Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Forensic Plant Science

    • 1st Edition
    • Jane H Bock + 1 more
    • English
    Forensic botany is the application of plant science to the resolution of legal questions. A plant’s anatomy and its ecological requirements are in some cases species specific and require taxonomic verification; correct interpretation of botanical evidence can give vital information about a crime scene or a suspect or victim. The use of botanical evidence in legal investigations in North America is relatively recent. The first botanical testimony to be heard in a North American court concerned the kidnapping and murder of Charles Lindbergh’s baby boy and the conviction of Bruno Hauptmann in 1935. Today, forensic botany encompasses numerous subdisciplines of plant science, such as plant anatomy, taxonomy, ecology, palynology, and diatomology, and interfaces with other disciplines, e.g., molecular biology, limnology and oceanography.Forensi... Plant Science presents chapters on plant science evidence, plant anatomy, plant taxonomic evidence, plant ecology, case studies for all of the above, as well as the educational pathways for the future of forensic plant science.
  • The Crime Scene

    A Visual Guide
    • 1st Edition
    • Marilyn T. Miller + 1 more
    • English
    The Crime Scene: A Visual Guide provides visual instruction on the correct way to process a crime scene. While the primary crime scene comprises the area from which most of the physical evidence is retrieved by crime scene investigators (CSIs), forensic scientists, or law enforcement personnel, this book also covers secondary and often tertiary crime scenes, all locations where there is the potential for the recovery of evidence. By using photographs and other diagrams to show proper and improper procedures, the reader will learn how to identify the correct principles required to process a scene. The book presents chapters on the investigation, the varying types of documentation, and the tactics used to connect events through crime scene reconstruction using evidence The book's authors have a combined experience of over 70 years in crime scene investigation as primary responders and consultants giving testimony in all levels of the U.S. court system. In addition, both teach forensic science and crime scene investigation at the university level.
  • Managing eBook Metadata in Academic Libraries

    Taming the Tiger
    • 1st Edition
    • Donna E Frederick
    • English
    Managing ebook Metadata in Academic Libraries: Taming the Tiger tackles the topic of ebooks in academic libraries, a trend that has been welcomed by students, faculty, researchers, and library staff. However, at the same time, the reality of acquiring ebooks, making them discoverable, and managing them presents library staff with many new challenges. Traditional methods of cataloging and managing library resources are no longer relevant where the purchasing of ebooks in packages and demand driven acquisitions are the predominant models for acquiring new content. Most academic libraries have a complex metadata environment wherein multiple systems draw upon the same metadata for different purposes. This complexity makes the need for standards-based interoperable metadata more important than ever. In addition to complexity, the nature of the metadata environment itself typically varies slightly from library to library making it difficult to recommend a single set of practices and procedures which would be relevant to, and effective in, all academic libraries. Considering all of these factors together, it is not surprising when academic libraries find it difficult to create and manage the metadata for their ebook collections. This book is written as a guide for metadata librarians, other technical services librarians, and ancillary library staff who manage ebook collections to help them understand the requirements for ebook metadata in their specific library context, to create a vision for ebook metadata management, and to develop a plan which addresses the relevant issues in metadata management at all stages of the lifecycle of ebooks in academic libraries from selection, to deselection or preservation.
  • Practical Deployment of Cisco Identity Services Engine (ISE)

    Real-World Examples of AAA Deployments
    • 1st Edition
    • Andy Richter + 1 more
    • English
    With the proliferation of mobile devices and bring-your-own-devic... (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.
  • Operating System Forensics

    • 1st Edition
    • Ric Messier
    • English
    Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.
  • Project Management for Information Professionals

    • 1st Edition
    • Margot Note
    • English
    Aimed at practitioners, this handbook imparts guidance on project management techniques in the cultural heritage sector. Information professionals often direct complex endeavors with limited project management training or resources. Project Management for Information Professionals demystifies the tools and processes essential to successful project management and advises on how to manage the interpersonal dynamics and organizational culture that influence the effectiveness of these methods. With this book, readers will gain the knowledge to initiate, plan, execute, monitor, and close projects.
  • The Invisible Librarian

    A Librarian's Guide to Increasing Visibility and Impact
    • 1st Edition
    • Aoife Lawton
    • English
    The Invisible Librarian: A Librarian's Guide to Increasing Visibility and Impact provides insights into what many librarians are feeling, including questions such as "do they feel invisible?" and "How many times have they heard somebody say ‘but everything is on the Internet’?" If you are a librarian struggling to find the best strategy for the future of the profession in a rapidly changing information environment, this book is for you. People don’t realize that librarians make information available and not just by search engine. This book will make people think differently about librarians, making a case for their value and impact that is compelling, convincing, and credible. Given their versatility and knowledge, now is the time for librarians to become champions of the information age as they improve the visibility and impact of libraries to readers, to stakeholders, and in society. By the end of the book, librarians will have a Visibility Improvement Plan to guarantee future success.
  • Traffic Anomaly Detection

    • 1st Edition
    • Antonio Cuadra-Sánchez + 1 more
    • English
    Traffic Anomaly Detection presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic. As traffic varies throughout the day, it is essential to consider the concrete traffic period in which the anomaly occurs. This book presents the algorithms proposed specifically for this analysis and an empirical comparative analysis of those methods and settle a new information theory based technique, named "typical day analysis".
  • Thor's OS Xodus

    Why And How I Left Windows For OS X
    • 1st Edition
    • Timothy "Thor" Mullen
    • English
    Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with minimal downtime. The text is the most complete roadmap for entities that want to move away from Microsoft and decouple their dependency on Microsoft products. It is a perfect choice for enterprise computing, providing the ease and simplicity of a UI that can also be incredibly customized via configuration files because of its BSD core. The text, authored by Thor Mullen, the founder of the "Hammer of God" security co-op group and Principal Security Architect for a worldwide, multi-billion dollar commerce platform, provides the perfect combination of Windows and Unix.
  • Threat Assessment and Risk Analysis

    An Applied Approach
    • 1st Edition
    • Gregory Allen + 1 more
    • English
    Threat Assessment and Risk Analysis: An Applied Approach details the entire risk analysis process in accessible language, providing the tools and insight needed to effectively analyze risk and secure facilities in a broad range of industries and organizations. The book explores physical vulnerabilities in such systems as transportation, distribution, and communications, and demonstrates how to measure the key risks and their consequences, providing cost-effective and achievable methods for evaluating the appropriate security risk mitigation countermeasures. Users will find a book that outlines the processes for identifying and assessing the most essential threats and risks an organization faces, along with information on how to address only those that justify security expenditures. Balancing the proper security measures versus the actual risks an organization faces is essential when it comes to protecting physical assets. However, determining which security controls are appropriate is often a subjective and complex matter. The book explores this process in an objective and achievable manner, and is a valuable resource for security and risk management executives, directors, and students.