Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Intellectual Property and Assessing its Financial Value

    • 1st Edition
    • November 19, 2014
    • Benedikt Sas + 2 more
    • English
    This book covers the different aspects, such as patents, trademarks and copyright of Intellectual Property (IP) from a more practical business perspective. Intellectual Property and Assessing its’ Financial Value describes the differences between regions, mainly the differences between the US and EU. In addition, several tools are presented for assessing the value of new IP, which is of importance before engaging on a new project that could result in new IP or for licensing purposes. The first chapter introduces the different types of IP and illustrating the business importance of capturing and safeguarding IP, the second chapter discusses patents and other forms of IP with subsequent chapters exploring copyright and trademarks in more detail, and a concluding chapter on the future of systems that can assess new IP value.
  • Securing VoIP

    Keeping Your VoIP Network Safe
    • 1st Edition
    • November 14, 2014
    • Regis J. Jr (Bud) Bates
    • English
    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.
  • Designing and Building Security Operations Center

    • 1st Edition
    • November 6, 2014
    • David Nathans
    • English
    Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers’ information. Designing and Building a Security Operations Center will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. Written by a subject expert who has consulted on SOC implementation in both the public and private sector, Designing and Building a Security Operations Center is the go-to blueprint for cyber-defense.
  • MCSA Windows Server 2003 Upgrade to Server 2008, Technology Specialist Online Course: Exam 70-648

    Exam 70-648
    • 1st Edition
    • November 3, 2014
    • Robert Shimonski
    • English
    You will get a unique and intense test prep experience with this complete, self-paced. 100% online training course for 70-648. Written and designed by leading experts and Microsoft MVPs, this full training course delivers rich content, an interactive learning experience, and realistic practice questions.
  • Techno Forensics 2008

    • 1st Edition
    • November 3, 2014
    • Syngress
    • English
    * 14 Books Valued at over $800 for less than $300!* Titles you can't get anywhere else!* Search pages on an easy-to-read PDF format!Just released from the Techno Forensics 2008 Show in Maryland, this compilation of books includes some of the hottest titles surrounding the forensics field today. In this easy-to-use CD, you'll be able to search through and use thousands of pages in PDF format. From some of our most recent titles to two first edition titles you can't find anywhere else, this CD has it all! This offer is available for a limited time only, so be sure to order your copy today!Malware Forensics by James Aquilina & Cameron MalinPenetration Tester's Open Source Toolkit, Vol 2 by Aaron BaylesWindows Forensic Analysis DVD Toolkit by Harlan CarveyAlternate Data Storage Forensics by Tyler Cohen & Amber SchroaderGoogle Hacking for Penetration Testers by Johnny Long (only available on this cd)Google Hacking for Penetrations Testers, Vol 2 by Johnny LongNo Tech Hacking by Johnny LongPenetration Tester's Open Source Toolkit, Vol 2 by Chris Hurley Unix and Linux Forensic Analysis DVD Toolkit by Chris PogueCyber Crime Investigations by Anthony ReyesScene of the Cybercrime by Debra Littlejohn Shinder (only available on thiscd)Techno Security's Guide to E-Discovery by Jack WilesTechno Security's Guide to Managing Risks by Jack WilesTechno Security's Guide to Securing SCADA by Jack Wiles
  • PCI Compliance

    Understand and Implement Effective PCI Data Security Standard Compliance
    • 4th Edition
    • October 29, 2014
    • Branden R. Williams + 1 more
    • English
    Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. This is the first book to address the recent updates to PCI DSS. The real-world scenarios and hands-on guidance are also new approaches to this topic. All-new case studies and fraud studies have been added to the Fourth Edition. Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifia... information.
  • Enhancing Learning and Teaching Through Student Feedback in Medical and Health Sciences

    • 1st Edition
    • October 21, 2014
    • Chenicheri Sid Nair + 1 more
    • English
    Student feedback has appeared in the forefront of higher education quality, in particular the issues of effectiveness and the use of student feedback to improve higher education teaching and learning, and other areas of student tertiary experience. Despite this, little academic literature has focussed on the experiences of academics, higher education leaders and managers. The final title in the Chandos Learning and Teaching Series to focus on student feedback, Enhancing Learning and Teaching through Student Feedback in the Medical and Health Sciences expands on topics covered in the previous publications, focussing on the medical and health science disciplines. This edited title includes contributions from experts in higher education quality, and student feedback from a range of countries, such as Australia, Europe, Canada, the USA, the UK, South East Asia and India. The book is concerned with the practices of evaluation and higher education quality in medical and health science disciplines, with particular focus on student feedback. The book begins by giving a discipline-specific overview of student feedback in medical and health sciences, before moving on to take a global perspective. The penultimate chapter considers the accountability of student evaluations in health and medical sciences, before a conclusion summarises the practices of student feedback and accountability in medical and health sciences, and suggests future improvements.
  • Dictionary of Energy

    • 2nd Edition
    • October 20, 2014
    • Cutler J. Cleveland + 1 more
    • English
    The Dictionary of Energy, Second Edition is a comprehensive and authoritative reference on all aspects of energy and its role in society. Edited by Cutler J. Cleveland and Christopher Morris, the editors of Handbook of Energy, Volumes 1 and 2, this authoritative resource comes at a time when the topic of energy prices, resources and environmental impacts are at the forefront of news stories and political discussions. The Second Edition of Dictionary of Energy contains over 10,000 terms, across 40 key subject areas in energy (e.g. solar, oil & gas, economics, models, policy, basic concepts, sustainable development, systems, renewable/alternativ... energy, water, etc), with additional window essays on key issues, such as Biomass, Ecological Footprint, Exergy, Fuel Cell, and Hybrid Vehicles. Dictionary of Energy, Second Edition is a valuable reference for undergraduate and graduate students, academics, and research scientists who study energy, as well as business corporations, professional firms, government agencies, foundations, and other groups whose activities relate to energy.
  • Cyber Reconnaissance, Surveillance and Defense

    • 1st Edition
    • October 16, 2014
    • Robert Shimonski
    • English
    At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gatherin... and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.
  • Improving Student Information Search

    A Metacognitive Approach
    • 1st Edition
    • October 10, 2014
    • Barbara Blummer + 1 more
    • English
    Metacognition is a set of active mental processes that allows users to monitor, regulate, and direct their personal cognitive strategies. <I>Improving Student Information Search</I> traces the impact of a tutorial on education graduate students’ problem-solving in online research databases. The tutorial centres on idea tactics developed by Bates that represent metacognitive strategies designed to improve information search outcomes. The first half of the book explores the role of metacognition in problem-solving, especially for education graduate students. It also discusses the use of metacognitive scaffolds for improving students’ problem-solving. The second half of the book presents the mixed method study, including the development of the tutorial, its impact on seven graduate students’ search behaviour and outcomes, and suggestions for adapting the tutorial for other users.