Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Data Breach Preparation and Response

      • 1st Edition
      • June 8, 2016
      • Kevvie Fowler
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 4 5 1 4
      • eBook
        9 7 8 0 1 2 8 0 3 4 5 0 7
      Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.
    • Data Hiding Techniques in Windows OS

      • 1st Edition
      • September 8, 2016
      • Nihad Ahmad Hassan + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 4 4 9 0
      • eBook
        9 7 8 0 1 2 8 0 4 4 9 6 4
      "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics – it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®. This is your hands-on guide to understand, detect and use today’s most popular techniques in hiding and exploring hidden data under Windows® machines, covering all Windows® versions from XP till Windows® 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows® functions, techniques are presented in a way to easily implement them directly on your computer.
    • Changing Concepts of Crime and Its Treatment

      • 1st Edition
      • June 6, 2016
      • Hugh J. Klare
      • English
      • Paperback
        9 7 8 1 4 8 3 1 1 8 7 4 1
      • eBook
        9 7 8 1 4 8 3 1 5 1 1 6 8
      Changing Concepts of Crime and Its Treatment is a collection of essays dealing with the modern treatment of crime and how to improve it. This collection attempts to define crime according to several experts such as Dr. Morris and Mr. de Berker. T he book examines the dimensions of the crime problem and how society perceives and tolerates it. The text describes the different types of crimes such as property crime, violent crime, sexual crime, and even motoring offenses. Another paper examines the particulars of race and crime and cites genetics, legal and social views of race, and the measurement of both reported and unreported crimes. A summary of the statistics of studies made on the different races and crime is also given. The book then presents developments made in forensic psychiatry and a model of institution for treating adolescent delinquency. One paper discusses the sociology of change in penal institutions, whereby the offender needs some process of individualization to be able to help himself. The book then gives tribute to John Howard, an eminent penal reformer. This book can prove valuable for police administrators, criminologists, counselors, psychologists, lawyers, and social workers.
    • Measuring and Enhancing the Student Experience

      • 1st Edition
      • October 24, 2016
      • Mahsood Shah + 2 more
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 9 2 0 8
      • eBook
        9 7 8 0 0 8 1 0 1 0 0 4 4
      Measuring and Enhancing the Student Experience provides insights on how student experiencemeasures could be used to inform improvements at institutional, course, unit of study and teacherlevel. The book is based on a decade of research and practitioner views on ways to enhance thedesign, conduct, analysis, reporting and closing the loop on student feedback data. While the bookis largely based on Australian case studies, it provides learning experiences for other countries wherestudent experience measures are used in national and institutional quality assurance. Consisting of 13chapters, the book includes a wide range of topics including the role and purpose of student feedback,the use of student feedback in staff performance reviews, staff and student engagement, a studentfeedback and experience framework, the first year experience, use of qualitative data, engagingtransnationa... students in feedback, closing the loop on feedback, student engagement in nationalquality assurance, use of learning analytics and the future of the student experience. Mahsood Shah is an Associate Professor and Deputy Dean (Learning and Teaching) with School ofBusiness and Law at CQUniversity, Australia. In this role Mahsood is responsible for enhancing theacademic quality and standard of courses. Mahsood is also responsible for learning and teachingstrategy, governance, effective implementation of policies, and enhancement of learning and teachingoutcomes across all campuses. In providing leadership for learning and teaching, Mahsood workswith key academic leaders across all campuses to improve learning and teaching outcomes of coursesdelivered in various modes including face-to-face and online. At CQUniversity, he provides leadershipin national and international accreditation of academic courses. Mahsood is also an active researcher. His areas of research include quality in higher education,measuremen... and enhancement of student experience, student retention and attrition, studentengagement in quality assurance, international higher education, widening participation and privatehigher education. Chenicheri Sid Nair is the incoming Executive Director, Tertiary Education Commission (TEC), Mauritius.Prior to joining TEC, he was Professor, Higher Education Development at the University of WesternAustralia (UWA), Perth where his work encompassed the improvement of the institutions teachingand learning. Before this appointment to UWA, he was Quality Adviser (Research and Evaluation) inthe Centre for Higher Education Quality (CHEQ) at Monash University, Australia. He has an extensiveexpertise in the area of quality development and evaluation, and he also has considerable editorialexperience. Currently, he is Associate Editor of the International Journal of Quality Assurance inEngineering and Technology Education (IJQAETE). He was also a Managing Editor of the ElectronicJournal of Science Education (EJSE). Professor Nair is also an international consultant in a number ofcountries in quality, student voice and evaluations.
    • Urban Disasters and Resilience in Asia

