Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

    • Data Mining and Predictive Analysis

      • 2nd Edition
      • December 30, 2014
      • Colleen McCue
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 2 2 9 2
      • eBook
        9 7 8 0 1 2 8 0 0 4 0 8 1
      Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, 2nd Edition, describes clearly and simply how crime clusters and other intelligence can be used to deploy security resources most effectively. Rather than being reactive, security agencies can anticipate and prevent crime through the appropriate application of data mining and the use of standard computer programs. Data Mining and Predictive Analysis offers a clear, practical starting point for professionals who need to use data mining in homeland security, security analysis, and operational law enforcement settings.This revised text highlights new and emerging technology, discusses the importance of analytic context for ensuring successful implementation of advanced analytics in the operational setting, and covers new analytic service delivery models that increase ease of use and access to high-end technology and analytic capabilities. The use of predictive analytics in intelligence and security analysis enables the development of meaningful, information based tactics, strategy, and policy decisions in the operational public safety and security environment.
    • Augmented Reality Law, Privacy, and Ethics

      • 1st Edition
      • December 9, 2014
      • Brian Wassom
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 2 0 8 7
      • eBook
        9 7 8 0 1 2 8 0 0 5 2 4 8
      Augmented Reality (AR) is the blending of digital information in a real-world environment. A common example can be seen during any televised football game, in which information about the game is digitally overlaid on the field as the players move and position themselves. Another application is Google Glass, which enables users to see AR graphics and information about their location and surroundings on the lenses of their "digital eyewear", changing in real-time as they move about. Augmented Reality Law, Privacy, and Ethics is the first book to examine the social, legal, and ethical issues surrounding AR technology. Digital eyewear products have very recently thrust this rapidly-expanding field into the mainstream, but the technology is so much more than those devices. Industry analysts have dubbed AR the "eighth mass medium" of communications. Science fiction movies have shown us the promise of this technology for decades, and now our capabilities are finally catching up to that vision. Augmented Reality will influence society as fundamentally as the Internet itself has done, and such a powerful medium cannot help but radically affect the laws and norms that govern society. No author is as uniquely qualified to provide a big-picture forecast and guidebook for these developments as Brian Wassom. A practicing attorney, he has been writing on AR law since 2007 and has established himself as the world's foremost thought leader on the intersection of law, ethics, privacy, and AR. Augmented Reality professionals around the world follow his Augmented Legality® blog. This book collects and expands upon the best ideas expressed in that blog, and sets them in the context of a big-picture forecast of how AR is shaping all aspects of society.
    • Security for Business Professionals

      • 1st Edition
      • August 12, 2014
      • Bradley A. Wayland
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 5 6 5 1
      • eBook
        9 7 8 0 1 2 8 0 0 6 2 1 4
      Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don’t have the resources to hire an in-house security staff. It can also be used for assessing the adequacy of an existing security program. The book provides an overview of the key security objectives and challenges that managers face, such as how to measure the effectiveness of a security program and balance the costs and benefits. It also shows how to develop security procedures that conform to key regulatory requirements, and how to assess an organization’s most important risks, vulnerabilities, and threats. Security for Business Professionals addresses key physical and informational security concerns, including areas such as asset protection, loss prevention, and personnel security. It also discusses how to develop emergency and incident response plans, and concludes with suggested safety and security exercises and training recommendations.
    • Building an Intelligence-Led Security Program

      • 1st Edition
      • December 5, 2014
      • Allan Liska
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 1 4 5 3
      • eBook
        9 7 8 0 1 2 8 0 2 3 7 0 9
      As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents. The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way.
    • The Horner Site

      • 1st Edition
      • June 28, 2014
      • George C. Frison + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 2 6 8 5 6 6 8
      • eBook
        9 7 8 1 4 8 3 2 9 9 3 6 5
      The Horner Site: The Type Site of the Cody Cultural Complex covers significant archaeological and geological research studies of the analytic and interpretative analysis of the Horner site. This 11-chapter text specifically explores the early Paleoindian studies at the site. The introductory chapters reflect the history of the Princeton and Smithsonian investigations at the Horner site, including the excavation techniques, geologic studies, stone tool assemblage, and faunal remains. The subsequent chapters discuss the paleoecological studies conducted by the University of Wyoming at the site, specifically the taphonomy of the Horner II bone bed. These topics are followed by descriptions of the projectile points and specialized bifaces from the Horner site, as well as the stone flaking material sources for the site. Other chapters focus on the geological features and the local fauna of the Horner site. The concluding chapters examine the soil formation and paleoenvironmental interpretation at the site. This book will be of great value to archaeologists, geologists, and paleontologists.
    • Securing VoIP

