Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Measures and Metrics in Corporate Security

      • 2nd Edition
      • April 2, 2014
      • George Campbell
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 6 8 8 7
      • eBook
        9 7 8 0 1 2 8 0 0 7 1 5 0
      The revised second edition of Measures and Metrics in Corporate Security is an indispensable guide to creating and managing a security metrics program. Authored by George Campbell, emeritus faculty of the Security Executive Council and former chief security officer of Fidelity Investments, this book shows how to improve security’s bottom line and add value to the business. It provides a variety of organizational measurements, concepts, metrics, indicators and other criteria that may be employed to structure measures and metrics program models appropriate to the reader’s specific operations and corporate sensitivities. There are several hundred examples of security metrics included in Measures and Metrics in Corporate Security, which are organized into categories of security services to allow readers to customize metrics to meet their operational needs. Measures and Metrics in Corporate Security is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Cataloguing and Classification

      • 1st Edition
      • December 11, 2014
      • Fotis Lazarinis
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 1 6 1 5
      • eBook
        9 7 8 0 0 8 1 0 0 1 8 9 9
      Cataloguing and Classification introduces concepts and practices in cataloguing and classification, and common library standards. The book introduces and analyzes the principles and structures of library catalogues, including the application of AACR2, RDA, DDC, LCC, LCSH and MARC 21 standards, and conceptual models such as ISBD, FRBR and FRAD. The text also introduces DC, MODS, METS, EAD and VRA Core metadata schemes for annotating digital resources.
    • Curriculum & Assessment

      • 1st Edition
      • June 28, 2014
      • P. Raggatt + 1 more
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 9 1 3 6
      An Open University set book, it explores recent changes in curriculum and assessment policy, and examines the trend towards centralized control. It also offers an assessment of continuing local authority influences. The selection of articles, though not comprehensive, will be useful to anyone with interest in curriculum and assessment policy.
    • Safeguarding Intangible Assets

      • 1st Edition
      • July 8, 2014
      • Michael D. Moberly
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 5 1 6 3
      • eBook
        9 7 8 0 1 2 8 0 0 6 0 2 3
      Safeguarding Intangible Assets provides strategies for preserving and enhancing a company’s intangible assets to increase its profitability, competitiveness, and sustainability. Intangible assets such as patents, trademarks, copyrights, methodologies, and brand typically account for 80 percent of an organization’s value and revenue. There are many forces making it more and more difficult to protect these assets, and securing them is a complex issue often overlooked by security and risk managers. Many security managers do not have adequate policies or procedures in place to protect these assets from compromise, infringement, and theft. Safeguarding Intangible Assets provides managers with the tools necessary for protecting these assets through effective and consistent oversight designed to preserve their control, use, and ownership. The book offers strategies for various types of business transactions, such as mergers and acquisitions, corporate-university R&D alliances, new product launches, early stage firms, and university-based spin-offs.
    • Science for Hairdressing Students

      • 1st Edition
      • May 20, 2014
      • C. M. Lee + 1 more
      • English
      • Paperback
        9 7 8 1 4 8 3 1 2 4 7 4 2
      • eBook
        9 7 8 1 4 8 3 1 5 7 1 6 0
      Science for Hairdressing Students, Third Edition, has been revised in order to conform to recent examination demands and the more integrated approach to teaching applied science to hairdressing students. It is organized in such a manner as to make it a self-teaching text. All the information is broken up into small study topics with a glossary-index to guide readers. At the end of the book is a huge selection of test questions. The book begins with a discussion of the changes that people want when they come to the salon. This is followed by separate chapters on hairdressing techniques such as shampooing, coloring, lightening, waving, setting, and drying. Subsequent chapters discuss scalp and skin treatments; chemicals used in the salon; creating ideal salon atmosphere, temperature, and lighting; and safety and hygiene in the salon. Also discussed are the parts and functions of the human body; personal hygiene for hairdressers; and first aid for emergencies and accidents. This book is suitable for students studying for: City and Guilds of London Institute Craft Course (Basic 760-1), City and Guilds of London Institute Craft Course (Advanced 760-2), Qualifying Examinations of Hairdressing Council, and American State Review Boards (Cosmetology).
    • The Politics of School Government

      • 1st Edition
      • June 28, 2014
      • G. Baron
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 8 1 6 3
      • eBook
        9 7 8 1 4 8 3 2 9 6 3 6 4
      Leading international scholars consider changes and developments in school government practice in the United States, Canada, England and Wales, Scotland, Australia, New Zealand, France, West Germany, Italy, Denmark, Norway and Sweden. Each chapter looks at the introduction or reform of councils at school level designed to secure the involvement in decision-making of parents, teachers, students and the local community. Essential reading for everyone involved in educational administration this informative book will also be of interest to researchers of comparative education, the politics of education and participatory developments in the field.
    • Linguistic Theory in America

      • 2nd Edition
      • June 28, 2014
      • Frederick J. Newmeyer
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 5 4 3 5
      Linguistic Theory in America, Second Edition focuses on the origin and development of the theory of transformational generative grammar. The book first elaborates on the state of American linguistics in the mid-1950s, the Chomskyan revolution, and the movement from syntactic structures to the aspects of the theory of syntax. Discussions focus on the incorporation of semantics into the model, revisions in the syntactic component, generative phonology, impact of generative grammar on other fields, syntactic structures, and structural linguistics. The text then takes a look at the rise of generative semantics and linguistic wars. Topics include late generative semantics, collapse and legacy of generative semantics, steps to generative semantics, and emerging opposition to generative semantics. The manuscript elaborates on the extended standard theory and approaches to syntax, including generalized phrase structure grammar, constraints on transformational rules, and constraints on surface structure and base rules. The text is a dependable source of data for researchers interested in the theory of transformational generative grammar.
    • The Basics of Digital Forensics

      • 2nd Edition
      • December 9, 2014
      • John Sammons
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 6 3 5 0
      • eBook
        9 7 8 0 1 2 8 0 1 8 9 2 7
      The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud and the Internet are discussed. Also, learn how to collect evidence, document the scene, and how deleted data can be recovered. The new Second Edition of this book provides the reader with real-world examples and all the key technologies used in digital forensics, as well as new coverage of network intrusion response, how hard drives are organized, and electronic discovery. This valuable resource also covers how to incorporate quality assurance into an investigation, how to prioritize evidence items to examine (triage), case processing, and what goes into making an expert witness.
    • Detecting and Combating Malicious Email

      • 1st Edition
      • October 7, 2014
      • Julie JCH Ryan + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 1 1 0 3
      • eBook
        9 7 8 0 1 2 8 0 0 5 4 6 0
      Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient’s computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments.
    • Social Engineering Penetration Testing

      • 1st Edition
      • April 11, 2014
      • Gavin Watson + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 1 2 4 8
      • eBook
        9 7 8 0 1 2 4 2 0 1 8 2 8
      Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks. The authors of Social Engineering Penetration Testing show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.