Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Tourism Security

      • 1st Edition
      • June 6, 2014
      • Peter Tarlow
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 5 7 0 5
      • eBook
        9 7 8 0 1 2 4 1 1 5 7 2 9
      Tourism security is an important part of both security management and tourism. Private security professionals and police departments in tourism cities, as well as hotels, major attractions, and theme parks, have all come to realize that tourism security and safety issues (often called tourism surety) are essential for industry survival and success. In Tourism Security, leading expert Peter Tarlow addresses a range of key issues in tourism safety and security.The book guides the reader through a study of tourism security themes and best practices. Topics include the relationship between tourism security and the economy, hotel and motel security, risk and crisis management, public places, transportation, and legal issues. The book also includes case studies of four popular tourist destinations. With each destination, an interview with a police or security representative is included—providing unique, in-depth insight to security concerns.Tourism Security is an invaluable resource for private security professionals, police departments that serve tourist destinations, and tourism professionals who work in hotels or convention centers, or at attractions, casinos, or events.
    • Information Hiding in Speech Signals for Secure Communication

      • 1st Edition
      • August 27, 2014
      • Zhijun Wu
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 3 2 8 1
      • eBook
        9 7 8 0 1 2 8 0 1 4 8 1 3
      In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more. This book shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN.
    • Augmented Reality Law, Privacy, and Ethics

      • 1st Edition
      • December 9, 2014
      • Brian Wassom
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 2 0 8 7
      • eBook
        9 7 8 0 1 2 8 0 0 5 2 4 8
      Augmented Reality (AR) is the blending of digital information in a real-world environment. A common example can be seen during any televised football game, in which information about the game is digitally overlaid on the field as the players move and position themselves. Another application is Google Glass, which enables users to see AR graphics and information about their location and surroundings on the lenses of their "digital eyewear", changing in real-time as they move about. Augmented Reality Law, Privacy, and Ethics is the first book to examine the social, legal, and ethical issues surrounding AR technology. Digital eyewear products have very recently thrust this rapidly-expanding field into the mainstream, but the technology is so much more than those devices. Industry analysts have dubbed AR the "eighth mass medium" of communications. Science fiction movies have shown us the promise of this technology for decades, and now our capabilities are finally catching up to that vision. Augmented Reality will influence society as fundamentally as the Internet itself has done, and such a powerful medium cannot help but radically affect the laws and norms that govern society. No author is as uniquely qualified to provide a big-picture forecast and guidebook for these developments as Brian Wassom. A practicing attorney, he has been writing on AR law since 2007 and has established himself as the world's foremost thought leader on the intersection of law, ethics, privacy, and AR. Augmented Reality professionals around the world follow his Augmented Legality® blog. This book collects and expands upon the best ideas expressed in that blog, and sets them in the context of a big-picture forecast of how AR is shaping all aspects of society.
    • Cyber Crime and Cyber Terrorism Investigator's Handbook

      • 1st Edition
      • July 16, 2014
      • Babak Akhgar + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 4 3 3
      • eBook
        9 7 8 0 1 2 8 0 0 8 1 1 9
      Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator’s Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator’s Handbook will serve as your best reference to the modern world of cyber crime.
    • Scholarly Information Discovery in the Networked Academic Learning Environment

      • 1st Edition
      • August 18, 2014
      • LiLi Li
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 6 3 7
      • eBook
        9 7 8 1 7 8 0 6 3 4 4 4 9
      In the dynamic and interactive academic learning environment, students are required to have qualified information literacy competencies while critically reviewing print and electronic information. However, many undergraduates encounter difficulties in searching peer-reviewed information resources. Scholarly Information Discovery in the Networked Academic Learning Environment is a practical guide for students determined to improve their academic performance and career development in the digital age. Also written with academic instructors and librarians in mind who need to show their students how to access and search academic information resources and services, the book serves as a reference to promote information literacy instructions. This title consists of four parts, with chapters on the search for online and printed information via current academic information resources and services: part one examines understanding information and information literacy; part two looks at academic information delivery in the networked world; part three covers searching for information in the academic learning environment; and part four discusses searching and utilizing needed information in the future in order to be more successful beyond the academic world.
    • Personal Security: Keeping Yourself and Your Family Safe

