Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Information Security Analytics

      • 1st Edition
      • November 25, 2014
      • Mark Talabis + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 2 0 7 0
      • eBook
        9 7 8 0 1 2 8 0 0 5 0 6 4
      Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization.
    • Retail Security and Loss Prevention

      • 1st Edition
      • June 28, 2014
      • Read Hayes
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 7 6 3 0
      • eBook
        9 7 8 1 4 8 3 2 9 6 0 0 5
      RETAIL SECURITY AND LOSS PREVENTION is an invaluable reference for both retail and security professionals. Using step-by-step plans, this book helps the reader design and implement cost-effective loss control programs.It details an easy-to-follow proven process.
    • Handbook of Perception: Perceptual Processing v. 9

      • 1st Edition
      • June 28, 2014
      • SWAINE
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 4 3 3 2
      • eBook
        9 7 8 1 4 8 3 2 9 7 5 7 6
      Handbook of Perception, Volume IX: Perceptual Processing covers perceptual processing mechanisms, such as attention, search, selection, pattern recognition, and perceptual learning. This volume contains articles that tackle topics on the mechanisms of attention, perceptual structure and selection, selection and categorization in visual search, and the psychological processes in pattern recognition. Subjects on how individual letters are processed, eye movements, perceptual learning, possible explanations of stimulus ambiguity, and perceptual anomalies, distortions, and disorders. This book will be of use to psychologists, biologists, and those interested in the study of perceptual processing.
    • How to Defeat Advanced Malware

      • 1st Edition
      • December 5, 2014
      • Henry Dalziel
      • Simon Crosby
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 3 1 8
      • eBook
        9 7 8 0 1 2 8 0 2 7 5 3 0
      How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization... The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization...
    • Security Leader Insights for Risk Management

      • 1st Edition
      • August 27, 2014
      • Richard Chase
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 4 0 9
      • eBook
        9 7 8 0 1 2 8 0 0 9 0 4 8
      How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Risk Management, a collection of timeless leadership best practices featuring insights from some of the nation’s most successful security practitioners, you can.This book can be used as a quick and effective resource to bring your security staff up to speed on security’s role in risk management. Instead of re-inventing the wheel when faced with a new challenge, these proven practices and principles will allow you to execute with confidence knowing that your peers have done so with success. Part one looks at the risk assessment and subtopics such as compliance, using risk assessments to increase security’s influence, and risk indicator dashboards. Part two discusses risk management topics such as board-level risk, global risk, risk appetite, and enterprise risk management (ERM).Security Leader Insights for Risk Management is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real-world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Disaster Planning for Libraries

      • 1st Edition
      • December 9, 2014
      • Guy Robertson
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 3 0 9
      • eBook
        9 7 8 1 7 8 0 6 3 3 9 6 1
      Libraries are constantly at risk. Every day, many libraries and their collections are damaged by fire, flooding, high winds, power outages, and criminal behaviour. Every library needs a plan to protect its staff, sites and collections, including yours. Disaster Planning for Libraries provides a practical guide to developing a comprehensive plan for any library. Twelve chapters cover essential areas of plan development; these include an overview of the risks faced by libraries, disaster preparedness and responding to disasters, resuming operations after a disaster and assessing damage, declaring disaster and managing a crisis, cleaning up and management after a disaster and normalizing relations, staff training, testing disaster plans, and the in-house planning champion.
    • Library Instruction Design

      • 1st Edition
      • July 25, 2014
      • Di Su
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 4 1 5
      • eBook
        9 7 8 1 7 8 0 6 3 4 0 7 4
      The design philosophies of Google and Apple represent different approaches to new product design. Google's model features bottom-up and data-driven decision-making processes, while Apple's model is to design and build products top-down. Library instruction program design may learn from these differing but complementary approaches. Inspired by Google’s and Apple’s success, Library Instruction Design details how library instruction program design may learn from the philosophy of product design in the business world. In designing library instruction, a Google-philosophy approach teaches what the user wants to know while an Apple-philosophy approach teaches what the librarian thinks the user needs to learn. These two design philosophies aim at different teaching objectives reflecting library and information science education in modern society. The book is divided into five sections, with opening sections covering library instruction, the philosophy of library instruction design and design philosophy from different angles. Later sections discuss applying Google’s model and applying Apple’s model.
    • Social and Community Medicine for Students

      • 1st Edition
      • May 20, 2014
      • Una MacLean
      • English
      • Paperback
        9 7 8 0 4 3 3 2 0 1 2 0 5
      • eBook
        9 7 8 1 4 8 3 1 8 2 9 9 5
      Social and Community Medicine for Students presents an extensive examination of the application of medical sociology to community treatment. It discusses the principles behind the scope and methods of epidemiology. It addresses studies in attitudes and illness. Some of the topics covered in the book are the sick role in Western Societies; sickness behavior in a traditional society; statistics vital to social medicine; geographical pathology of cancer; scope and methods of epidemiology; possibilities and limitations of health education; and health in industry and external disability. The definition and description of social provisions for health and welfare are fully covered. An in-depth account of the common features and development of social medicine are provided. The epidemiology of the cancer of the esophagus is completely presented. A chapter is devoted to description and diagnosis of ischaemic heart disease. Another section focuses on the practical applications of social medicine. The book can provide useful information to doctors, students, and researchers.
    • Transfer of Learning

      • 1st Edition
      • June 28, 2014
      • Stephen M. Cormier + 1 more
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 7 3 7 8
      Since the mid-1970s, scientific and educational research has left a gap in the field of basic and applied research on transfer of learning. This book fills the gap with state-of-the-art information on recent research in the field, emphasizing methodological paradigms and interpretive concepts based on contemporary cognitive/informatio... processing approaches to the study of human behavior. Issues discussed include how transfer is measured, how its direction and magnitude are determined, how training for transfer differs from training for acquisition, and whether different principles of transfer apply to motor, cognitive, and meta-cognitive processes.
    • The Process of Investigation

      • 4th Edition
      • December 30, 2014
      • Charles A. Sennewald + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 8 0 0 1 6 6 0
      • eBook
        9 7 8 0 1 2 8 0 0 6 4 3 6
      The Process of Investigation, Fourth Edition addresses the needs of today’s private sector investigative professional by providing a full-spectrum treatment of the investigative process, from case inception and investigative strategy selection to executing complex investigative techniques, to creating reports useful for corporate, legal, and prosecutorial purposes.Continuing in the tradition of its previous editions, The Process of Investigation, Fourth Edition covers essential topics overlooked in books on the public aspects of investigation. Investigative skills such as surveillance techniques, interviewing and interrogation, collecting and documenting evidence, and taking confessions and written statements are all discussed, and supplemented with updated case studies and examples from the authors’ own professional experiences.