Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Detecting and Combating Malicious Email

    • 1st Edition
    • October 7, 2014
    • Julie JCH Ryan + 1 more
    • English
    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient’s computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments.
  • Shaping Knowledge

    Complex Socio-Spatial Modelling for Adaptive Organizations
    • 1st Edition
    • September 26, 2014
    • Jamie O’Brien
    • English
    Organizations in ever-changing environments depend upon their knowledge, as their survival depends upon effective thinking and agile actions. Any organization’s knowledge is its prime asset yet its true value requires the activations of structure, query, search and decision. Shaping Knowledge provides an introduction to the key tools for thinking required by decision-making professionals in today’s knowledge-intensive landscapes, and equips them with key skills to capitalize on knowledge resources. This book provides practical methods and critical insights for modelling knowledge-driven domains, providing a rich resource for exploration in professional development and practice.
  • Managing Online Risk

    Apps, Mobile, and Social Media Security
    • 1st Edition
    • September 25, 2014
    • Deborah Gonzalez
    • English
    In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and storage, liability, recruitment, employee communications, compliance violations, security of devices (in contexts like mobile, apps, and cloud computing), and more. Additionally, this book offers a companion website that was developed in parallel with the book and includes the latest updates and resources for topics covered in the book.
  • CSA Guide to Cloud Computing

    Implementing Cloud Privacy and Security
    • 1st Edition
    • September 22, 2014
    • Raj Samani + 2 more
    • English
    CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents. The authors of CSA Guide to Cloud Computing provide a wealth of industry expertise you won't find anywhere else. Author Raj Samani is the Chief Technical Officer for McAfee EMEA; author Jim Reavis is the Executive Director of CSA; and author Brian Honan is recognized as an industry leader in the ISO27001 standard. They will walk you through everything you need to understand to implement a secure cloud computing structure for your enterprise or organization.
  • Modulation of Sleep by Obesity, Diabetes, Age, and Diet

    • 1st Edition
    • September 14, 2014
    • Ronald Ross Watson
    • English
    Sleep disorder is a rampant problem in the US, with over 40 million Americans currently diagnosed according to the NIH. There is a clear association between sleep disorder and a wide range of other human disorders –performance deficiencies, psychiatric illnesses, heart disease, obesity and more – but in spite of this there is not yet a convenient overview on the market detailing the impact of obesity, age, diabetes and diet on sleep duration and attendant health outcomes. This volume focuses on the interaction between sleep and these factors, with special attention being paid to the potential for neurological modulation of sleep via diet. The volume aid readers in understanding the role each of these factors plays in sleep architecture and its regulation by circadian biology and neurology.
  • Security Leader Insights for Business Continuity

    Lessons and Strategies from Leading Security Professionals
    • 1st Edition
    • September 11, 2014
    • Phil Hopkins
    • English
    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Business Continuity, a collection of timeless leadership best practices featuring insights from some of the nation’s most successful security practitioners, you can.This book can be used as a quick and effective resource to bring your security staff up to speed on security’s role in business continuity. Instead of re-inventing the wheel when faced with a new challenge, these proven practices and principles will allow you to execute with confidence knowing that your peers have done so with success. It includes chapters on the business resiliency and emergency preparedness, leading during a crisis, corporate social responsibility, and the Voluntary Private Sector Preparedness Certification Program.Security Leader Insights for Business Continuity is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real-world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • School Security

    How to Build and Strengthen a School Safety Program
    • 1st Edition
    • September 11, 2014
    • Paul Timm
    • English
    It seems that every day there’s a new story about a security lapse, emergency lock-down, or violent act taking place at a school somewhere in the United States. Today it’s simply inexcusable not to have adequate security measures in place—regardless of how safe you think your community may be. In School Security, author Paul Timm, a nationally acclaimed school security expert, explains how to make your institution a safer place to learn with easy-to-follow steps. Throughout the book, Timm emphasizes a proactive rather than reactive approach to school security. Readers are introduced to basic loss prevention and safety concepts, including how to communicate safety information to students and staff, how to raise security awareness, and how to prepare for emergencies. The book discusses how to positively influence student behavior, lead staff training programs, and write sound security policies. An entire chapter is dedicated to describing what school security resources are available for follow-up reading and further training. School Security isn’t just a book for security professionals: it helps people without formal security training—namely, educators and school administrators—effec... address school risk.
  • Information Governance and Security

    Protecting and Managing Your Company’s Proprietary Information
    • 1st Edition
    • September 9, 2014
    • John G. Iannarelli + 1 more
    • English
    Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization’s most important asset—its proprietary information—safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and this book establishes the enterprise-level systems and disciplines necessary for managing all the information generated by an organization. In addition, the book encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined in Information Governance and Security, organizations can proactively protect their reputation against the threats that most managers have never even thought of.
  • Introduction to Emergency Management, Enhanced

    • 5th Edition
    • September 5, 2014
    • George Haddow + 2 more
    • English
    Introduction to Emergency Management, Fifth Edition, offers a fully up-to-date analysis of US emergency management principles. In addition to expanding coverage of risk management in a time of climate change and terrorism, Haddow, Bullock, and Coppola discuss the impact of new emergency management technologies, social media, and an increasing focus on recovery. They examine the effects of the 2012 election results and discuss FEMA’s controversial National Flood Insurance Program (NFIP). Introduction to Emergency Management, Fifth Edition, gives instructors and students the best textbook content, instructor-support materials, and online resources to prepare future EM professionals for this demanding career.
  • Smart Security: Understanding and Contributing to the Business

    Proven Practices
    • 1st Edition
    • September 4, 2014
    • J. David Quilter
    • English
    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes.In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and security measures and metrics, along with how to demonstrate return on investment and leverage executive leadership. The practices and tools discussed in this presentation will reduce business losses and help improve security and operations.Smart Security: Understanding and Contributing to the Business is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.