Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Investigating Internet Crimes

    An Introduction to Solving Crimes in Cyberspace
    • 1st Edition
    • Todd G. Shipley + 1 more
    • English
    Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim. Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.
  • Introduction to Information Security

    A Strategic-Based Approach
    • 1st Edition
    • Timothy Shimeall + 1 more
    • English
    Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information.Informat... security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel.
  • Computer Incident Response and Forensics Team Management

    Conducting a Successful Incident Response
    • 1st Edition
    • Leighton Johnson
    • English
    Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.
  • Social Media Security

    Leveraging Social Networking While Mitigating Risk
    • 1st Edition
    • Michael Cross
    • English
    Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people’s lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis).However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control.
  • Inside China's Legal System

    • 1st Edition
    • Chang Wang + 1 more
    • English
    China’s legal system is vast and complex, and robust scholarship on the subject is difficult to obtain. Inside China’s Legal System provides readers with a comprehensive look at the system including how it works in practice, theoretical and historical underpinnings, and how it might evolve. The first section of the book explains the Communist Party’s utilitarian approach to law: rule by law. The second section discusses Confucian and Legalist views on morality, law and punishment, and the influence such traditional Chinese thinking has on contemporary Chinese law. The third section focuses on the roles of key players (including judges, prosecutors, lawyers, and legal academics) in the Chinese legal system. The fourth section offers Chinese legal case studies in civil, criminal, administrative, and international law. The book concludes with a comparison of China’s fundamental governing and legal principles with those of the United States, in such areas as checks and balances, separation of powers, and due process.
  • Building Communities

    Social Networking for Academic Libraries
    • 1st Edition
    • Denise Garofalo
    • English
    Social media is here to stay. A robust social media campaign can provide academic libraries with a means to showcase library resources, highlight content and events, and attract students to sample what the library has to offer. Building Communities is a handbook to implement social media technologies for academic libraries. It is a guide to planning and implementing a successful social media campaign and evaluating its impact. This title covers: the beginning of social networking in the academic context; how to implement use of social media technologies; and evaluating their use. The final section considers the future and asks: ‘What’s next?’
  • Service Science and the Information Professional

    • 1st Edition
    • Yvonne de Grandbois
    • English
    As we transition to a service and information-based economy, information specialists are projected onto the leading edge of an emerging science. Service Science and theInformation Professional demonstrates how the power of this new transdisciplinary field can inform and transform the current information professional world. Service Science is about people, technology, information, and organizations. Service Science can be of great benefit to Information Centres everywhere, and Information Service outlets can be a tremendous field of research for this new science. iSchools and Schools of Information Studies can join Computer Science, Engineering and Business Schools in receiving research grants for the development of Service Science. Information professionals need to know this new discipline and be inspired to participate in it.
  • Making a Collection Count

    A Holistic Approach to Library Collection Management
    • 2nd Edition
    • Holly Hibner + 1 more
    • English
    Library collection management is a vital part of any library’s operations. Making a Collection Count takes a holistic look at library collection management, connecting collection management activities and departments, and instructs on how to gather and analyse data from each point in a collection’s lifecycle. Relationships between collections and other library services are also explored. The result is a quality collection that is clean, current, and useful. The second edition includes expanded information on collection metrics, digital collections, and practical advice for managing collections effi ciently when time and resources are tight. It also includesmore real-life examples from practicing librarians in areas such as workflow analysis, collection budgets, and collection management techniques. Chapters cover the life cycle of a collection, understanding workfl ow and collecting metrics. Physical inventory, collection objectives and bookmarks, as well as collection organization, collection budgets and marketing collections are also discussed.
  • The Basics of IT Audit

    Purposes, Processes, and Practical Information
    • 1st Edition
    • Stephen D. Gantz
    • English
    The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements. This guide provides you with all the necessary information if you're preparing for an IT audit, participating in an IT audit or responding to an IT audit.
  • Whole Brain® Learning in Higher Education

    Evidence-Based Practice
    • 1st Edition
    • Ann-Louise de Boer + 3 more
    • English
    Facilitating of learning in higher education can be transformed through the use of Whole Brain® learning. Whole Brain® Learning in Higher Education argues that facilitating learning in Higher Education should undergo transformation in order to develop the full academic potential of all stakeholders following the principles of action research. Empirical data was collected from participants in a number of projects across diverse disciplines. Participants included students, academic staff, instructional designers, and professionals attending short courses at tertiary level.A number of case studies are discussed as evidence for the value of the proposed model for higher education. This title consists of seven chapters, covering: the theoretical framework, baseline study, professional development, studies in Whole Brain® application, learning material that makes a difference, multidisciplinary collaboration, and the way forward.