Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Security for Business Professionals

    How to Plan, Implement, and Manage Your Company’s Security Program
    • 1st Edition
    • August 12, 2014
    • Bradley A. Wayland
    • English
    Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don’t have the resources to hire an in-house security staff. It can also be used for assessing the adequacy of an existing security program. The book provides an overview of the key security objectives and challenges that managers face, such as how to measure the effectiveness of a security program and balance the costs and benefits. It also shows how to develop security procedures that conform to key regulatory requirements, and how to assess an organization’s most important risks, vulnerabilities, and threats. Security for Business Professionals addresses key physical and informational security concerns, including areas such as asset protection, loss prevention, and personnel security. It also discusses how to develop emergency and incident response plans, and concludes with suggested safety and security exercises and training recommendations.
  • The Handbook for School Safety and Security

    Best Practices and Procedures
    • 1st Edition
    • August 12, 2014
    • Lawrence J. Fennelly + 1 more
    • English
    School security is one of the most pressing public concerns today. Yet in most schools, there is little security expertise or detailed knowledge about how to implement and manage a security program. The Handbook for School Safety and Security rectifies this problem by providing the salient information school administrators and security professionals need to address the most important security issues schools face. Made up of contributions from leading experts in school security, The Handbook for School Safety and Security provides a wealth of practical information for securing any K-12 school. It discusses key approaches and best practices for school crime prevention, including such topics as crisis management and mass notification. It also covers the physical measure needed for protecting a school, including detailed discussions of access control, lighting, alarms, and locks. While there is no single fix for the myriad of security challenges facing today’s school security professionals, the best practices found in The Handbook for School Safety and Security will help increase the safety and security of any school.
  • Building an Information Security Awareness Program

    Defending Against Social Engineering and Technical Threats
    • 1st Edition
    • August 7, 2014
    • Bill Gardner + 1 more
    • English
    The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up. Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management support for implementing the program. Author Bill Gardner is one of the founding members of the Security Awareness Training Framework. Here, he walks you through the process of developing an engaging and successful training program for your organization that will help you and your staff defend your systems, networks, mobile devices, and data. Forewords written by Dave Kennedy and Kevin Mitnick!
  • Introduction to Environmental Forensics

    • 3rd Edition
    • July 30, 2014
    • Brian L. Murphy + 1 more
    • English
    The third edition of Introduction to Environmental Forensics is a state-of-the-art reference for the practicing environmental forensics consultant, regulator, student, academic, and scientist, with topics including compound-specific isotope analysis (CSIA), advanced multivariate statistical techniques, surrogate approaches for contaminant source identification and age dating, dendroecology, hydrofracking, releases from underground storage tanks and piping, and contaminant-transpor... modeling for forensic applications. Recognized international forensic scientists were selected to author chapters in their specific areas of expertise and case studies are included to illustrate the application of these methods in actual environmental forensic investigations. This edition provides updates on advances in various techniques and introduces several new topics.
  • Advanced Topics in Forensic DNA Typing: Interpretation

    • 1st Edition
    • July 28, 2014
    • John M. Butler
    • English
    Advanced Topics in Forensic DNA Typing: Interpretation builds upon the previous two editions of John Butler’s internationally acclaimed Forensic DNA Typing textbook with forensic DNA analysts as its primary audience. Intended as a third-edition companion to the Fundamentals of Forensic DNA Typing volume published in 2010 and Advanced Topics in Forensic DNA Typing: Methodology published in 2012, this book contains 16 chapters with 4 appendices providing up-to-date coverage of essential topics in this important field. Over 80 % of the content of this book is new compared to previous editions.
  • Radical Information Literacy

    Reclaiming the Political Heart of the IL Movement
    • 1st Edition
    • July 25, 2014
    • Andrew Whitworth
    • English
    What would a synthetic theory of Digital, Media and Information Literacy (DMIL) look like? Radical Information Literacy presents, for the first time, a theory of DMIL that synthesises the diversity of perspectives and positions on DMIL, both in the classroom and the workplace, and within the informal learning processes of society. This title is based on original analysis of how decisions are made about the relevance of information and the other resources used in learning, showing how society has privileged objective approaches (used in rule-based decision making) to the detriment of subjective and intersubjective perspectives which promote individual and community contexts. The book goes on to analyse the academic and popular DMIL literature, showing how the field may have been, consciously or unwittingly, complicit in the ‘objectification’ of learning and the disempowerment of individuals and communities. Alternative ways of conceiving the subject are then presented, towards a reversal of these trends.
  • Library Instruction Design

    Learning from Google and Apple
    • 1st Edition
    • July 25, 2014
    • Di Su
    • English
    The design philosophies of Google and Apple represent different approaches to new product design. Google's model features bottom-up and data-driven decision-making processes, while Apple's model is to design and build products top-down. Library instruction program design may learn from these differing but complementary approaches. Inspired by Google’s and Apple’s success, Library Instruction Design details how library instruction program design may learn from the philosophy of product design in the business world. In designing library instruction, a Google-philosophy approach teaches what the user wants to know while an Apple-philosophy approach teaches what the librarian thinks the user needs to learn. These two design philosophies aim at different teaching objectives reflecting library and information science education in modern society. The book is divided into five sections, with opening sections covering library instruction, the philosophy of library instruction design and design philosophy from different angles. Later sections discuss applying Google’s model and applying Apple’s model.
  • The Evolution of the US-Japan Alliance

    The Eagle and the Chrysanthemum
    • 1st Edition
    • July 24, 2014
    • Matteo Dian
    • English
    The US-Japan alliance has contributed significantly towards the development of the Japanese security strategy. The Evolution of the US-Japan Alliance explores developments in the alliance between the US and Japan and analyzes the transformation of the Japanese security strategy from 1960 to 2013. It also describes the rise and the decline of Japanese pacifism and of the Yoshida Doctrine, the post war security strategy. Moreover, this book highlights how the end of the Cold War forced Japan to rethink its security strategy and post war pacifism. Japan has abandoned its identity of “peaceful nation”, turning itself into a “normal national”, drawing closer to the United States.
  • Security Risk Assessment

    Managing Physical and Operational Security
    • 1st Edition
    • July 22, 2014
    • John M. White
    • English
    Security Risk Assessment is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. A good security assessment is a fact-finding process that determines an organization’s state of security protection. It exposes vulnerabilities, determines the potential for losses, and devises a plan to address these security concerns. While most security professionals have heard of a security assessment, many do not know how to conduct one, how it’s used, or how to evaluate what they have found. Security Risk Assessment offers security professionals step-by-step guidance for conducting a complete risk assessment. It provides a template draw from, giving security professionals the tools needed to conduct an assessment using the most current approaches, theories, and best practices.
  • Cyber Crime and Cyber Terrorism Investigator's Handbook

    • 1st Edition
    • July 16, 2014
    • Babak Akhgar + 2 more
    • English
    Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator’s Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator’s Handbook will serve as your best reference to the modern world of cyber crime.