Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • The Handbook for School Safety and Security

      • 1st Edition
      • August 12, 2014
      • Lawrence J. Fennelly + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 5 6 8 2
      • eBook
        9 7 8 0 1 2 8 0 0 6 2 5 2
      School security is one of the most pressing public concerns today. Yet in most schools, there is little security expertise or detailed knowledge about how to implement and manage a security program. The Handbook for School Safety and Security rectifies this problem by providing the salient information school administrators and security professionals need to address the most important security issues schools face. Made up of contributions from leading experts in school security, The Handbook for School Safety and Security provides a wealth of practical information for securing any K-12 school. It discusses key approaches and best practices for school crime prevention, including such topics as crisis management and mass notification. It also covers the physical measure needed for protecting a school, including detailed discussions of access control, lighting, alarms, and locks. While there is no single fix for the myriad of security challenges facing today’s school security professionals, the best practices found in The Handbook for School Safety and Security will help increase the safety and security of any school.
    • The IEA Study of Mathematics III

      • 1st Edition
      • June 28, 2014
      • Rami Burstein
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 7 6 2 3
      • eBook
        9 7 8 1 4 8 3 2 9 6 3 1 9
      The Second International Mathematics Study was conducted in the schools of 20 education systems under the sponsorship of the International Association for the Evaluation of Educational Achievement (IEA). This is the third of three international reports, each of which focus on a major component of the study. This volume describes the main findings from analyses of classroom processes and mathematic growth by posing such questions as: how successful have the national education systems been in providing the opportunity to learn mathematics by the end of the lower secondary school; what do students at the lower secondary level know across educational systems and what have they learned during their most recent schooling experiences; and what teaching practices are utilized in the mathematics classroom of the various systems and to what extent can these classroom processes explain differences in student achievements?
    • Digital Video Surveillance and Security

      • 2nd Edition
      • March 18, 2014
      • Anthony C. Caputo
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 0 4 2 5
      • eBook
        9 7 8 0 1 2 4 2 0 0 4 3 2
      The use of digital surveillance technology is rapidly growing as it becomes significantly cheaper for live and remote monitoring. The second edition of Digital Video Surveillance and Security provides the most current and complete reference for security professionals and consultants as they plan, design, and implement surveillance systems to secure their places of business. By providing the necessary explanations of terms, concepts, and technological capabilities, this revised edition addresses the newest technologies and solutions available on the market today. With clear descriptions and detailed illustrations, Digital Video Surveillance and Security is the only book that shows the need for an overall understanding of the digital video surveillance (DVS) ecosystem.
    • Children in the Information Age

      • 1st Edition
      • May 17, 2014
      • Blagovest Sendov + 1 more
      • English
      • Paperback
        9 7 8 1 4 8 3 1 2 6 6 0 9
      • eBook
        9 7 8 1 4 8 3 1 5 9 0 2 7
      Children in the Information Age: Opportunities for Creativity, Innovation and New Activities contains selected papers from the Second International Conference and Exhibition ""Children in the Information Age: Opportunities for Creativity, Innovation and New Activities,"" held in Sofia, Bulgaria, 19-23 May 1987. The contributions made by researchers at the conference covered topics such as the past, present, and future of school informatics in the USSR; the family computer boom and its implications for computer literacy; the new meanings of literacy related to new information and communication technologies; computer use in education; and literacy in the information age. Other papers dealt with computer-based training in India; knowledge based systems for use in pedagogical contexts; informatics competitions in Germany; the information age; information and communication technology in the French educational system; and the role of information technology in education in Australia. The final two chapters present the recommendations that emerged from the conference as well as the recommendations of the Working Meeting of Editors of Journals and Magazines on Informatics in Education.
    • Skills to Make a Librarian

      • 1st Edition
      • December 11, 2014
      • Dawn Lowe-Wincentsen
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 0 6 3 2
      • eBook
        9 7 8 0 0 8 1 0 0 0 6 5 6
      The library and information profession builds skills and expertise that cover a wide spectrum. These skills are often desirable in other fields and industries. Likewise, the skills we build before entering the library and information professions can help us as professionals. Skills to Make a Librarian looks at both sides of this equation through a collection of essays by current and former librarians and information professionals who make use of this wide range of cross disciplinary skills.
    • Security Leader Insights for Information Protection

      • 1st Edition
      • May 24, 2014
      • Bob Fahy
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 4 3 0
      • eBook
        9 7 8 0 1 2 8 0 0 9 0 7 9
      How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation’s most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security’s role in information protection. Instead of re-inventing the wheel when faced with a new challenge, these proven practices and principles will allow you to execute with confidence knowing that your peers have done so with success. It includes chapters on the collaboration between corporate and information security, emerging issues in information protection, and information protection regulations and standards. Security Leader Insights for Information Protection is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • How to Attack and Defend Your Website

      • 1st Edition
      • December 5, 2014
      • Henry Dalziel
      • Alejandro Caceres
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 3 2 5
      • eBook
        9 7 8 0 1 2 8 0 2 7 5 4 7
      How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools – most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.
    • Studies in Lexical Phonology

      • 1st Edition
      • Volume 4
      • May 19, 2014
      • Sharon Hargus + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 2 5 0 7 1 1
      • eBook
        9 7 8 1 4 8 3 2 9 6 1 7 3
      Phonetics and Phonology, Volume 4: Studies in Lexical Phonology focuses on studies done on lexical phonology, including methods, techniques, and approaches involved in the field. The selection first underscores the simultaneity of morphological and prosodic structure, modeling the phonology-morphology interface, and deriving cyclicity. Discussions focus on affixation and cyclicity in prosodic lexical phonology, prosodic lexical phonology, theories of phonology-morphology interaction, phonology preceding morphology, and evidence for simultaneity. The book then examines interaction between modules in lexical phonology and the structure of the slave (Northern Athabaskan) verb. The book ponders on word level, structure preservation and postlexical tonology in Dagbani, and (post) lexical rule application. Topics include context-sensitivity in underspecification, postlexical and lexical tonology, word cycle, and English allophonic rules. The manuscript also tackles rule domains and phonological change, rule reordering and rule generalization in lexical phonology, and blocking in nonderived environments. The selection is a valuable reference for researchers interested in lexical phonology.
    • Industrial Network Security

      • 2nd Edition
      • December 9, 2014
      • Eric D. Knapp + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 1 1 4 9
      • eBook
        9 7 8 0 1 2 4 2 0 1 8 4 2
      As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
    • Computers and the General Practitioner

      • 1st Edition
      • May 9, 2014
      • Alastair Malcolm + 1 more
      • English
      • Paperback
        9 7 8 1 4 8 3 1 7 4 1 8 1
      • eBook
        9 7 8 1 4 8 3 1 8 9 9 9 4
      Computers and the General Practitioner focuses on the applications of computers in various aspects of health service, including ECG analysis, primary care, and diagnosis. The selection first tackles general practice and technological promise and experience of pioneers. Topics include information systems and general practice, trends in silicon chip technology, and problems of computer usage in National Health Service practice. The publication then examines security in computer controlled information systems and national strategy for primary care computing, including security defenses, linked systems, cryptography, and basic system. The text takes a look at the computer education of the general practitioner, use of computers in the consulting room, and ECG analysis by computer in general practice. Discussions focus on the problems associated with educating doctors, features of a heuristic system, and the function of the computer as a general practitioner's diagnostic assistant. The selection is a dependable source of data for doctors and readers interested in exploring the applications of computers in health services.