. Authored by IMIA Social Media working group, this book is a valuable resource for healthcare researchers and professionals, as well as clinicians interested in using new media as part of their practice or research.
    • Data Breach Preparation and Response

      Breaches are Certain, Impact is Not
      • 1st Edition
      • Kevvie Fowler
      • English
      Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.