Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Security Supervision and Management

      • 4th Edition
      • June 9, 2015
      • IFPO
      • Sandi J. Davies + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 1 1 3 4
      • eBook
        9 7 8 0 1 2 8 0 0 4 8 9 0
      Security Supervision and Management, Fourth Edition, fills the basic training needs for security professionals who want to move into supervisory or managerial positions. Covering everything needed from how to work with today’s generation security force employees to the latest advances in the security industry, Security Supervision and Management, Fourth Edition, shows security officers how to become a more efficient and well-rounded security professional. Security Supervision and Management, Fourth Edition, is also the only text needed to prepare for the Certified in Security Supervision and Management (CSSM) designation offered by International Foundation for Protection Officers (IFPO). The IFPO also publishes The Professional Protection Officer: Practical Security Strategies and Emerging Trends, now in its 8th edition.
    • Child Abuse Investigation Field Guide

      • 1st Edition
      • January 13, 2015
      • D'Michelle P. DuPre + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 3 2 7 3
      • eBook
        9 7 8 0 1 2 8 0 2 5 6 6 6
      Children are suffering from a hidden epidemic of child abuse and neglect. Every year more than 3 million reports of child abuse are made in the United States involving more than 6 million children. The United States has one of the worst records among industrialized nations – losing on average between four and seven children every day to child abuse and neglect. The WHO reports that over 40 million children, below the age of 15, are subjected to child abuse each year. Domestic violence in the home increases that risk threefold. Child Abuse Investigation Field Guide is intended to be a resource for anyone working with cases involving abuse, neglect or sexual assault of children. It is designed to be a quick reference and focuses on the best practices to use during a child abuse investigation. The guide explains the Minimal Facts Interview, the Forensic Interview, and the entire process from report to court. It is understood that every state has different statutes regarding these topics; however the objectives of recognizing, reporting, and investigating cases of this nature are the same. Just as every crime scene is different, every case involving a child is different. Best practices and standard procedures exist to help ensure cases are discovered, reported and investigated properly, to ensure good documentation is obtained to achieve prosecution and conviction. This field guide will be a useful tool for law enforcement, child protective services, social service caseworkers, child advocates, and other personnel and agencies working for the welfare of children.
    • Researching Developing Countries

      • 1st Edition
      • November 19, 2015
      • Forrest Daniel Wright
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 1 5 6 1
      • eBook
        9 7 8 0 0 8 1 0 0 2 1 7 9
      Why are some countries rich while others are poor? Why are some well governed while others experience frequent conflict? And how do you measure a country’s true success anyways? Social scientists have attempted to answer these types of questions for decades, and have increasingly turned to data for this task. Researching Developing Countries: A Data Resource Guide for Social Scientists serves as a reference guide for social scientists and students interested in answering these complex questions. The book will also be helpful to librarians serving the social science disciplines. Topics covered in the book include: human development, economics, governance, conflict, demographics, migration and refugees, environment, foreign aid, energy and infrastructure, innovation and entrepreneurship, geography and urban development, and public opinion.
    • Introduction to Social Media Investigation

      • 1st Edition
      • March 13, 2015
      • Jennifer Golbeck
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 6 5 6 5
      • eBook
        9 7 8 0 1 2 8 0 1 8 0 2 6
      If you’re interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share on these sites can be valuable for anyone interested in investigating people of interest through open, public sources. Social media as an investigative device is in its infancy and not well understood. This book presents an overview of social media and discusses special skills and techniques to use when conducting investigations. The book features hands-on tutorials and case studies and offers additional data-gathering techniques.
    • Securing Social Media in the Enterprise

      • 1st Edition
      • August 11, 2015
      • Henry Dalziel
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 1 8 0 2
      • eBook
        9 7 8 0 1 2 8 0 4 1 9 6 3
      Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.
    • Security Controls Evaluation, Testing, and Assessment Handbook

      • 1st Edition
      • December 7, 2015
      • Leighton Johnson
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 3 2 4 2
      • eBook
        9 7 8 0 1 2 8 0 2 5 6 4 2
      Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.
    • Automating Open Source Intelligence

      • 1st Edition
      • December 3, 2015
      • Robert Layton + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 9 1 6 9
      • eBook
        9 7 8 0 1 2 8 0 2 9 1 7 6
      Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. The book is beneficial to both practitioners and academic researchers, with discussions of the latest advances in applications, a coherent set of methods and processes for automating OSINT, and interdisciplinary perspectives on the key problems identified within each discipline. Drawing upon years of practical experience and using numerous examples, editors Robert Layton, Paul Watters, and a distinguished list of contributors discuss Evidence Accumulation Strategies for OSINT, Named Entity Resolution in Social Media, Analyzing Social Media Campaigns for Group Size Estimation, Surveys and qualitative techniques in OSINT, and Geospatial reasoning of open data.
    • Practical Deployment of Cisco Identity Services Engine (ISE)

      • 1st Edition
      • November 12, 2015
      • Andy Richter + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 4 5 7 5
      • eBook
        9 7 8 0 1 2 8 0 4 5 0 4 6
      With the proliferation of mobile devices and bring-your-own-devic... (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.
    • Research 2.0 and the Future of Information Literacy

      • 1st Edition
      • November 24, 2015
      • Tibor Koltay + 2 more
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 0 7 5 5
      • eBook
        9 7 8 0 0 8 1 0 0 0 8 9 2
      Research 2.0 and the Future of Information Literacy examines possible congruencies between information literacy and Research 2.0, because the work of today’s researcher mobilizes a number of literacies. From among the various types of relevant literacies, at least three types of literacies can be mentioned in this relation: information literacy, scientific literacy and academic literacy. This book addresses these literacies in the light of the changing research landscape. Broad contexts of the researcher’s abilities, as adaptive and innovative thinking, problem solving skills, self-management and design mindset are also examined. Computational thinking and the computational paradigm in a number of fields of research are taken into consideration, as well. Researchers differ to non-researchers when populating social media, which means that these two different groups require different literacies. The relationship between information literacy and information is approached in a new way. Among the multitude of issues, we introduce a new interface between information literacy and Research 2.0. It encompasses the issues of research data management and data literacy, which represent also a challenge both for the academic library and for the communities of researchers. Similarly, the questions of new metrics of scientific output are addressed in the book.
    • Widening Higher Education Participation

      • 1st Edition
      • October 19, 2015
      • Mahsood Shah + 2 more
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 2 1 3 1
      • eBook
        9 7 8 0 0 8 1 0 0 2 4 6 9
      Governments have introduced policies to widen the participation of disadvantaged students in higher education. Widening participation policies are also introduced to ensure that higher education contributes to social and economic outcomes. This book includes important insights from 23 leading scholars across 11 countries on a wide range of topics that focus on government policies, institutional structures and the social and economic impacts of widening participation. While widening participation policies and outcomes in developed countries are more widely documented, the policies, achievements, and challenges in other countries such as Brazil, China, Indonesia, South Africa and Palestine are not so widely disseminated. Therefore, the ‘untold stories’ of policies and outcomes of widening participation are a key part of this book. The chapters are organised according to three overarching themes, which include national and transnational studies of the history of widening participation and current policies; inclusive learning and academic outcomes; and socioeconomic structures, concepts and theories.