Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • A Global Perspective on Private Higher Education

      • 1st Edition
      • Mahsood Shah + 1 more
      • English
      A Global Perspective on Private Higher Education provides a timely review of the significant growth of private higher education in many parts of the world during the last decade. The book is concurrent with significant changes in the external operating environment of private higher education, including government policy and its impact on the ongoing growth of the sector. The title brings together the trends relating to the growth and the decline of private higher education providers, also including the key contributing factors of the changes from 17 countries.
    • Behavioral Evidence Analysis

      International Forensic Practice and Protocols
      • 1st Edition
      • Brent E. Turvey + 1 more
      • English
      The criminal profiling community can easily be split into two separate groups: those that have written criminalprofiles and those that have not. It is an important distinction, because report writing is one of the mostimportant requirements of good scientific practice. The process of writing up findings helps to reveal flaws inan examiner’s logic so that they can be amended or revisited; the final report memorializes findings and theirunderlying basis at a fixed point in time; and as a document a forensic report provides the best mechanism fortransparency and peer review. The problem is that many criminal profilers have not written criminal profiles,and still more prefer that this remain the case, often to conceal their lack of methodology. The contributors to this volume have travelled the world for more than a decade to lecture on the subjects ofcrime scene analysis and criminal profiling. The result has been a steady stream of requests from educationalinstituti... and government agencies alike to teach the application of criminal profiling theory. Everyonehas read the books, everyone has attended the lecture; but few have experience with hands on practice andapplication. In other words, there is a growing number of serious professionals who want to know how to puttheory into practice and then learn what it means to put their findings into written form. Behavioral Evidence Analysis: International Forensic Practice and Protocols has been written as a companiontext to Turvey’s Criminal Profiling, now in its fourth edition. It is meant to provide the legion of instructors thatare teaching criminal profiling as a subject with real world examples of case reports. It is also meant to serveas a desk reference for professionals that are writing crime scene analysis and criminal profiling reports, toenable sampling of structure, terminology, and references.
    • Maritime Security

      An Introduction
      • 2nd Edition
      • Michael McNicholas
      • English
      Maritime Security: An Introduction, Second Edition, provides practical, experience-based, and proven knowledge - and a "how-to-guide" - on maritime security. McNicholas explains in clear language how commercial seaports and vessels function; what threats currently exist; what security policies, procedures, systems, and measures must be implemented to mitigate these threats; and how to conduct ship and port security assessments and plans. Whether the problem is weapons of mass destruction or cargo theft, Maritime Security provides invaluable guidance for the professionals who protect our shipping and ports. New chapters focus on whole government maritime security, UN legal conventions and frameworks, transnational crime, and migration. Updates throughout will provide the latest information in increasingly important field.
    • Lessons in Library Leadership

      A Primer for Library Managers and Unit Leaders
      • 1st Edition
      • Corey Halaychik
      • English
      Lessons in Library Leadership: A Primer for Library Managers and Unit Leaders takes on the topic of management positions within libraries and how many of them are filled by candidates with no formalized training. This lack of preparation often leads to added stress as they scramble to learn how to lead, to formulate departmental goals, to conduct effective assessment, to think and plan strategically, to counsel employees, and much more. This book will serve equally as a primer for librarians new to management and those needing a refresher in basic management concepts. Seasoned managers may also look to this guide as a quick reference resource covering multiple management subjects. The contents of the monograph include basic concepts, real word examples/case studies, and bibliographic information for further management skill development.
    • Hiding Behind the Keyboard

      Uncovering Covert Communication Methods with Forensic Analysis
      • 1st Edition
      • Brett Shavers + 1 more
      • English
      Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.
    • Forensic Epidemiology

      Principles and Practice
      • 1st Edition
      • Michael Freeman + 1 more
      • English
      It is an inescapable fact that causation, both generally (in populations), and specifically (in individuals), cannot be observed. Rather, causation is determined when it can be inferred that the risk of an observed injury or disease from a plausible cause is greater than the risk from other plausible causes. While many causal evaluations performed in forensic medicine are simplified by the fact that the circumstances surrounding the onset of an injury or disease clearly rules out competing causes (eg, a death following a fall), there are many cases that present a more complicated picture. It is these types of investigations, in which an analysis of comparative levels of risk from competing causes is needed to arrive at a reliable and accurate determination of the most likely cause, that forensic epidemiology (FE) is directed at.In Forensic Epidemiology, the authors present the legal and scientific theories underlying the methods by which risk is used in the investigation of individual causation. Methods and principles from epidemiology are combined with those from a multitude of other disciplines, including general medicine, pharmacology, forensic pathology, biostatistics, and biomechanics, inter alia, as a basis for investigating the plausibility of injury and disease exposures and mechanisms. The ultimate determination of the probability of causation (PC) results from an assessment of the strength of association of the investigated relationship in the individual, based on a comparison between the risk of disease or injury from the investigated exposure versus the risk of the same disease or injury occurring at the same point in time in the individual, but absent the exposure. The principles and methods described in Forensic Epidemiology will be of interest to those who work and study in the fields of forensic medicine, epidemiology, and the law.
    • Network Performance and Security

      Testing and Analyzing Using Open Source and Low-Cost Tools
      • 1st Edition
      • Chris Chapman
      • English
      Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets—such as servers, switches, hypervisor hosts, routers, and firewalls—using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits. Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices.
    • Windows Registry Forensics

      Advanced Digital Forensic Analysis of the Windows Registry
      • 2nd Edition
      • Harlan Carvey
      • English
      Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and values that can have a significant impact on forensic investigations. Tools and techniques for post mortem analysis are discussed at length to take users beyond the current use of viewers and into real analysis of data contained in the Registry. This second edition continues a ground-up approach to understanding so that the treasure trove of the Registry can be mined on a regular and continuing basis.
    • The Fortuitous Teacher

      A Guide to Successful One-Shot Library Instruction
      • 1st Edition
      • Sarah Cisse
      • English
      The Fortuitous Teacher: A Guide to Successful One-Shot Library Instruction discusses how librarians have become accidental teachers in the academic university setting. It covers how (if at all) librarians are prepared by MILS programs to teach, compares typical characteristics of teachers versus librarians, and presents tactics on how to learn effective teaching skills on the job. In addition, readers will learn about the history of library instruction, the different types of library instruction, and the dynamics of one-shot library instruction, classroom culture, faculty buy-in, and collaboration.
    • Implementing Digital Forensic Readiness

      From Reactive to Proactive Process
      • 1st Edition
      • Jason Sachowski
      • English
      Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization’s business operations and information security’s program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents. It also explains how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the administrative, technical, and physical elements included throughout this book will enhance the relevance and credibility of digital evidence. Learn how to document the available systems and logs as potential digital evidence sources, how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner. This book offers standard operating procedures to document how an evidence-based presentation should be made, featuring legal resources for reviewing digital evidence.