Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Becoming a Global Chief Security Executive Officer

      • 1st Edition
      • October 13, 2015
      • Roland Cloutier
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 8 2 0
      • eBook
        9 7 8 0 1 2 8 0 2 7 8 1 3
      Becoming a Global Chief Security Executive Officer provides tangible, proven, and practical approaches to optimizing the security leader’s ability to lead both today’s, and tomorrow’s, multidisciplined security, risk, and privacy function. The need for well-trained and effective executives who focus on business security, risk, and privacy has exponentially increased as the critical underpinnings of today’s businesses rely more and more on their ability to ensure the effective operation and availability of business processes and technology. Cyberattacks, e-crime, intellectual property theft, and operating globally requires sustainable security programs and operations led by executives who cannot only adapt to today’s requirements, but also focus on the future. The book provides foundational and practical methods for creating teams, organizations, services, and operations for today’s—and tomorrow’s—physical and information converged security program, also teaching the principles for alignment to the business, risk management and mitigation strategies, and how to create momentum in business operations protection.
    • Project Management for Information Professionals

      • 1st Edition
      • November 3, 2015
      • Margot Note
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 1 2 7 1
      • eBook
        9 7 8 0 0 8 1 0 0 1 3 3 2
      Aimed at practitioners, this handbook imparts guidance on project management techniques in the cultural heritage sector. Information professionals often direct complex endeavors with limited project management training or resources. Project Management for Information Professionals demystifies the tools and processes essential to successful project management and advises on how to manage the interpersonal dynamics and organizational culture that influence the effectiveness of these methods. With this book, readers will gain the knowledge to initiate, plan, execute, monitor, and close projects.
    • Hacking Web Intelligence

      • 1st Edition
      • April 13, 2015
      • Sudhanshu Chauhan + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 8 6 7 5
      • eBook
        9 7 8 0 1 2 8 0 1 9 1 2 2
      Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that is, reconnaissance—is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.
    • Cyber Security Awareness for CEOs and Management

      • 1st Edition
      • December 9, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 5 4 5
      • eBook
        9 7 8 0 1 2 8 0 5 1 1 0 8
      Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as CEOs and Management, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.
    • The Mindful Librarian

      • 1st Edition
      • November 19, 2015
      • Richard Moniz + 4 more
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 5 5 5 2
      • eBook
        9 7 8 0 0 8 1 0 0 5 6 1 3
      The Mindful Librarian: Connecting the Practice of Mindfulness to Librarianship explores mindfulness, approaching it in such a way as to relate specifically to the many roles or challenges librarians face. Coinciding with the increased need to juggle a variety of tasks, technologies, ebooks, and databases, the new Association of College & Research Libraries Framework for Information Literacy, and the challenges faced by solo librarians in school libraries which have suffered cutbacks in help in recent years, the time is exactly right for this publication. The authors hope to be helpful in some small way towards improving the joy and quality of life that librarians and library science students experience in their personal lives and jobs. The loftier goal would be to create a new lens from which to view librarianship, having a transformative impact on readers, and opening a new dialog within the profession. The topic of mindfulness is not new; it has been connected to various religious traditions in a wide variety of ways for centuries, most notably Buddhism. In the latter part of the 20th century, however, a secular version was popularized largely by the work of Jon Kabat-Zinn and his work on MBSR (Mindfulness Based Stress Reduction) at the University of Massachusetts’s Medical School. The medical benefits and the overall quality of life improvements from its adoption have exploded in recent years, in particular, the last two decades which have seen mindfulness traditions incorporated into education to a greater degree and with very positive results.
    • Essential Skills for Hackers

      • 1st Edition
      • December 9, 2015
      • Kevin Cardwell + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 5 5 2
      • eBook
        9 7 8 0 1 2 8 0 5 1 1 1 5
      Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn’t match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.
    • Customer Service in Academic Libraries

