Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Firearm and Toolmark Examination and Identification

      • 1st Edition
      • October 17, 2015
      • Max M. Houck
      • English
      • Hardback
        9 7 8 0 1 2 8 0 0 5 6 6 8
      • eBook
        9 7 8 0 1 2 8 0 0 6 2 2 1
      The Advanced Forensic Science Series grew out of the recommendations from the 2009 NAS Report: "Strengthening Forensic Science: A Path Forward." This volume, Firearm and Toolmark Examination and Identification, will serve as a graduate-level text for those studying and teaching firearm and toolmark examination and identification. It will also prove an excellent reference for forensic practitioner’s libraries or use in their casework. Coverage includes a wide variety of tools and toolmarks, analysis of gunshots, ammunition, gunshot wounds and professional issues they may encounter.
    • Succession Planning in Canadian Academic Libraries

      • 1st Edition
      • October 6, 2015
      • Janneka Guise
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 1 4 6 2
      • eBook
        9 7 8 0 1 2 8 0 2 3 7 2 3
      Succession Planning in Canadian Academic Libraries explores the current Canadian academic library environment, and the need for succession planning in that environment. The literature review demonstrates the lack of reported succession planning activities in Canadian academic libraries. Site visits and in-depth interviews with professional librarians at six libraries across Canada highlight best practices and barriers to succession planning. These best practices and barriers are addressed in individual chapters, with tips and strategies for library leaders.
    • Theoretical and Experimental Methods for Defending Against DDoS Attacks

      • 1st Edition
      • November 10, 2015
      • Iraj Sadegh Amiri + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 3 9 1 1
      • eBook
        9 7 8 0 1 2 8 0 5 3 9 9 7
      Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim’s IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.
    • Entity Information Life Cycle for Big Data

      • 1st Edition
      • April 20, 2015
      • John R. Talburt + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 5 3 7 8
      • eBook
        9 7 8 0 1 2 8 0 0 6 6 5 8
      Entity Information Life Cycle for Big Data walks you through the ins and outs of managing entity information so you can successfully achieve master data management (MDM) in the era of big data. This book explains big data’s impact on MDM and the critical role of entity information management system (EIMS) in successful MDM. Expert authors Dr. John R. Talburt and Dr. Yinle Zhou provide a thorough background in the principles of managing the entity information life cycle and provide practical tips and techniques for implementing an EIMS, strategies for exploiting distributed processing to handle big data for EIMS, and examples from real applications. Additional material on the theory of EIIM and methods for assessing and evaluating EIMS performance also make this book appropriate for use as a textbook in courses on entity and identity management, data management, customer relationship management (CRM), and related topics.
    • Business Espionage

      • 1st Edition
      • March 18, 2015
      • Bruce Wimmer CPP
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 0 5 4 8
      • eBook
        9 7 8 0 1 2 4 2 0 0 5 9 3
      Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected. Drawn from the author’s 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage.
    • The Crime Scene

      • 1st Edition
      • November 14, 2015
      • Marilyn T. Miller + 1 more
      • English
      • eBook
        9 7 8 0 1 2 8 0 1 3 5 8 8
      The Crime Scene: A Visual Guide provides visual instruction on the correct way to process a crime scene. While the primary crime scene comprises the area from which most of the physical evidence is retrieved by crime scene investigators (CSIs), forensic scientists, or law enforcement personnel, this book also covers secondary and often tertiary crime scenes, all locations where there is the potential for the recovery of evidence. By using photographs and other diagrams to show proper and improper procedures, the reader will learn how to identify the correct principles required to process a scene. The book presents chapters on the investigation, the varying types of documentation, and the tactics used to connect events through crime scene reconstruction using evidence The book's authors have a combined experience of over 70 years in crime scene investigation as primary responders and consultants giving testimony in all levels of the U.S. court system. In addition, both teach forensic science and crime scene investigation at the university level.
    • Operational Policy Making for Professional Security

