Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Curriculum & Assessment

      • 1st Edition
      • June 28, 2014
      • P. Raggatt + 1 more
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 9 1 3 6
      An Open University set book, it explores recent changes in curriculum and assessment policy, and examines the trend towards centralized control. It also offers an assessment of continuing local authority influences. The selection of articles, though not comprehensive, will be useful to anyone with interest in curriculum and assessment policy.
    • Campus Strategies for Libraries and Electronic Information

      • 1st Edition
      • June 28, 2014
      • Caroline Arms
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 8 0 3
      • eBook
        9 7 8 1 4 8 3 2 9 4 4 8 3
      A look at how ten American colleges and Universities bridged the gap between computing, administrative, and library organisationsDetaile... case studies from ten American colleges and universities will prepare you to make better plans and decisions for an electronic library, integrated information management system, or unified information resource. You'll find models and guidelines covering reference services, latest philosophies and strategies, management and organization issues, delivery mechanisms, and more.
    • Linguistic Theory in America

      • 2nd Edition
      • June 28, 2014
      • Frederick J. Newmeyer
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 5 4 3 5
      Linguistic Theory in America, Second Edition focuses on the origin and development of the theory of transformational generative grammar. The book first elaborates on the state of American linguistics in the mid-1950s, the Chomskyan revolution, and the movement from syntactic structures to the aspects of the theory of syntax. Discussions focus on the incorporation of semantics into the model, revisions in the syntactic component, generative phonology, impact of generative grammar on other fields, syntactic structures, and structural linguistics. The text then takes a look at the rise of generative semantics and linguistic wars. Topics include late generative semantics, collapse and legacy of generative semantics, steps to generative semantics, and emerging opposition to generative semantics. The manuscript elaborates on the extended standard theory and approaches to syntax, including generalized phrase structure grammar, constraints on transformational rules, and constraints on surface structure and base rules. The text is a dependable source of data for researchers interested in the theory of transformational generative grammar.
    • Security Leader Insights for Risk Management

      • 1st Edition
      • August 27, 2014
      • Richard Chase
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 4 0 9
      • eBook
        9 7 8 0 1 2 8 0 0 9 0 4 8
      How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Risk Management, a collection of timeless leadership best practices featuring insights from some of the nation’s most successful security practitioners, you can.This book can be used as a quick and effective resource to bring your security staff up to speed on security’s role in risk management. Instead of re-inventing the wheel when faced with a new challenge, these proven practices and principles will allow you to execute with confidence knowing that your peers have done so with success. Part one looks at the risk assessment and subtopics such as compliance, using risk assessments to increase security’s influence, and risk indicator dashboards. Part two discusses risk management topics such as board-level risk, global risk, risk appetite, and enterprise risk management (ERM).Security Leader Insights for Risk Management is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real-world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • The Sociolinguistics of the Deaf Community

      • 1st Edition
      • May 19, 2014
      • Ceil Lucas
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 6 3 9 5
      This is a unified collection of the best and most current empirical studies of socio-linguistic issues in the deaf community, including topics such as studies of sign language variation, language contact and change, and sign language policy.Established linguistic concerns with deaf language are reexamined and redefined, and several new issues of general importance to all sociolinguists are raised and explored. This is a book which interests all sociolinguists as well as deaf professionals, teachers of the deaf, sign language interpreters, and anyone else dealing on a day-to-day basis with the everyday language choices that deaf persons must make.
    • Making Peace Possible

      • 1st Edition
      • June 28, 2014
      • Lloyd J. Dumas + 1 more
      • English
      • Paperback
        9 7 8 0 0 8 0 3 7 2 5 3 2
      • eBook
        9 7 8 1 4 8 3 2 9 9 2 8 0
      In Making Peace Possible, the editors have presented a range of papers which focus on the theory and practice of economic conversion of military-oriented industry to civilian use. The book brings together a wealth of information from academic research and from case studies undertaken by individual countries and by the United Nations. Covering such diverse topics as the relationship between the level of armament expenditure in the industrialized countries and economic aid to less developed countries, the economic impact of ever-increasing expenditure on arms, and the theory and practical experience of economic conversion projects in the US and Scandinavia, Making Peace Possible shows that economic conversion from military to civilian use can help form the basis for a more peaceful and economically stable world.
    • Security Leader Insights for Information Protection

      • 1st Edition
      • May 24, 2014
      • Bob Fahy
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 4 3 0
      • eBook
        9 7 8 0 1 2 8 0 0 9 0 7 9
      How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation’s most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security’s role in information protection. Instead of re-inventing the wheel when faced with a new challenge, these proven practices and principles will allow you to execute with confidence knowing that your peers have done so with success. It includes chapters on the collaboration between corporate and information security, emerging issues in information protection, and information protection regulations and standards. Security Leader Insights for Information Protection is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Collaboration with Cloud Computing

      • 1st Edition
      • April 7, 2014
      • Ric Messier
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 0 4 0 7
      • eBook
        9 7 8 0 1 2 4 1 7 1 2 3 7
      Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network
    • The Mentally Subnormal

      • 2nd Edition
      • May 20, 2014
      • Margaret Adams + 1 more
      • English
      • Paperback
        9 7 8 1 4 8 3 1 7 6 9 4 9
      • eBook
        9 7 8 1 4 8 3 1 9 2 7 5 8
      The Mentally Subnormal: Social Work Approaches, Second Edition provides a discussion of the various issues faced by mentally challenged individuals. The book is comprised of eight chapters that talk about the role of social workers in mitigating the problem. The text first details the development of ideas and legislation relating to the mentally subnormal, and then proceeds to presenting a view of the issue in a medical perspective. The next chapter discusses the principles of casework in the field. Chapter 4 talks about the role of community social care, while Chapter 5 deals with social services to the mentally retarded and their families. The sixth chapter covers social work in residential settings. The remaining chapters tackle the employment problem of mentally handicapped and the implications for services of social research in mental retardation. The book will be of great interest to students, researchers, and practitioners of disciplines that deal with the implication of mental incapacity for society, such as psychology, sociology, and psychiatry.
    • Detecting and Combating Malicious Email

      • 1st Edition
      • October 7, 2014
      • Julie JCH Ryan + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 1 1 0 3
      • eBook
        9 7 8 0 1 2 8 0 0 5 4 6 0
      Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient’s computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments.