Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Corporate Security Management

      • 1st Edition
      • March 30, 2015
      • Marko Cabric
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 9 3 4 3
      • eBook
        9 7 8 0 1 2 8 0 2 9 3 5 0
      Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible assets, and people. The book merges business and security perspectives to help transform this often conflicted relationship into a successful and sustainable partnership. It combines security doctrine, business priorities, and best practices to uniquely answer the Who, What, Where, Why, When and How of corporate security. Corporate Security Management explores the diverse structures of security organizations in different industries. It shows the crucial corporate security competencies needed and demonstrates how they blend with the competencies of the entire organization. This book shows how to identify, understand, evaluate and anticipate the specific risks that threaten enterprises and how to design successful protection strategies against them. It guides readers in developing a systematic approach to assessing, analyzing, planning, quantifying, administrating, and measuring the security function.
    • Sustainability in Higher Education

      • 1st Edition
      • August 21, 2015
      • J. Paulo Davim
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 3 6 7 1
      • eBook
        9 7 8 0 0 8 1 0 0 3 7 5 6
      Support in higher education is an emerging area of great interest to professors, researchers and students in academic institutions. Sustainability in Higher Education provides discussions on the exchange of information between different aspects of sustainability in higher education. This book includes chapter contributions from authors who have provided case studies on various areas of education for sustainability.
    • Introduction to Homeland Security

      • 5th Edition
      • May 29, 2015
      • George Haddow + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 0 2 8 9
      • eBook
        9 7 8 0 1 2 8 0 2 0 5 6 2
      Introduction to Homeland Security: Principles of All-Hazards Risk Management, Fifth Edition, provides users with a substantially updated version of previous versions, clearly delineating the bedrock principles of preparing for, mitigating, managing, and recovering from emergencies and disasters, while also offering a balanced account of all aspects of homeland security. This new edition features coverage of the Boston Marathon bombing, analysis of the NIST Cybersecurity Framework for critical infrastructure protection, and examines the DHS “Blue Campaign” to stop human trafficking. To provide added perspective, this edition features additional “another voice” sections and examines the emergence of social media as a tool for reporting on homeland security issues.
    • Smart Grid Security

      • 1st Edition
      • August 11, 2015
      • Florian Skopik + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 1 2 2 4
      • eBook
        9 7 8 0 1 2 8 0 2 3 5 4 9
      The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times. Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.
    • Maximizing Electronic Resources Management in Libraries

      • 1st Edition
      • November 21, 2015
      • Lenore England + 1 more
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 4 7 7
      • eBook
        9 7 8 1 7 8 0 6 3 4 2 8 9
      Maximizing Electronic Resources Management in Libraries: Applying Business Process Management examines the use of Business Process Management (BPM) and the ways it can be beneficially applied to electronic resources management (ERM) to help organize processes in libraries. The book offers librarians a skillset that will make them ready for a variety of library environments. It focuses on the organizational tools offered by BPM, including key elements of ERM functions that lay the groundwork for the present and future use of ERM, and how they will drive methods by which libraries provide access to resources. BPM theories are then reviewed, along with a discussion of present applications of BPM to ERM and a final look at possibilities for future applications.
    • Selecting and Implementing an Integrated Library System

      • 1st Edition
      • October 16, 2015
      • Richard M Jost
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 1 5 3 0
      • eBook
        9 7 8 0 0 8 1 0 0 2 1 6 2
      Selecting and Implementing an Integrated Library System: The Most Important Decision You Will Ever Make focuses on the intersection of technology and management in the library information world. As information professionals, many librarians will be involved in automation projects and the management of technological changes that are necessary to best meet patron and organizational needs. As professionals, they will need to develop numerous skills, both technological and managerial, to successfully meet these challenges. This book provides a foundation for this skillset that will develop and acquaint the reader with a broad understanding of the issues involved in library technology systems. Although a major topic of the book is integrated library systems (a fundamental cornerstone of most library technology), the book also explores new library technologies (such as open source systems) that are an increasingly important component in the library technology world. Users will find a resource that is geared to the thinking and planning processes for library technology that emphasizes the development of good project management skills.
    • Evidence Found

      • 1st Edition
      • January 5, 2015
      • David Miranda
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 0 6 6 1
      • eBook
        9 7 8 0 1 2 8 0 2 0 9 4 4
      Evidence Found: An Approach to Crime Scene Investigation is not another analysis of forensic errors using an "After the Fact" or "Lessons Learned" approach but a "Before the Fact" guide that examines the thought processes that can lead to those mistakes. Plus a few extras tips and tricks from the author’s experience of over 25 years. Many high-profile crime scene investigations (and routine ones, for that matter) have suffered errors that have had negative impact on the investigation result and in the courtroom. Typically, we examine what happened and develop a useful list of what to do and what not to do, fixing the symptoms but potentially leaving ourselves open to the same error type on the next scene. The reason? Many crime scene mistakes are the result of systemic issues that are repeated due to a failure to include an evaluation of the decision-making process, including our own foundations of knowledge. Through case study and logical argument, this book attempts to provide a framework to recognize, evaluate, and alter negative decision-making patterns, including evaluating our own experience, before they negatively impact an investigation or the overall operation of a forensic unit.
    • An Emergent Theory of Digital Library Metadata

      • 1st Edition
      • August 8, 2015
      • Getaneh Alemu + 1 more
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 3 8 5 5
      • eBook
        9 7 8 0 0 8 1 0 0 4 0 1 2
      An Emergent Theory of Digital Library Metadata is a reaction to the current digital library landscape that is being challenged with growing online collections and changing user expectations. The theory provides the conceptual underpinnings for a new approach which moves away from expert defined standardised metadata to a user driven approach with users as metadata co-creators. Moving away from definitive, authoritative, metadata to a system that reflects the diversity of users’ terminologies, it changes the current focus on metadata simplicity and efficiency to one of metadata enriching, which is a continuous and evolving process of data linking. From predefined description to information conceptualised, contextualised and filtered at the point of delivery. By presenting this shift, this book provides a coherent structure in which future technological developments can be considered.
    • Keeping Religious Institutions Secure

      • 1st Edition
      • April 13, 2015
      • Jennie-Leigh McLamb
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 3 4 6 5
      • eBook
        9 7 8 0 1 2 8 0 1 4 8 8 2
      Keeping Religious Institutions Secure explores the unique vulnerabilities that churches, synagogues, and mosques face in regards to security, making them attractive to criminals who see them as easy targets. The text illustrates why all places of worship should think about security and the types of breaches that can drive people away. The book focuses on the most frequent security concerns experienced by houses of worship, including embezzlement, vandalism, assault, hate crime, and in rare cases, an active shooter—and how to help prevent them from occurring. Beginning with an overview of the basic security concepts and principles that can enhance the security of any religious facility, it then delves deeply into the particular security concerns of houses of worship, including the use of volunteers, protecting religious leaders, ensuring safety for children and teens, interacting with local law enforcement, handling the media, and much more.
    • Digital Identity Management

      • 1st Edition
      • March 24, 2015
      • Maryline Laurent + 1 more
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 0 0 4 1
      • eBook
        9 7 8 0 0 8 1 0 0 5 9 1 0
      In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society.This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analysis on the digital ID issue, it describes the different technical and legal approaches to protect digital identities with a focus on authentication systems, identity federation techniques and privacy preservation solutions. The limitations of these solutions and research issues in this field are also discussed to further understand the changes that are taking place.