Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Emotions, Technology, and Learning

      • 1st Edition
      • Sharon Y. Tettegah + 1 more
      • English
      Research suggests two important roles of emotion related to learning and technology. First, emotion can be the key factor that is being learned or taught through technological means. Second, emotional responses with and through technology can alter what is being learned or how the content is learned. The goal of this volume is to compile and synthesize research that addresses these two perspectives by focusing on the relationship between emotion and learning as facilitated by technology. The book is divided into four sections to represent the specific interest related to emotion and learning: Theory and Overview of Emotions and Learning; Emotions and Learning Online; Technology for Emotional Pedagogy with Students; and Technology of Emotional Pedagogy with Teachers.
    • Forensic Plant Science

      • 1st Edition
      • Jane H Bock + 1 more
      • English
      Forensic botany is the application of plant science to the resolution of legal questions. A plant’s anatomy and its ecological requirements are in some cases species specific and require taxonomic verification; correct interpretation of botanical evidence can give vital information about a crime scene or a suspect or victim. The use of botanical evidence in legal investigations in North America is relatively recent. The first botanical testimony to be heard in a North American court concerned the kidnapping and murder of Charles Lindbergh’s baby boy and the conviction of Bruno Hauptmann in 1935. Today, forensic botany encompasses numerous subdisciplines of plant science, such as plant anatomy, taxonomy, ecology, palynology, and diatomology, and interfaces with other disciplines, e.g., molecular biology, limnology and oceanography.Forensi... Plant Science presents chapters on plant science evidence, plant anatomy, plant taxonomic evidence, plant ecology, case studies for all of the above, as well as the educational pathways for the future of forensic plant science.
    • The Crime Scene

      A Visual Guide
      • 1st Edition
      • Marilyn T. Miller + 1 more
      • English
      The Crime Scene: A Visual Guide provides visual instruction on the correct way to process a crime scene. While the primary crime scene comprises the area from which most of the physical evidence is retrieved by crime scene investigators (CSIs), forensic scientists, or law enforcement personnel, this book also covers secondary and often tertiary crime scenes, all locations where there is the potential for the recovery of evidence. By using photographs and other diagrams to show proper and improper procedures, the reader will learn how to identify the correct principles required to process a scene. The book presents chapters on the investigation, the varying types of documentation, and the tactics used to connect events through crime scene reconstruction using evidence The book's authors have a combined experience of over 70 years in crime scene investigation as primary responders and consultants giving testimony in all levels of the U.S. court system. In addition, both teach forensic science and crime scene investigation at the university level.
    • Operating System Forensics

      • 1st Edition
      • Ric Messier
      • English
      Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.
    • Practical Deployment of Cisco Identity Services Engine (ISE)

      Real-World Examples of AAA Deployments
      • 1st Edition
      • Andy Richter + 1 more
      • English
      With the proliferation of mobile devices and bring-your-own-devic... (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.
    • Managing eBook Metadata in Academic Libraries

      Taming the Tiger
      • 1st Edition
      • Donna E Frederick
      • English
      Managing ebook Metadata in Academic Libraries: Taming the Tiger tackles the topic of ebooks in academic libraries, a trend that has been welcomed by students, faculty, researchers, and library staff. However, at the same time, the reality of acquiring ebooks, making them discoverable, and managing them presents library staff with many new challenges. Traditional methods of cataloging and managing library resources are no longer relevant where the purchasing of ebooks in packages and demand driven acquisitions are the predominant models for acquiring new content. Most academic libraries have a complex metadata environment wherein multiple systems draw upon the same metadata for different purposes. This complexity makes the need for standards-based interoperable metadata more important than ever. In addition to complexity, the nature of the metadata environment itself typically varies slightly from library to library making it difficult to recommend a single set of practices and procedures which would be relevant to, and effective in, all academic libraries. Considering all of these factors together, it is not surprising when academic libraries find it difficult to create and manage the metadata for their ebook collections. This book is written as a guide for metadata librarians, other technical services librarians, and ancillary library staff who manage ebook collections to help them understand the requirements for ebook metadata in their specific library context, to create a vision for ebook metadata management, and to develop a plan which addresses the relevant issues in metadata management at all stages of the lifecycle of ebooks in academic libraries from selection, to deselection or preservation.
    • Theoretical and Experimental Methods for Defending Against DDoS Attacks

      • 1st Edition
      • Iraj Sadegh Amiri + 1 more
      • English
      Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim’s IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.
    • A Study of Black Hole Attack Solutions

      On AODV Routing Protocol in MANET
      • 1st Edition
      • Iraj Sadegh Amiri + 2 more
      • English
      Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.
    • Project Management for Information Professionals

      • 1st Edition
      • Margot Note
      • English
      Aimed at practitioners, this handbook imparts guidance on project management techniques in the cultural heritage sector. Information professionals often direct complex endeavors with limited project management training or resources. Project Management for Information Professionals demystifies the tools and processes essential to successful project management and advises on how to manage the interpersonal dynamics and organizational culture that influence the effectiveness of these methods. With this book, readers will gain the knowledge to initiate, plan, execute, monitor, and close projects.
    • The Invisible Librarian

      A Librarian's Guide to Increasing Visibility and Impact
      • 1st Edition
      • Aoife Lawton
      • English
      The Invisible Librarian: A Librarian's Guide to Increasing Visibility and Impact provides insights into what many librarians are feeling, including questions such as "do they feel invisible?" and "How many times have they heard somebody say ‘but everything is on the Internet’?" If you are a librarian struggling to find the best strategy for the future of the profession in a rapidly changing information environment, this book is for you. People don’t realize that librarians make information available and not just by search engine. This book will make people think differently about librarians, making a case for their value and impact that is compelling, convincing, and credible. Given their versatility and knowledge, now is the time for librarians to become champions of the information age as they improve the visibility and impact of libraries to readers, to stakeholders, and in society. By the end of the book, librarians will have a Visibility Improvement Plan to guarantee future success.