Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Windows Forensic Analysis Toolkit

      • 4th Edition
      • March 11, 2014
      • Harlan Carvey
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 1 5 7 2
      • eBook
        9 7 8 0 1 2 4 1 7 1 7 4 9
      Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, Second Edition, which focuses primarily on XP, and Windows Forensic Analysis Toolkit, Third Edition, which focuses primarily on Windows 7. This new fourth edition provides expanded coverage of many topics beyond Windows 8 as well, including new cradle-to-grave case examples, USB device analysis, hacking and intrusion cases, and "how would I do this" from Harlan's personal case files and questions he has received from readers. The fourth edition also includes an all-new chapter on reporting.
    • Integrated Security Systems Design

      • 2nd Edition
      • September 3, 2014
      • Thomas L. Norman
      • English
      • Paperback
        9 7 8 0 1 2 8 1 0 2 3 7 4
      • Hardback
        9 7 8 0 1 2 8 0 0 0 2 2 9
      • eBook
        9 7 8 0 1 2 8 0 0 1 9 3 6
      Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible.The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program’s overall effectiveness while avoiding pitfalls and potential lawsuits.
    • Contributions of Technology to International Conflict Resolution

      • 1st Edition
      • June 28, 2014
      • H. Chestnut
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 7 7 5 3
      • eBook
        9 7 8 1 4 8 3 2 9 8 2 8 3
      This book investigates technology's potential for stimulating and strengthening approaches that can lead to the peaceful solution of international conflicts. It discusses the causes of war; the political and social implications of neighbourhood and international involvement, and evaluates various aid programmes. Models are applied to methods of mediation and simulating power distribution and decision making to show how modern technology can be used to promote resolution in the event of conflict.
    • Managing the One-Person Library

      • 1st Edition
      • December 9, 2014
      • Larry Cooperman
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 6 7 1 5
      • eBook
        9 7 8 1 7 8 0 6 3 3 5 7 2
      Managing the one-person library provides a useful and needed resource for solo librarians confronted with the challenges of running a small library. The author uniquely focuses on topics encountered by solo librarians, such as IT troubleshooting and library security. Chapters on library management, collection development, serials management, and library marketing are included to enable solo librarians to easily manage day-to-day operations in these areas, and advise on how to respond to any challenges that should (and will) arise. This book will provide a much-needed resource manual that will allow solo librarians of all backgrounds, and paraprofessionals, to manage their collections as effectively as their larger librarian counterparts.
    • Security for Business Professionals

      • 1st Edition
      • August 12, 2014
      • Bradley A. Wayland
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 5 6 5 1
      • eBook
        9 7 8 0 1 2 8 0 0 6 2 1 4
      Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don’t have the resources to hire an in-house security staff. It can also be used for assessing the adequacy of an existing security program. The book provides an overview of the key security objectives and challenges that managers face, such as how to measure the effectiveness of a security program and balance the costs and benefits. It also shows how to develop security procedures that conform to key regulatory requirements, and how to assess an organization’s most important risks, vulnerabilities, and threats. Security for Business Professionals addresses key physical and informational security concerns, including areas such as asset protection, loss prevention, and personnel security. It also discusses how to develop emergency and incident response plans, and concludes with suggested safety and security exercises and training recommendations.
    • Security Careers

      • 3rd Edition
      • January 13, 2014
      • Stephen W. Walker + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 1 0 4 2
      • eBook
        9 7 8 0 1 2 8 0 0 1 9 9 8
      The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, and ethics occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushée Group, which has been conducting this research since 1980. Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a thorough understanding of competitive pay practices across the industry. This book can be used by anyone who manages security personnel or by security professionals who want to develop their careers. Security Careers is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Documents on the Holocaust

      • 1st Edition
      • June 28, 2014
      • Y. Arad + 2 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 7 6 9 2
      • eBook
        9 7 8 1 4 8 3 2 9 9 0 8 2
      This volume presents a comprehensive collection of essential documents for students and laymen interested in the history of the Holocaust. The collection reflects both the major trends in Nazi ideology and policy towards the Jews and the behaviour and reaction of the Jews to the Nazi challenge. The book is divided into three geographical-politic... sections: Germany and Austria; Poland; and the Baltic countries and areas of the Soviet Union occupied by Nazi Germany during the Second World War. Each section is preceded by a short introduction setting the documents against the background of events and developments in these areas.
    • Education for Innovation and Independent Learning

      • 1st Edition
      • January 24, 2014
      • Ronaldo Mota + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 4 7 8
      • eBook
        9 7 8 0 1 2 8 0 0 9 9 1 8
      Our principal concern in this book is to understand three important ideas: learning, technology and innovation, and to examine these ideas and the relationships between them in situ; that is, we examine a number of cases of learning technologies in action in two countries, England and Brazil. The purpose of our study is to provide an explanation of the means to, and constraints on, improvements to educational policies and practices, with particular reference to innovation. We have a plethora of theoretical models that in attempting to deal with causal relations usually come to the conclusion that there are socio-economic-cultu... constraints, but these observations largely remain at an abstract level and/or come to very general conclusions that are not of particular help to practitioners in the field. These issues can only be properly addressed after examining the empirical reality and having a spectrum of cases to analyze. By combining the theoretical and the practical, our aim is to explain how and under what conditions new modes of learning can be put into practice successfully and sustainably, in order for the learner to develop innovatory skills and dispositions for work and in the life course.
    • Radical Information Literacy

      • 1st Edition
      • July 25, 2014
      • Andrew Whitworth
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 4 8 4
      • eBook
        9 7 8 1 7 8 0 6 3 4 2 9 6
      What would a synthetic theory of Digital, Media and Information Literacy (DMIL) look like? Radical Information Literacy presents, for the first time, a theory of DMIL that synthesises the diversity of perspectives and positions on DMIL, both in the classroom and the workplace, and within the informal learning processes of society. This title is based on original analysis of how decisions are made about the relevance of information and the other resources used in learning, showing how society has privileged objective approaches (used in rule-based decision making) to the detriment of subjective and intersubjective perspectives which promote individual and community contexts. The book goes on to analyse the academic and popular DMIL literature, showing how the field may have been, consciously or unwittingly, complicit in the ‘objectification’ of learning and the disempowerment of individuals and communities. Alternative ways of conceiving the subject are then presented, towards a reversal of these trends.
    • The Manager's Handbook for Business Security

      • 2nd Edition
      • March 7, 2014
      • George Campbell
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 0 6 2 5
      • eBook
        9 7 8 0 1 2 8 0 0 2 0 0 1
      The Manager’s Handbook for Business Security is designed for new or current security managers who want build or enhance their business security programs. This book is not an exhaustive textbook on the fundamentals of security; rather, it is a series of short, focused subjects that inspire the reader to lead and develop more effective security programs.Chapters are organized by topic so readers can easily—and quickly—find the information they need in concise, actionable, and practical terms. This book challenges readers to critically evaluate their programs and better engage their business leaders. It covers everything from risk assessment and mitigation to strategic security planning, information security, physical security and first response, business conduct, business resiliency, security measures and metrics, and much more.The Manager’s Handbook for Business Security is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.