      • 1st Edition
      • November 14, 2014
      • Regis J. Jr (Bud) Bates
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 0 3 9 1
      • eBook
        9 7 8 0 1 2 4 1 7 1 2 2 0
      Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.
    • The Arts and Personal Growth

      • 1st Edition
      • May 19, 2014
      • Malcolm Ross
      • English
      • Paperback
        9 7 8 1 4 8 3 1 2 4 5 1 3
      • eBook
        9 7 8 1 4 8 3 1 5 6 9 3 4
      The Arts and Personal Growth focuses on the influence of arts education to personal growth, including the development of curriculum that puts the study of the arts at the core and learning of the arts in different time frames and educational considerations. The book is composed of papers derived from the conference conducted at Dillington House in Somerset from July 23 to 28, 1979 under the auspices of the University of Exeter with assistance from the Michael Marks Charitable Trust. The selection first outlines the meaning of the arts and the need for school curriculum to include both social and political settings in curriculum development. The book then examines the interrelations of arts education, curriculum, and multi-cultural society, putting emphasis on the contention that minorities have brought with them valid cultures that have various art forms. The text underscores the need to put arts at the highest consideration in curriculum development. The challenges posed to teachers of arts and the ability of experts in the arts to maintain natural and human artefacts are noted. The manuscript also ponders on the reality that learning the arts surpasses age and educational boundaries. The influence of art to a sound personal development is also mentioned. The publication is a dependable reference for readers and art patrons interested in the value of arts in personal growth.
    • Multilevel Analysis of Educational Data

      • 1st Edition
      • June 28, 2014
      • R. Darrell Bock
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 5 6 0 2
      Multilevel Analysis of Educational Data focuses on the principles and procedures used in the evaluation of educational progress. The selection first offers information on some applications of multilevel models to educational data, empirical Bayes methods, and a hierarchical item-response model for educational testing. Discussions focus on the interface between levels, group-level model for content elements, an application of empirical Bayes, validity generalization, improving law school validity studies, and summarizing evidence in randomized experiments on coaching. The text then takes a look at difficulties with Bayesian inference for random effects and multilevel aspects of varying parameters in structural models. The book elaborates on models for multilevel response variables with an application to growth curves and the issues and problems emerging from the application of multilevel models in British studies of school effectiveness, including enduring questions, two-level models, estimation and prediction, and econometric random coefficient modeling. The selection is a dependable reference for educators and researchers interested in the evaluation of educational progress.
    • Personal Social Services

      • 1st Edition
      • May 21, 2014
      • B. P. Davies
      • W. F. Maunder
      • English
      • eBook
        9 7 8 1 4 8 3 1 9 3 1 4 4
      Personal Social Services serves as a comprehensive source of statistical data for any researcher, be they students or professional. The text opens with a definition of children’s services, health and welfare services. It describes and discusses local authority personal social service statistics generated by authorities responsible for rendering social services. The volume also provides the changes that occurred from 1948 to 1970. The book surveyed the services being given to aged people and the handicapped. The discussion proceeds to the powers and duties of local authorities, and a description of the way they conduct their obligations. The process of private fostering and adoption are described. A part of the text reviews and describes the statistical returns. The statistical returns for children’s services and those coming from the services for old people and the handicapped are evaluated. Another chapter focuses on the returns from mental health service. The last chapter of the book discusses the development of statistical data, the needs this data serves, the inputs, outputs, their combinations and interpretation. The book will provide useful information to government service provider, statistician, students, and researchers in the field of statistics.
    • The Basics of Information Security

      • 2nd Edition
      • May 20, 2014
      • Jason Andress
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 4 4 0
      • eBook
        9 7 8 0 1 2 8 0 0 8 1 2 6
      As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.