      • 1st Edition
      • September 9, 2015
      • Allen Sondej
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 6 2 8 2
      • eBook
        9 7 8 0 1 2 8 0 1 7 8 8 3
      Operational Policy Making for Professional Security: Practical Policy Skills for the Public and Private Sector is a clear, concise, and practical resource for drafting effective, legally defensible security policies. Presented in a clear, step-by-step style that can be tailored to fit the smallest organization to the largest, the book offers the strategies needed for reducing risk through solid policy construction. It is the first book available that provides a step-by-step guide to basic security policy construction, along with helpful hints on how to draft a document that conveys exactly what is intended. The book explores common policy creation pitfalls and how to avoid them, outlining proven methods for implementing and disseminating effective policies throughout any organization. Discussing the core security and safety policies that no organization should operate without, the book covers common types of policies, along with the pros and cons of different policy-making methodologies. It is a one-stop reference on functional security policy-making for organizational leaders.
    • Thor's OS Xodus

      • 1st Edition
      • October 28, 2015
      • Timothy "Thor" Mullen
      • English
      • Paperback
        9 7 8 0 1 2 4 1 0 4 6 3 1
      • eBook
        9 7 8 0 1 2 4 1 0 5 0 6 5
      Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with minimal downtime. The text is the most complete roadmap for entities that want to move away from Microsoft and decouple their dependency on Microsoft products. It is a perfect choice for enterprise computing, providing the ease and simplicity of a UI that can also be incredibly customized via configuration files because of its BSD core. The text, authored by Thor Mullen, the founder of the "Hammer of God" security co-op group and Principal Security Architect for a worldwide, multi-billion dollar commerce platform, provides the perfect combination of Windows and Unix.
    • Professional Issues in Forensic Science

      • 1st Edition
      • April 15, 2015
      • Max M. Houck
      • English
      • Hardback
        9 7 8 0 1 2 8 0 0 5 6 7 5
      • eBook
        9 7 8 0 1 2 8 0 0 6 2 3 8
      Professional Issues in Forensic Science will introduce students to various topics they will encounter within the field of Forensic Science. Legal implications within the field will focus on expert witness testimony and procedural rules defined by both legislative statute and court decisions. These decisions affect the collection, analysis, and court admissibility of scientific evidence, such as the Frye and Daubert standards and the Federal Rules of Evidence. Existing and pending Forensic Science legislation will be covered, including laws governing state and national DNA databases. Ethical concerns stemming from the day-to-day balancing of competing priorities encountered by the forensic student will be discussed. Such competing priorities may cause conflicts between good scientific practice and the need to expedite work, meet legal requirements, and satisfy client’s wishes. The role of individual morality in Forensic Science and competing ethical standards between state and defense experts will be addressed. Examinations of ethical guidelines issued by various professional forensic organizations will be conducted. Students will be presented with examples of ethical dilemmas for comment and resolution. The management of crime laboratories will provide discussion on quality assurance/quality control practices and the standards required by the accreditation of laboratories and those proposed by Scientific Working Groups in Forensic Science. The national Academy of Sciences report on Strengthening Forensic Science will be examined to determine the impact of the field. Professional Issues in Forensic Science is a core topic taught in forensic science programs. This volume will be an essential advanced text for academics and an excellent reference for the newly practicing forensic scientist. It will also fit strategically and cluster well with our other forensic science titles addressing professional issues.
    • Managing eBook Metadata in Academic Libraries

      • 1st Edition
      • November 12, 2015
      • Donna E Frederick
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 1 5 1 6
      • eBook
        9 7 8 0 0 8 1 0 0 2 1 5 5
      Managing ebook Metadata in Academic Libraries: Taming the Tiger tackles the topic of ebooks in academic libraries, a trend that has been welcomed by students, faculty, researchers, and library staff. However, at the same time, the reality of acquiring ebooks, making them discoverable, and managing them presents library staff with many new challenges. Traditional methods of cataloging and managing library resources are no longer relevant where the purchasing of ebooks in packages and demand driven acquisitions are the predominant models for acquiring new content. Most academic libraries have a complex metadata environment wherein multiple systems draw upon the same metadata for different purposes. This complexity makes the need for standards-based interoperable metadata more important than ever. In addition to complexity, the nature of the metadata environment itself typically varies slightly from library to library making it difficult to recommend a single set of practices and procedures which would be relevant to, and effective in, all academic libraries. Considering all of these factors together, it is not surprising when academic libraries find it difficult to create and manage the metadata for their ebook collections. This book is written as a guide for metadata librarians, other technical services librarians, and ancillary library staff who manage ebook collections to help them understand the requirements for ebook metadata in their specific library context, to create a vision for ebook metadata management, and to develop a plan which addresses the relevant issues in metadata management at all stages of the lifecycle of ebooks in academic libraries from selection, to deselection or preservation.