      • 1st Edition
      • September 2, 2014
      • Rosalind Jackson
      • English
      • eBook
        9 7 8 0 1 2 8 0 0 9 2 3 9
      Personal Security: Keeping Yourself and Your Family Safe is a video presentation. Length: 26 minutes.In Personal Security: Keeping Yourself and Your Family Safe, presenter Rosalind W. Jackson provides personal security guidelines for securing your workplace, home, and automobile. This presentation addresses topics such as assault prevention and deterrence, physical resistance, and personal safety techniques. It also covers issues such as theft and harassment, and provides safety tips for automated teller machines (ATMs), hotels, elevators, automobiles, and at home with children. It touches on safety issues unique to children, as well as sexual assault, domestic violence, and what to do following an attack. This presentation is an excellent resource for security professionals and non-security professionals alike.Personal Security: Keeping Yourself and Your Family Safe is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Saussure's Third Course of Lectures on General Linguistics (1910-1911)

      • 1st Edition
      • May 23, 2014
      • R. Harris + 1 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 7 7 7 7
      • eBook
        9 7 8 1 4 8 3 2 9 7 5 3 8
      The notes taken by Saussure's student Emile Constantin were not available to the editors of the published Cours de linguistique générale (1916), and came to light only after the second world war. They have never been published in their entirety.The third and last course of lectures, of which Constantin kept this very full record, is generally considered to represent a more advanced version of Saussure's teaching than the earlier two. It is clear that Constantin's notebooks offer a text which differs in a number of significant respects from the Cours published by Saussure's original editors, and bring forward ideas which do not emerge in the 1916 publication. They constitute unique evidence concerning the final stages of Saussure's thinking about language.This edition of the notes is accompanied by an introduction and a full English translation of the text. There has been no attempt made by Komatsu and Harris, to turn the English into readable prose. Constantin's notes, even as revised by their author, retain the infelicities, repetitions, abruptness - occasionally incoherences - that betray the circumstances of their origin.The volume constitutes an important landmark in the history of modern linguistics and provides essential documentation for all scholars and libraries specializing in the subject.
    • Literary Concordances

      • 1st Edition
      • June 28, 2014
      • T. H. Howard-Hill
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 7 6 5 4
      • eBook
        9 7 8 1 4 8 3 2 9 6 7 5 3
      All problems likely to be encountered by anyone who intends to prepare a literary concordance are discussed on a practical level, although there is substantial examination of more advanced concording techniques which the computer makes it possible to adopt. Although the emphasis is on works in English, the structural principles which are analysed in the book can be applied readily to works in other languages
    • HCISPP Study Guide

      • 1st Edition
      • December 10, 2014
      • Timothy Virtue + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 0 4 3 2
      • eBook
        9 7 8 0 1 2 8 0 2 0 8 9 0
      The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC². The new HCISPP certification, focused on health care information security and privacy, is similar to the CISSP, but has only six domains and is narrowly targeted to the special demands of health care information security. Tim Virtue and Justin Rainey have created the HCISPP Study Guide to walk you through all the material covered in the exam's Common Body of Knowledge. The six domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the six domains has its own chapter that includes material to aid the test-taker in passing the exam, as well as a chapter devoted entirely to test-taking skills, sample exam questions, and everything you need to schedule a test and get certified. Put yourself on the forefront of health care information privacy and security with the HCISPP Study Guide and this valuable certification.
    • Misleading DNA Evidence

      • 1st Edition
      • June 12, 2014
      • Peter Gill
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 2 1 4 2
      • eBook
        9 7 8 0 1 2 4 1 7 2 2 0 3
      Misleading DNA Evidence: A Guide for Scientists, Judges, and Lawyers presents the reasons miscarriages of justice can occur when dealing with DNA, what the role of the forensic scientist is throughout the process, and how judges and lawyers can educate themselves about all of the possibilities to consider when dealing with cases that involve DNA evidence. DNA has become the gold standard by which a person can be placed at the scene of a crime, and the past decade has seen great advances in this powerful crime solving tool. But the statistics that analysts can attach to DNA evidence often vary, and in some cases the statistical weight assigned to that match, can vary enormously. The numbers provided to juries often overstate the evidence, and can result in a wrongful conviction. In addition to statistics, the way the evidence is collected, stored and analyzed can also result in a wrongful conviction due to contamination. This book reviews high-profile and somewhat contentious cases to illustrate these points, including the death of Meredith Kercher. It examines crucial topics such as characterization of errors and determination of error rates, reporting DNA profiles and the source and sub-source levels, and the essentials of statement writing. It is a concise, readable resource that will help not only scientists, but legal professionals with limited scientific backgrounds, to understand the intricacies of DNA use in the justice system.