Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Safeguarding Cultural Properties

      • 1st Edition
      • April 1, 2014
      • Stevan P. Layne
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 1 1 2 5
      • eBook
        9 7 8 0 1 2 4 2 0 1 8 0 4
      Safeguarding Cultural Properties is a step-by-step guide for creating and maintaining a comprehensive security program in any cultural facility or public institution. Author Stevan P. Layne, the leading expert in the field of cultural property protection, draws from his many years of experience providing protection training and planning to more than 350 cultural and public institutions around the world. Designed especially for those with limited security budgets, the book provides a proven and effective program for hiring the right security personnel, selecting the appropriate electronic security systems, and coordinating critical emergency response, along with all the other security issues unique to the needs of a cultural institution. For individuals responsible for the protection of the people, assets, and collections, Safeguarding Cultural Properties saves time and money by providing the essential resources needed for creating a short- and long-term protection plan.
    • The Preservation and Protection of Library Collections

      • 1st Edition
      • August 25, 2014
      • Bogdan Zerek
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 5 9 0
      • eBook
        9 7 8 1 7 8 0 6 3 4 4 0 1
      Preservation involves a complex of activities including climate, air-quality, and surface control, as well as microbiological control, which is a key part of preserving and protecting library collections. The Preservation and Protection of Library Collections examines microbiological control for preservation of library and archival collections. A supporting tool for conservators, this title should be integrated into conservation and preservation policy. The book comprises nine sections that cover three aspects: microbiology, surveying, and the response required. Chapters in this title cover the nature of the library collections, physical and chemicals factors and their impact on microbiological issues, as well as biological factors and methods of microbiological control of the air and objects. Later chapters examine methods of object disinfection, disaster response, methods of microbiological control and evaluation of collections, and includes a vocabulary guide, appendices, literature information and references.
    • Windows Forensic Analysis Toolkit

      • 4th Edition
      • March 11, 2014
      • Harlan Carvey
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 1 5 7 2
      • eBook
        9 7 8 0 1 2 4 1 7 1 7 4 9
      Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, Second Edition, which focuses primarily on XP, and Windows Forensic Analysis Toolkit, Third Edition, which focuses primarily on Windows 7. This new fourth edition provides expanded coverage of many topics beyond Windows 8 as well, including new cradle-to-grave case examples, USB device analysis, hacking and intrusion cases, and "how would I do this" from Harlan's personal case files and questions he has received from readers. The fourth edition also includes an all-new chapter on reporting.
    • Classification in Theory and Practice

      • 2nd Edition
      • August 15, 2014
      • Susan Batley
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 8 5 9
      • eBook
        9 7 8 1 7 8 0 6 3 4 6 6 1
      Following on from the first edition of this book, the second edition fills the gap between more complex theoretical texts and those books with a purely practical approach. The book looks at major library classification schemes in use in Europe, UK and the USA, and includes practical exercises to demonstrate their application. Importantly, classifying electronic resources is also discussed. Classification in Theory and Practice aims to demystify a very complex subject, and to provide a sound theoretical underpinning, together with practical advice and development of practical skills. Chapters concentrate purely on classification rather than cataloguing and indexing, ensuring a more in-depth coverage of the topic.
    • The Mentally Subnormal

      • 2nd Edition
      • May 20, 2014
      • Margaret Adams + 1 more
      • English
      • Paperback
        9 7 8 1 4 8 3 1 7 6 9 4 9
      • eBook
        9 7 8 1 4 8 3 1 9 2 7 5 8
      The Mentally Subnormal: Social Work Approaches, Second Edition provides a discussion of the various issues faced by mentally challenged individuals. The book is comprised of eight chapters that talk about the role of social workers in mitigating the problem. The text first details the development of ideas and legislation relating to the mentally subnormal, and then proceeds to presenting a view of the issue in a medical perspective. The next chapter discusses the principles of casework in the field. Chapter 4 talks about the role of community social care, while Chapter 5 deals with social services to the mentally retarded and their families. The sixth chapter covers social work in residential settings. The remaining chapters tackle the employment problem of mentally handicapped and the implications for services of social research in mental retardation. The book will be of great interest to students, researchers, and practitioners of disciplines that deal with the implication of mental incapacity for society, such as psychology, sociology, and psychiatry.
    • Sasakawa

      • 2nd Edition
      • June 28, 2014
      • P. Daventry
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 7 6 6 1
      • eBook
        9 7 8 1 4 8 3 2 9 9 3 8 9
      Ryoichi Sasakawa's avowed goal in life is the pursuit of world peace and the betterment of mankind. He is one of the world's greatest philanthropists - the biggest individual donor to the United Nations and the World Health Organization - and his humanitarian interests extend from refugee aid to leprosy relief. This second edition of Mr Sasakawa's biography traces his life from its humble origins to its present success and charts the continuing development of his worldwide philanthropic activity, including that for the victims of the famine in Africa.
    • Information Governance and Security

      • 1st Edition
      • September 9, 2014
      • John G. Iannarelli + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 2 4 7 6
      • eBook
        9 7 8 0 1 2 8 0 0 4 0 6 7
      Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization’s most important asset—its proprietary information—safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and this book establishes the enterprise-level systems and disciplines necessary for managing all the information generated by an organization. In addition, the book encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined in Information Governance and Security, organizations can proactively protect their reputation against the threats that most managers have never even thought of.
    • How to Define and Build an Effective Cyber Threat Intelligence Capability

      • 1st Edition
      • December 5, 2014
      • Henry Dalziel
      • Eric Olson + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 3 0 1
      • eBook
        9 7 8 0 1 2 8 0 2 7 5 2 3
      Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.
    • Developing a Comprehensive Security Program

      • 1st Edition
      • February 14, 2014
      • Bob Hayes + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 2 2 2 2
      • eBook
        9 7 8 0 1 2 8 0 0 9 3 0 7
      Developing a Comprehensive Security Program answers the question common among security managers, "What is a model security program, and how does our program compare to it?" In this seven-minute Proven Practices presentation, narrator Elizabeth Lancaster outlines the baseline elements of a security program, which have been defined by experienced Security Executive Council members and research. This presentation is not sector-specific--mea... it's applicable for all organizations and industries. In addition to the baseline security program elements, Lancaster also discusses business-aligned program elements, program characteristics, a program maturity model, and the skills and knowledge the security department needs to possess. Developing a Comprehensive Security Program may be used as a benchmark for existing programs and to educate senior management. It also provides a general understanding of the security function as it currently exists. Developing a Comprehensive Security Program is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Computer Assisted Learning '83

      • 1st Edition
      • Volume 1
      • June 28, 2014
      • P. R. Smith
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 8 1 2 5
      • eBook
        9 7 8 1 4 8 3 2 9 9 0 7 5
      CAL 83 was organised by the Council for Educational Technology in conjunction with Pergamon Press. The selected proceedings include papers from four broad themes: fundamental aspects of CAL, case studies in CAL, hardware for CAL, and future developments, and also two keynote papers by Professors Bork and Alty respectively. The increasing interest in CAL applications in schools is evident from the number of related papers.