Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Personnel Protection: Kidnapping Issues and Policies

    Proven Practices
    • 1st Edition
    • Jerome Miller + 1 more
    • English
    Personnel Protection: Kidnapping Issues and Policies is a video presentation. Length: 9 minutes.In Personnel Protection: Kidnapping Issues and Policies, presenters Jerome Miller and Radford Jones discuss the issue of kidnapping as it relates to an executive security program. It covers the risks for kidnapping of the executive or executive’s family members, along with strategies for creating a sound corporate kidnapping policy. The presenters also discuss what kind of response the organization should make during a kidnapping, as the first hours immediately following are always critical to a successful resolution.This presentation is one of 11 modules in the Personnel Protection presentation series, which is designed for companies considering an executive security program or for companies with an executive security program already in place. Other topics in this series include: concepts of executive security; advance procedures; the executive threat assessment profile; residential security; security personnel; security procedures for worksite, aircraft, and vehicle operations; and executive compensation issues, including IRS requirements.The Personnel Protection presentation series is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Discovering the Total Cost of Security to the Enterprise

    Proven Practices
    • 1st Edition
    • Richard Lefler
    • English
    Discovering the Total Cost of Security to the Enterprise is a video presentation. Length: 29 minutes.In Discovering the Total Cost of Security to the Enterprise, presenter Richard Lefler discusses what security actually costs an organization in terms of operating, variable, and mandatory costs. Each of the three types of security costs are defined and expanded upon in this presentation. Lefler also explains how certain industry sectors have increasing variable and operating costs, along with the reasons behind these trends. The presentation also covers mandatory spend versus discretionary spend, chief security officer management (CSO) trends, and the critical next steps for CSOs.Discovering the Total Cost of Security to the Enterprise is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Preventing Workplace Violence: A Training Guide for Managers and Supervisors

    Proven Practices
    • 1st Edition
    • Rosalind Jackson
    • English
    Preventing Workplace Violence: A Training Guide for Managers and Supervisors is a video presentation. Length: 25 minutes.In Preventing Workplace Violence: A Training Guide for Managers and Supervisors, presenter Rosalind W. Jackson provides the fundamentals of workplace violence prevention, including initial program development. This presentation explains the components needed to develop a good baseline program, and focuses on recognizing patterns of unacceptable behavior. It addresses policy development and expert consultation considerations, along with the use of education and team coordination. The presentation also includes a sample workplace violence policy statement, and discusses the impact of workplace violence on the business.Preventing Workplace Violence: A Training Guide for Managers and Supervisors is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Academic Search Engines

    A Quantitative Outlook
    • 1st Edition
    • Jose Luis Ortega
    • English
    Academic Search Engines intends to run through the current panorama of the academic search engines through a quantitative approach that analyses the reliability and consistence of these services. The objective is to describe the main characteristics of these engines, to highlight their advantages and drawbacks, and to discuss the implications of these new products in the future of scientific communication and their impact on the research measurement and evaluation. In short, Academic Search Engines presents a summary view of the new challenges that the Web set to the scientific activity through the most novel and innovative searching services available on the Web.
  • Personal Security: Keeping Yourself and Your Family Safe

    Proven Practices
    • 1st Edition
    • Rosalind Jackson
    • English
    Personal Security: Keeping Yourself and Your Family Safe is a video presentation. Length: 26 minutes.In Personal Security: Keeping Yourself and Your Family Safe, presenter Rosalind W. Jackson provides personal security guidelines for securing your workplace, home, and automobile. This presentation addresses topics such as assault prevention and deterrence, physical resistance, and personal safety techniques. It also covers issues such as theft and harassment, and provides safety tips for automated teller machines (ATMs), hotels, elevators, automobiles, and at home with children. It touches on safety issues unique to children, as well as sexual assault, domestic violence, and what to do following an attack. This presentation is an excellent resource for security professionals and non-security professionals alike.Personal Security: Keeping Yourself and Your Family Safe is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Hacking and Penetration Testing with Low Power Devices

    • 1st Edition
    • Philip Polstra
    • English
    Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!
  • Security Leader Insights for Risk Management

    Lessons and Strategies from Leading Security Professionals
    • 1st Edition
    • Richard Chase
    • English
    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Risk Management, a collection of timeless leadership best practices featuring insights from some of the nation’s most successful security practitioners, you can.This book can be used as a quick and effective resource to bring your security staff up to speed on security’s role in risk management. Instead of re-inventing the wheel when faced with a new challenge, these proven practices and principles will allow you to execute with confidence knowing that your peers have done so with success. Part one looks at the risk assessment and subtopics such as compliance, using risk assessments to increase security’s influence, and risk indicator dashboards. Part two discusses risk management topics such as board-level risk, global risk, risk appetite, and enterprise risk management (ERM).Security Leader Insights for Risk Management is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real-world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Information Hiding in Speech Signals for Secure Communication

    • 1st Edition
    • Zhijun Wu
    • English
    In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more. This book shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN.
  • The Preservation and Protection of Library Collections

    A Practical Guide to Microbiological Controls
    • 1st Edition
    • Bogdan Zerek
    • English
    Preservation involves a complex of activities including climate, air-quality, and surface control, as well as microbiological control, which is a key part of preserving and protecting library collections. The Preservation and Protection of Library Collections examines microbiological control for preservation of library and archival collections. A supporting tool for conservators, this title should be integrated into conservation and preservation policy. The book comprises nine sections that cover three aspects: microbiology, surveying, and the response required. Chapters in this title cover the nature of the library collections, physical and chemicals factors and their impact on microbiological issues, as well as biological factors and methods of microbiological control of the air and objects. Later chapters examine methods of object disinfection, disaster response, methods of microbiological control and evaluation of collections, and includes a vocabulary guide, appendices, literature information and references.
  • Online Security for the Business Traveler

    • 1st Edition
    • Deborah Gonzalez
    • English
    Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today’s high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and Google Glass. Each of these devices offers new levels of productivity and efficiency, but they also become the weak link in the security chain: if a device is lost or stolen during travel, the resulting data breach can put the business in danger of physical, financial, and reputational loss. Online Security for the Business Traveler provides an overview of this often overlooked problem, explores cases highlighting specific security issues, and offers practical advice on what to do to ensure business security while traveling and engaging in online activity. It is an essential reference guide for any travelling business person or security professional.