Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • The Politics of School Government

      • 1st Edition
      • June 28, 2014
      • G. Baron
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 8 1 6 3
      • eBook
        9 7 8 1 4 8 3 2 9 6 3 6 4
      Leading international scholars consider changes and developments in school government practice in the United States, Canada, England and Wales, Scotland, Australia, New Zealand, France, West Germany, Italy, Denmark, Norway and Sweden. Each chapter looks at the introduction or reform of councils at school level designed to secure the involvement in decision-making of parents, teachers, students and the local community. Essential reading for everyone involved in educational administration this informative book will also be of interest to researchers of comparative education, the politics of education and participatory developments in the field.
    • Science Achievement in Seventeen Countries

      • 1st Edition
      • June 28, 2014
      • IEA-RETD
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 7 0 1 9
      This preliminary report presents initial findings from the second International Study of Science Achievement that was conducted by the International Association for the Evaluation of Educational Achievement (IEA) in the period 1983 to 1986. Achievement results for three school population levels are presented together with some special analysis on growth in achievement between population levels and on sex differences in science achievement.
    • Designing and Building Security Operations Center

      • 1st Edition
      • November 6, 2014
      • David Nathans
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 9 9 7
      • eBook
        9 7 8 0 1 2 8 0 1 0 9 6 9
      Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers’ information. Designing and Building a Security Operations Center will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. Written by a subject expert who has consulted on SOC implementation in both the public and private sector, Designing and Building a Security Operations Center is the go-to blueprint for cyber-defense.
    • Industrial Network Security

      • 2nd Edition
      • December 9, 2014
      • Eric D. Knapp + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 1 1 4 9
      • eBook
        9 7 8 0 1 2 4 2 0 1 8 4 2
      As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
    • The Learning Society Revisited

      • 1st Edition
      • June 28, 2014
      • Torsten Husen
      • English
      • Paperback
        9 7 8 0 0 8 0 3 4 0 3 7 1
      • Hardback
        9 7 8 0 0 8 0 3 2 6 6 0 3
      • eBook
        9 7 8 1 4 8 3 2 9 6 3 3 3
      Torsten Husén has brought together in this volume a collection of his own essays, the topics of which reflect his long and distinguished career both as an academic and as a practical researcher. The essays are grouped under six main themes on which he has worked over the years: research and policy making; educational reforms; equality and meritocracy; the impact of education on career; international and comparative dimensions; and present trends and future perspectives. An underlying message running throughout the volume is the importance of examining educational problems from a wide social perspective, rather than solely from the narrow confines of the classroom.
    • Learning About Learning Disabilities

      • 1st Edition
      • May 19, 2014
      • Po-Zen Wong + 1 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 8 5 8 3
      • eBook
        9 7 8 1 4 8 3 2 9 5 3 9 8
      This is the first textbook to give equal attention to the intellectual, conceptual, and practical aspects of learning disabilities. Topical coverage is both comprehensive and thorough, and the information presented is up-to-date.
    • Modulation of Sleep by Obesity, Diabetes, Age, and Diet

      • 1st Edition
      • September 14, 2014
      • Ronald Ross Watson
      • English
      • Hardback
        9 7 8 0 1 2 4 2 0 1 6 8 2
      • Paperback
        9 7 8 0 1 2 8 1 0 3 0 7 4
      • eBook
        9 7 8 0 1 2 4 2 0 2 4 0 5
      Sleep disorder is a rampant problem in the US, with over 40 million Americans currently diagnosed according to the NIH. There is a clear association between sleep disorder and a wide range of other human disorders –performance deficiencies, psychiatric illnesses, heart disease, obesity and more – but in spite of this there is not yet a convenient overview on the market detailing the impact of obesity, age, diabetes and diet on sleep duration and attendant health outcomes. This volume focuses on the interaction between sleep and these factors, with special attention being paid to the potential for neurological modulation of sleep via diet. The volume aid readers in understanding the role each of these factors plays in sleep architecture and its regulation by circadian biology and neurology.
    • Python Forensics

      • 1st Edition
      • May 19, 2014
      • Chet Hosmer
      • English
      • Paperback
        9 7 8 0 1 2 4 1 8 6 7 6 7
      • eBook
        9 7 8 0 1 2 4 1 8 6 8 3 5
      Python Forensics provides many never-before-publish... proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cloud services, or you are collecting and processing evidence from a network, Python forensic implementations can fill in the gaps. Drawing upon years of practical experience and using numerous examples and illustrative code samples, author Chet Hosmer discusses how to: Develop new forensic solutions independent of large vendor software release schedules Participate in an open-source workbench that facilitates direct involvement in the design and implementation of new methods that augment or replace existing tools Advance your career by creating new solutions along with the construction of cutting-edge automation solutions to solve old problems
    • Securing VoIP

      • 1st Edition
      • November 14, 2014
      • Regis J. Jr (Bud) Bates
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 0 3 9 1
      • eBook
        9 7 8 0 1 2 4 1 7 1 2 2 0
      Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.
    • Online Security for the Business Traveler

      • 1st Edition
      • August 23, 2014
      • Deborah Gonzalez
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 0 6 9 4
      • eBook
        9 7 8 0 1 2 8 0 0 2 0 1 8
      Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today’s high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and Google Glass. Each of these devices offers new levels of productivity and efficiency, but they also become the weak link in the security chain: if a device is lost or stolen during travel, the resulting data breach can put the business in danger of physical, financial, and reputational loss. Online Security for the Business Traveler provides an overview of this often overlooked problem, explores cases highlighting specific security issues, and offers practical advice on what to do to ensure business security while traveling and engaging in online activity. It is an essential reference guide for any travelling business person or security professional.