Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Security Careers

    Skills, Compensation, and Career Paths
    • 3rd Edition
    • Stephen W. Walker + 1 more
    • English
    The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, and ethics occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushée Group, which has been conducting this research since 1980. Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a thorough understanding of competitive pay practices across the industry. This book can be used by anyone who manages security personnel or by security professionals who want to develop their careers. Security Careers is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Forensic Anthropology

    Current Methods and Practice
    • 1st Edition
    • Angi M. Christensen + 2 more
    • English
    Forensic Anthropology: Current Methods and Practice—winner of a 2015 Textbook Excellence Award (Texty) from The Text and Academic Authors Association—approach... forensic anthropology through an innovative style using current practices and real case studies drawn from the varied experiences, backgrounds, and practices of working forensic anthropologists. This text guides the reader through all aspects of human remains recovery and forensic anthropological analysis, presenting principles at a level that is appropriate for those new to the field, while at the same time incorporating evolutionary, biomechanical, and other theoretical foundations for the features and phenomena encountered in forensic anthropological casework. Attention is focused primarily on the most recent and scientifically valid applications commonly employed by working forensic anthropologists. Readers will therefore learn about innovative techniques in the discipline, and aspiring practitioners will be prepared by understanding the necessary background needed to work in the field today. Instructors and students will find Forensic Anthropology: Current Methods and Practice comprehensive, practical, and relevant to the modern discipline of forensic anthropology.
  • The Art of Investigative Interviewing

    • 3rd Edition
    • Inge Sebyan Black
    • English
    The Art of Investigative Interviewing, Third Edition can be used by anyone who is involved in investigative interviewing. It is a perfect combination of real, practical, and effective techniques, procedures, and actual cases. Learn key elements of investigative interviewing, such as human psychology, proper interview preparation, tactical concepts, controlling the interview environment, and evaluating the evidence obtained from the interview. Inge Sebyan Black updated the well-respected work of Charles L. Yeschke to provide everything an interviewer needs to know in order to conduct successful interviews professionally, with integrity, and within the law. This book covers the myriad factors of an interview — including issues of evidence, rapport, deception, authority, and setting — clearly and effectively. It also includes a chapter on personnel issues and internal theft controls.
  • Surveillance and Threat Detection

    Prevention versus Mitigation
    • 1st Edition
    • Richard Kirchner
    • English
    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, fixed site facility can be integrated into an overall security footprint for any organization.
  • Credibility Assessment

    Scientific Research and Applications
    • 1st Edition
    • David C. Raskin + 2 more
    • English
    In 2001, the late Murray Kleiner and an array of experts contributed to the Handbook of Polygraph Testing, published by Elsevier, which examined the fundamental principles behind polygraph tests and reviewed the key tests and methods used at that time. In the intervening thirteen years, the field has moved beyond traditional polygraph testing to include a host of biometrics and behavioral observations. The new title reflects the breadth of methods now used. Credibility Assessment builds on the content provided in the Kleiner volume, with revised polygraph testing chapters and chapters on newer methodologies, such as CNS, Ocular-motor, and behavioral measures. Deception detection is a major field of interest in criminal investigation and prosecution, national security screening, and screening at ports of entry. Many of these methods have a long history, e.g., polygraph examinations, and some rely on relatively new technologies, e.g., fMRI and Ocular-motor measurements. Others rely on behavioral observations of persons in less restricted settings, e.g., airport screening. The authors, all of whom are internationally-reco... experts associated with major universities in the United States, United Kingdom, and Europe, review and analyze various methods for the detection of deception, their current applications, and major issues and controversies surrounding their uses. This volume will be of great interest among forensic psychologists, psychophysiologists, polygraph examiners, law enforcement, courts, attorneys, and government agencies.
  • Disaster Communications in a Changing Media World

    • 2nd Edition
    • George Haddow + 1 more
    • English
    Communications are key to the success of disaster mitigation, preparedness, response, and recovery. Accurate information disseminated to the general public, to elected officials and community leaders, as well as to the media, reduces risk, saves lives and property, and speeds recovery. Disaster Communications in a Changing Media World, Second Edition, provides valuable information for navigating these priorities in the age of evolving media. The emergence of new media like the Internet, email, blogs, text messaging, cell phone photos, and the increasing influence of first informers are redefining the roles of government and media. The tools and rules of communications are evolving, and disaster communications must also evolve to accommodate these changes and exploit the opportunities they provide. Disaster Communications in a Changing Media World, Second Edition, illuminates the path to effective disaster communication, including the need for transparency, increased accessibility, trustworthiness and reliability, and partnerships with the media.
  • Malware Forensics Field Guide for Linux Systems

    Digital Forensics Field Guides
    • 1st Edition
    • Eoghan Casey + 2 more
    • English
    Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Linux-based systems, where new malware is developed every day. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Linux system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Linux systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Linux system; and analysis of a suspect program. This book will appeal to computer forensic investigators, analysts, and specialists.
  • Hacking with Kali

    Practical Penetration Testing Techniques
    • 1st Edition
    • James Broad + 1 more
    • English
    Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.
  • Applied Network Security Monitoring

    Collection, Detection, and Analysis
    • 1st Edition
    • Chris Sanders + 1 more
    • English
    Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster. The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data. If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.
  • Cloud Storage Forensics

    • 1st Edition
    • Darren Quick + 2 more
    • English
    To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud. By determining the data remnants on client devices, you gain a better understanding of the types of terrestrial artifacts that are likely to remain at the Identification stage of an investigation. Once it is determined that a cloud storage service account has potential evidence of relevance to an investigation, you can communicate this to legal liaison points within service providers to enable them to respond and secure evidence in a timely manner.