      • 1st Edition
      • October 6, 2015
      • Stephen Mossop
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 5 8 3
      • eBook
        9 7 8 1 7 8 0 6 3 4 3 9 5
      The term 'customer service' is not new to the academic library community. Academic libraries exist to serve the needs of their community, and hence customer service is essential. However, the term can be applied in a variety of ways, from a thin veneer of politeness, to an all-encompassing ethic focussing organisational and individual attention on understanding and meeting the needs of the customer. For customers, the library’s Front Line team is the ‘human face’ of the library. How well they do their job can have a massive impact on the quality of the learning experience for many students, and can directly impact upon their success. The importance of their role, and the quality of the services they offer, should not be underestimated – but in an increasingly digital world, and with potentially several thousand individuals visiting every day (whether in person or online), each with their own agendas and requirements, how can the library’s Front Line team deliver the personal service that each of these individuals need? Customer Service in Academic Libraries contributes to what academic libraries, as a community, do really well - the sharing of best practice. It brings together, in one place, examples of how Front Line teams from libraries across a wide geographical area - Hong Kong, Australia, Turkey and the United Kingdom – work to ‘get it right for their customers’. Between them, they cover a range of institutions including research-intensive, mixed HE/FE, private establishments and shared campuses. All have their own tales to tell, their own emphases, their own ways of doing things – and all bring their own examples of best practice, which it is hoped readers will find useful in their own context.
    • Information Science as an Interscience

      • 1st Edition
      • March 13, 2015
      • Fanie de Beer
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 1 4 0 0
      • eBook
        9 7 8 0 0 8 1 0 0 1 8 3 7
      Science is first and foremost an intellectual activity, an activity of thought. Therefore, how do we, as information scientists, respond intellectually to what is happening in the world of information and knowledge development, given the context of new sociocultural and knowledge landscapes? Information Science as an Interscience poses many challenges both to information science, philosophy and to information practice, and only when information science is understood as an interscience that operates in a multifaceted way, will it be able to comply with these challenges. In the fulfilment of this task it needs to be accompanied by a philosophical approach that will take it beyond the merely critical and linear approach to scientific work. For this reason a critical philosophical approach is proposed that will be characterised by multiple styles of thinking and organised by a compositional inspiration. This initiative is carried by the conviction that information science will hereby be enabled to make contributions to significant knowledge inventions that may bring about a better world. Chapters focus on the rethinking of human thinking, our unique ability that enables us to cope with the world in which we live, in terms of the unique science with which we are involved. Subsequent chapters explore different approaches to the establishment of a new scientific spirit, the demands these developments pose for human thinking, for questions of method and the implications for information science regarding its proposed functioning as a nomad science in the context of information practice and information work. Final chapters highlight the proposed responsibility of focusing on information and inventiveness and new styles of information and knowledge work.
    • The Copyright Librarian

      • 1st Edition
      • October 11, 2015
      • Linda Frederiksen
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 1 7 2 1
      • eBook
        9 7 8 0 0 8 1 0 0 2 1 1 7
      Within most libraries in the United States today there is an information professional who has become the ‘go-to’ person for grasping and grappling with copyright questions. While not an attorney, this librarian has developed an awareness and understanding of copyright law, legislation and practice as they relate to a wide variety of library activities. This practical handbook provides a broad overview of copyright librarianship. It is written for information professionals whose area of expertise, specialization or job it is to inform and educate others about the ethical use and best practices surrounding copyrighted materials It is written about the person with solid analytical skills and the ability to adapt and adjust in a rapidly changing environment; someone who can serve as an intermediary between information producers and consumers; someone who is knowledgeable about the law and providing access to information; someone who is well positioned within an organization to answer questions about copyright and provide reliable, accurate, and relevant answers, information, assistance, and guidance when needed. In short: a copyright librarian.
    • Dissecting the Hack

      • 1st Edition
      • July 20, 2015
      • Jayson E Street
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 2 7 8 6
      • eBook
        9 7 8 0 1 2 8 0 4 2 8 2 3
      Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest. "The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.