Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Fire Prevention Handbook

      • 1st Edition
      • June 6, 2016
      • Derek James
      • English
      • Hardback
        9 7 8 0 4 0 8 0 2 2 6 0 6
      • Paperback
        9 7 8 1 4 8 3 1 2 8 9 0 0
      • eBook
        9 7 8 1 4 8 3 1 6 1 3 2 7
      Fire Prevention Handbook is a handbook on fire prevention and covers topics ranging from the so-called Fire Triangle to fire extinguishers, fixed systems, fire alarms, and workforce training. Arson, highly flammable liquids and LPG, and fire insurance are also discussed. This handbook has 13 chapters and begins with an introduction to the Fire Triangle, an elegantly simple way of illustrating the three prerequisites for a blaze—heat, fuel, and oxygen—in the context of fire prevention and fire extinguishment. Attention then turns to the causes of fire, including electrical installations and apparatus, malicious or intentional ignition, and the burning of rubbish. The following chapters focus on the basic steps of fire prevention; the legal requirements that apply to fire prevention; fixed systems; and fire alarms. The training and motivation of in-house fire teams, the hazards of highly flammable liquids and LPG, fire insurance, and how to prevent arson are also considered. This text is intended for managers or supervisors of small-to-medium size industrial plants.
    • Executing Windows Command Line Investigations

      • 1st Edition
      • June 11, 2016
      • Chet Hosmer + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 2 6 8 2
      • eBook
        9 7 8 0 1 2 8 0 9 2 7 1 2
      The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.
    • Forensic Fingerprints

      • 1st Edition
      • February 3, 2016
      • Max M. Houck
      • English
      • Hardback
        9 7 8 0 1 2 8 0 0 5 7 3 6
      • eBook
        9 7 8 0 1 2 8 0 0 6 7 2 6
      Forensic Fingerprints, the latest in the Advanced Forensic Science Series which grew out of the recommendations from the 2009 NAS Report: Strengthening Forensic Science: A Path Forward, serves as a graduate level text for those studying and teaching fingerprint detection and analysis, and will also prove to be an excellent reference for forensic practitioner libraries and for use in casework. Coverage includes fingerprint science, friction ridge print examination, AFIS, foot and palm prints, and the professional issues practitioners may encounter. Edited by a world-renowned leading forensic expert, this book is a long overdue solution for the forensic science community.
    • Security Metrics Management

      • 2nd Edition
      • November 15, 2016
      • Gerald L. Kovacich + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 4 5 3 7
      • eBook
        9 7 8 0 1 2 8 0 4 5 0 0 8
      Security Metrics Management, Measuring the Effectiveness and Efficiency of a Security Program, Second Edition details the application of quantitative, statistical, and/or mathematical analyses to measure security functional trends and workload, tracking what each function is doing in terms of level of effort (LOE), costs, and productivity. This fully updated guide is the go-to reference for managing an asset protection program and related security functions through the use of metrics. It supports the security professional’s position on budget matters, helping to justify the cost-effectiveness of security-related decisions to senior management and other key decision-makers. The book is designed to provide easy-to-follow guidance, allowing security professionals to confidently measure the costs of their assets protection program - their security program - as well as its successes and failures. It includes a discussion of how to use the metrics to brief management, build budgets, and provide trend analyses to develop a more efficient and effective asset protection program.
    • Behavioral Evidence Analysis

      • 1st Edition
      • March 19, 2016
      • Brent E. Turvey + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 8 0 0 6 0 7 8
      • eBook
        9 7 8 0 1 2 8 0 0 6 2 6 9
      The criminal profiling community can easily be split into two separate groups: those that have written criminalprofiles and those that have not. It is an important distinction, because report writing is one of the mostimportant requirements of good scientific practice. The process of writing up findings helps to reveal flaws inan examiner’s logic so that they can be amended or revisited; the final report memorializes findings and theirunderlying basis at a fixed point in time; and as a document a forensic report provides the best mechanism fortransparency and peer review. The problem is that many criminal profilers have not written criminal profiles,and still more prefer that this remain the case, often to conceal their lack of methodology. The contributors to this volume have travelled the world for more than a decade to lecture on the subjects ofcrime scene analysis and criminal profiling. The result has been a steady stream of requests from educationalinstituti... and government agencies alike to teach the application of criminal profiling theory. Everyonehas read the books, everyone has attended the lecture; but few have experience with hands on practice andapplication. In other words, there is a growing number of serious professionals who want to know how to puttheory into practice and then learn what it means to put their findings into written form. Behavioral Evidence Analysis: International Forensic Practice and Protocols has been written as a companiontext to Turvey’s Criminal Profiling, now in its fourth edition. It is meant to provide the legion of instructors thatare teaching criminal profiling as a subject with real world examples of case reports. It is also meant to serveas a desk reference for professionals that are writing crime scene analysis and criminal profiling reports, toenable sampling of structure, terminology, and references.
    • Public Relations in Local Government

      • 1st Edition
      • June 6, 2016
      • Tom F. Richardson
      • English
      • Paperback
        9 7 8 1 4 8 3 1 0 6 8 4 7
      • eBook
        9 7 8 1 4 8 3 1 0 0 5 0 0
      Public Relations in Local Government discusses various topics concerning public relations in local government. The book is comprised of 16 chapters that tackle various aspects of public relations, such as technology, marketing, and contacts. The coverage of the book includes the nature of public relations, information dissemination, and division of responsibility. The text also covers the tools and methods utilized in public relations, such as establishing personal contacts and using various forms of media. The book will be of great interest to government employees who are in the public relations department.
    • The Experiential Library

      • 1st Edition
      • September 7, 2016
      • Pete McDonnell
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 7 7 5 4
      • eBook
        9 7 8 0 0 8 1 0 0 7 7 8 5
      The Experiential Library: Transforming Academic and Research Libraries through the Power of Experiential Learning features contributions—in a relatively conversational, practical, and "how-to" format—from various academic libraries across broad educational levels that have implemented experiential learning programs, services, or resources to enhance the learning and development of both students and library employees. As academic libraries and academic librarians are seeking ways to transform themselves and create collaborative synergies within and without their institutions, this timely book suggests exciting ways to integrate experiential learning into the library’s offerings. Ranging from integrated service learning and Information Literacy instruction that "takes the class out of the classroom," to unique experiential approaches to programming like Course Exhibits and the Human Library, the book is a one-stop-shop for libraries looking to expand their repertoire. It will also help them create connections between experiential learning and their institutions' missions and contributions to student success, by grounding these programs and services on a sure methodological footing. Librarians and educators wishing to learn more about the connections between experiential learning/experientia... education and academic libraries would benefit from the advice from authors in this book.
    • Report Writing for Security Personnel

      • 1st Edition
      • June 6, 2016
      • Christopher A. Hertig + 1 more
      • English
      • Paperback
        9 7 8 0 4 0 9 9 0 1 5 4 2
      • eBook
        9 7 8 1 4 8 3 1 4 1 5 4 1
    • Network Performance and Security

      • 1st Edition
      • March 9, 2016
      • Chris Chapman
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 5 8 4 9
      • eBook
        9 7 8 0 1 2 8 0 3 6 0 1 3
      Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets—such as servers, switches, hypervisor hosts, routers, and firewalls—using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits. Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices.
    • Advanced Persistent Security

      • 1st Edition
      • November 22, 2016
      • Ira Winkler + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 3 1 6 0
      • eBook
        9 7 8 0 1 2 8 0 9 3 6 5 8
      Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures. The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.