      • 1st Edition
      • January 6, 2016
      • Rajib Shaw + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 1 6 9 9
      • eBook
        9 7 8 0 1 2 8 0 2 3 7 7 8
      Urban Disasters and Resilience in Asia presents the latest information on the intensity and frequency of disasters. Specifically, the fact that, in urban areas, more than 50% of the world's population is living on just 2% of the land surface, with most of these cities located in Asia and developing countries that have high vulnerability and intensification. The book offers an in-depth and multidisciplinary approach to reducing the impact of disasters by examining specific evidence from events in these areas that can be used to develop best practices and increase urban resilience worldwide. As urban resilience is largely a function of resilient and resourceful citizens, building cities which are more resilient internally and externally can lead to more productive economic returns. In an era of rapid urbanization and increasing disaster risks and vulnerabilities in Asian cities, Urban Disasters and Resilience in Asia is an invaluable tool for policy makers, researchers, and practitioners working in both public and private sectors.
    • Illinois Criminal Trial Evidence

      • 1st Edition
      • June 6, 2016
      • Ralph Ruebner
      • English
      • Paperback
        9 7 8 1 4 8 3 1 2 9 5 8 7
      • eBook
        9 7 8 1 4 8 3 1 6 2 0 0 3
      Illinois Criminal Trial Evidence is intended to assist the work of trial and appellate lawyers and judges. Illinois rules of evidence find their origins in various sources: English common law, American common law, constitutional law, Illinois statutory law, and Illinois Supreme Court rules. Illinois courts begin to selectively adopt some of the federal rules of evidence. Because Illinois is not yet an evidence code jurisdiction, it becomes more and more difficult for lawyers and judges to become thoroughly familiar with the state's rules of evidence. This book identifies those rules of evidence that are applicable to a criminal trial, explains the rules, and offers constructive criticism whenever necessary. This text also provides a table of cases used as reference on the topics discussed for each chapter. This text serves as a law school textbook or as a supplement to other law school trial and evidence publications.
    • Building a Travel Risk Management Program

      • 1st Edition
      • March 31, 2016
      • Charles Brossman
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 9 2 5 2
      • eBook
        9 7 8 0 1 2 8 0 1 9 3 8 2
      Building a Travel Risk Management Program: Traveler Safety and Duty of Care for Any Organization helps business and security professionals effectively manage traveler risk by showing them how to build a complete travel risk program. While global corporate travel risks are increasing exponentially, many security and business managers are not well-versed in the rapidly changing global landscape of travel risk, nor do they fully realize the multitude of risks their companies face if they don’t comply with their legal obligations—“duty of care"—for protecting their employees from foreseeable harm, which can cost a company in the form of extensive fines, productivity loss, business interruptions, stock price loss, litigation, and even potential bankruptcy. This book is the first to bridge the gap between the topics of travel management, security, and risk management. It serves as a reference point for working with other departments, including human resources and legal, paving the way for better internal cooperation for travel managers and security managers. In addition, it helps organizations craft a travel risk management program for their unique needs that incorporates the most important policies and procedures that help them comply with legal obligations.
    • Handbook of System Safety and Security

      • 1st Edition
      • October 2, 2016
      • Edward Griffor
      • English
      • Hardback
        9 7 8 0 1 2 8 0 3 7 7 3 7
      • eBook
        9 7 8 0 1 2 8 0 3 8 3 8 3
      Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic. The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system’s performance.
    • Health Information Exchange: Navigating and Managing a Network of Health Information Systems

      • 1st Edition
      • February 9, 2016
      • Brian Dixon
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 1 3 5 3
      • eBook
        9 7 8 0 1 2 8 0 3 1 5 0 6
      Health Information Exchange (HIE): Navigating and Managing a Network of Health Information Systems allows health professionals to appropriately access, and securely share, patients’ vital medical information electronically, thus improving the speed, quality, safety, and cost of patient care. The book presents foundational knowledge on HIE, covering the broad areas of technology, governance, and policy, providing a concise, yet in-depth, look at HIE that can be used as a teaching tool for universities, healthcare organizations with a training component, certification institutions, and as a tool for self-study for independent learners who want to know more about HIE when studying for certification exams. In addition, it not only provides coverage of the technical, policy, and organizational aspects of HIE, but also touches on HIE as a growing profession. In Part One, the book defines HIE, describing it as an emerging profession within HIT/Informatics. In Part Two, the book provides key information on the policy and governance of HIE, including stakeholder engagement, strategic planning, sustainability, etc. Part Three focuses on the technology behind HIE, defining and describing master person indexes, information infrastructure, interfacing, and messaging, etc. In Part Four, the authors discuss the value of HIE, and how to create and measure it. Finally, in Part Five, the book provides perspectives on the future of HIE, including emerging trends, unresolved challenges, etc.
    • Securing SQL Server

      • 3rd Edition
      • April 23, 2015
      • Denny Cherry
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 2 7 5 8
      • eBook
        9 7 8 0 1 2 8 0 1 3 7 5 5
      SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more.