Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Bloodstain Patterns

      • 1st Edition
      • December 3, 2014
      • Anita Y. Wonder
      • English
      • eBook
        9 7 8 0 1 2 4 1 5 9 6 5 5
      Bloodstain Patterns: Identification, Interpretation and Application combines material from Blood Dynamics (2001) and Bloodstain Pattern Evidence (2007) with updated case work and scientific advances from medical and hard sciences. The text expands coverage of such areas as arterial damage pattern identification, staging of crime scenes, legal applications and problems from both sides of the bench, and extending teaching and training to those outside criminal justice. With violent offenders more aware of crime scene investigation techniques and attempting to frame others, the text expands outdated basic training programs that are insufficient to identify attempts to confuse the investigation. This book clarifies previous understandings as well as bridges the gap toward future advance courses. Based on the work of Paul Leland Kirk, the book’s focus is on first line investigators’ accuracy in identifying specific bloodstain patterns, correctly interpreting and applying them to casework.
    • The Geography of Tropical African Development

      • 2nd Edition
      • June 28, 2014
      • A. M. O'Connor
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 7 0 5 7
      This best selling textbook focuses on the changes in geographical patterns that have taken place in recent years i.e. on the geographical pattern of recent and current economic change. The area covered includes the countries lying between the limits of the Tropic of Cancer and the Tropic of Capricorn. In this second edition substantial changes have been made in every chapter in order to keep up to date in respect of both the geographical pattern of development and prevailing attitudes towards it. The discussion is still largely confined to the twenty year period between 1956 and 1976, and to the economic component of development
    • Literary Concordances

      • 1st Edition
      • June 28, 2014
      • T. H. Howard-Hill
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 7 6 5 4
      • eBook
        9 7 8 1 4 8 3 2 9 6 7 5 3
      All problems likely to be encountered by anyone who intends to prepare a literary concordance are discussed on a practical level, although there is substantial examination of more advanced concording techniques which the computer makes it possible to adopt. Although the emphasis is on works in English, the structural principles which are analysed in the book can be applied readily to works in other languages
    • Nasals, Nasalization, and the Velum

      • 1st Edition
      • Volume 5
      • May 19, 2014
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 5 6 2 6
      Although nasalization has been discussed in the context of more general aspects of linguistics in other books, this text is the first and primary resource focusing solely on nasalization. This volume features articles discussing all aspects of nasalization, including physiology, perception, aerodynamics, acoustics, phonetic and phonological representations, research methodology, and instrumentation. Each chapter examines important research advances achieved within the last ten years and closes with a detailed discussion of the current research.
    • Designing and Building Security Operations Center

      • 1st Edition
      • November 6, 2014
      • David Nathans
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 9 9 7
      • eBook
        9 7 8 0 1 2 8 0 1 0 9 6 9
      Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers’ information. Designing and Building a Security Operations Center will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. Written by a subject expert who has consulted on SOC implementation in both the public and private sector, Designing and Building a Security Operations Center is the go-to blueprint for cyber-defense.
    • Misleading DNA Evidence

      • 1st Edition
      • June 12, 2014
      • Peter Gill
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 2 1 4 2
      • eBook
        9 7 8 0 1 2 4 1 7 2 2 0 3
      Misleading DNA Evidence: A Guide for Scientists, Judges, and Lawyers presents the reasons miscarriages of justice can occur when dealing with DNA, what the role of the forensic scientist is throughout the process, and how judges and lawyers can educate themselves about all of the possibilities to consider when dealing with cases that involve DNA evidence. DNA has become the gold standard by which a person can be placed at the scene of a crime, and the past decade has seen great advances in this powerful crime solving tool. But the statistics that analysts can attach to DNA evidence often vary, and in some cases the statistical weight assigned to that match, can vary enormously. The numbers provided to juries often overstate the evidence, and can result in a wrongful conviction. In addition to statistics, the way the evidence is collected, stored and analyzed can also result in a wrongful conviction due to contamination. This book reviews high-profile and somewhat contentious cases to illustrate these points, including the death of Meredith Kercher. It examines crucial topics such as characterization of errors and determination of error rates, reporting DNA profiles and the source and sub-source levels, and the essentials of statement writing. It is a concise, readable resource that will help not only scientists, but legal professionals with limited scientific backgrounds, to understand the intricacies of DNA use in the justice system.
    • After the Book

      • 1st Edition
      • August 18, 2014
      • George Stachokas
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 3 9 2
      • eBook
        9 7 8 1 7 8 0 6 3 4 0 5 0
      Libraries and librarians have been defined by the book throughout modern history. What happens when society increasingly lets print go in favour of storing, retrieving and manipulating electronic information? What happens after the book? After the Book explores how the academic library of the 21st Century is first and foremost a provider of electronic information services. Contemporary users expect today’s library to provide information as quickly and efficiently as other online information resources. The book argues that librarians need to change what they know, how they work, and how they are perceived in order to succeed according to the terms of this new paradigm. This title is structured into eight chapters. An introduction defines the challenge of electronic resources and makes the case for finding solutions, and following chapters cover diversions and half measures and the problem for libraries in the 21st century. Later chapters discuss solving problems through professional identity and preparation, before final chapters cover reorganizing libraries to serve users, adapting to scarcity, and the ‘digital divide’.
    • Shaping Knowledge

      • 1st Edition
      • September 26, 2014
      • Jamie O’Brien
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 5 1 4
      • eBook
        9 7 8 1 7 8 0 6 3 4 3 2 6
      Organizations in ever-changing environments depend upon their knowledge, as their survival depends upon effective thinking and agile actions. Any organization’s knowledge is its prime asset yet its true value requires the activations of structure, query, search and decision. Shaping Knowledge provides an introduction to the key tools for thinking required by decision-making professionals in today’s knowledge-intensive landscapes, and equips them with key skills to capitalize on knowledge resources. This book provides practical methods and critical insights for modelling knowledge-driven domains, providing a rich resource for exploration in professional development and practice.
    • Information Hiding in Speech Signals for Secure Communication

      • 1st Edition
      • August 27, 2014
      • Zhijun Wu
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 3 2 8 1
      • eBook
        9 7 8 0 1 2 8 0 1 4 8 1 3
      In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more. This book shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN.
    • Targeted Cyber Attacks

      • 1st Edition
      • April 18, 2014
      • Aditya Sood + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 6 0 4 7
      • eBook
        9 7 8 0 1 2 8 0 0 6 1 9 1
      Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gatheri... and planning to a degree that drastically changes its profile. Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.