Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Introduction to Emergency Management, Enhanced

    • 5th Edition
    • September 5, 2014
    • George Haddow + 2 more
    • English
    Introduction to Emergency Management, Fifth Edition, offers a fully up-to-date analysis of US emergency management principles. In addition to expanding coverage of risk management in a time of climate change and terrorism, Haddow, Bullock, and Coppola discuss the impact of new emergency management technologies, social media, and an increasing focus on recovery. They examine the effects of the 2012 election results and discuss FEMA’s controversial National Flood Insurance Program (NFIP). Introduction to Emergency Management, Fifth Edition, gives instructors and students the best textbook content, instructor-support materials, and online resources to prepare future EM professionals for this demanding career.
  • Measures of Personality and Social Psychological Constructs

    • 1st Edition
    • September 4, 2014
    • Gregory J. Boyle + 2 more
    • English
    Measures of Personality and Social Psychological Constructs assists researchers and practitioners by identifying and reviewing the best scales/measures for a variety of constructs. Each chapter discusses test validity, reliability, and utility. Authors have focused on the most often used and cited scales/measures, with a particular emphasis on those published in recent years. Each scale is identified and described, the sample on which it was developed is summarized, and reliability and validity data are presented, followed by presentation of the scale, in full or in part, where such permission has been obtained. Measures fall into five broad groups. The emotional disposition section reviews measures of general affective tendencies, and/or cognitive dispositions closely linked to emotion. These measures include hope and optimism, anger and hostility, life satisfaction, self-esteem, confidence, and affect dimensions. Emotion regulation scales go beyond general dispositions to measure factors that may contribute to understanding and managing emotions. These measures include alexithymia, empathy, resiliency, coping, sensation seeking, and ability and trait emotional intelligence. The interpersonal styles section introduces some traditional social–psychological themes in the context of personality assessment. These measures include adult attachment, concerns with public image and social evaluation, and forgiveness. The vices and virtues section reflects adherence to moral standards as an individual characteristic shaped by sociocultural influences and personality. These measures include values and moral personality, religiosity, dark personalities (Machiavellianism,na... and subclinical psychopathy), and perfectionism. The sociocultural interaction and conflict section addresses relationships between different groups and associated attitudes. These measures include cross-cultural values, personality and beliefs, intergroup contact, stereotyping and prejudice, attitudes towards sexual orientation, and personality across cultures.
  • Smart Security: Understanding and Contributing to the Business

    Proven Practices
    • 1st Edition
    • September 4, 2014
    • J. David Quilter
    • English
    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes.In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and security measures and metrics, along with how to demonstrate return on investment and leverage executive leadership. The practices and tools discussed in this presentation will reduce business losses and help improve security and operations.Smart Security: Understanding and Contributing to the Business is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Integrated Security Systems Design

    A Complete Reference for Building Enterprise-Wide Digital Security Systems
    • 2nd Edition
    • September 3, 2014
    • Thomas L. Norman
    • English
    Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible.The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program’s overall effectiveness while avoiding pitfalls and potential lawsuits.
  • Academic Search Engines

    A Quantitative Outlook
    • 1st Edition
    • September 2, 2014
    • Jose Luis Ortega
    • English
    Academic Search Engines intends to run through the current panorama of the academic search engines through a quantitative approach that analyses the reliability and consistence of these services. The objective is to describe the main characteristics of these engines, to highlight their advantages and drawbacks, and to discuss the implications of these new products in the future of scientific communication and their impact on the research measurement and evaluation. In short, Academic Search Engines presents a summary view of the new challenges that the Web set to the scientific activity through the most novel and innovative searching services available on the Web.
  • Discovering the Total Cost of Security to the Enterprise

    Proven Practices
    • 1st Edition
    • September 2, 2014
    • Richard Lefler
    • English
    Discovering the Total Cost of Security to the Enterprise is a video presentation. Length: 29 minutes.In Discovering the Total Cost of Security to the Enterprise, presenter Richard Lefler discusses what security actually costs an organization in terms of operating, variable, and mandatory costs. Each of the three types of security costs are defined and expanded upon in this presentation. Lefler also explains how certain industry sectors have increasing variable and operating costs, along with the reasons behind these trends. The presentation also covers mandatory spend versus discretionary spend, chief security officer management (CSO) trends, and the critical next steps for CSOs.Discovering the Total Cost of Security to the Enterprise is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Personal Security: Keeping Yourself and Your Family Safe

    Proven Practices
    • 1st Edition
    • September 2, 2014
    • Rosalind Jackson
    • English
    Personal Security: Keeping Yourself and Your Family Safe is a video presentation. Length: 26 minutes.In Personal Security: Keeping Yourself and Your Family Safe, presenter Rosalind W. Jackson provides personal security guidelines for securing your workplace, home, and automobile. This presentation addresses topics such as assault prevention and deterrence, physical resistance, and personal safety techniques. It also covers issues such as theft and harassment, and provides safety tips for automated teller machines (ATMs), hotels, elevators, automobiles, and at home with children. It touches on safety issues unique to children, as well as sexual assault, domestic violence, and what to do following an attack. This presentation is an excellent resource for security professionals and non-security professionals alike.Personal Security: Keeping Yourself and Your Family Safe is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Personnel Protection: Kidnapping Issues and Policies

    Proven Practices
    • 1st Edition
    • September 2, 2014
    • Jerome Miller + 1 more
    • English
    Personnel Protection: Kidnapping Issues and Policies is a video presentation. Length: 9 minutes.In Personnel Protection: Kidnapping Issues and Policies, presenters Jerome Miller and Radford Jones discuss the issue of kidnapping as it relates to an executive security program. It covers the risks for kidnapping of the executive or executive’s family members, along with strategies for creating a sound corporate kidnapping policy. The presenters also discuss what kind of response the organization should make during a kidnapping, as the first hours immediately following are always critical to a successful resolution.This presentation is one of 11 modules in the Personnel Protection presentation series, which is designed for companies considering an executive security program or for companies with an executive security program already in place. Other topics in this series include: concepts of executive security; advance procedures; the executive threat assessment profile; residential security; security personnel; security procedures for worksite, aircraft, and vehicle operations; and executive compensation issues, including IRS requirements.The Personnel Protection presentation series is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Preventing Workplace Violence: A Training Guide for Managers and Supervisors

    Proven Practices
    • 1st Edition
    • September 2, 2014
    • Rosalind Jackson
    • English
    Preventing Workplace Violence: A Training Guide for Managers and Supervisors is a video presentation. Length: 25 minutes.In Preventing Workplace Violence: A Training Guide for Managers and Supervisors, presenter Rosalind W. Jackson provides the fundamentals of workplace violence prevention, including initial program development. This presentation explains the components needed to develop a good baseline program, and focuses on recognizing patterns of unacceptable behavior. It addresses policy development and expert consultation considerations, along with the use of education and team coordination. The presentation also includes a sample workplace violence policy statement, and discusses the impact of workplace violence on the business.Preventing Workplace Violence: A Training Guide for Managers and Supervisors is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Hacking and Penetration Testing with Low Power Devices

    • 1st Edition
    • August 29, 2014
    • Philip Polstra
    • English
    Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!