Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Demystifying the Institutional Repository for Success

    • 1st Edition
    • Marianne Buehler
    • English
    Institutional repositories remain key to data storage on campus, fulfilling the academic needs of various stakeholders. Demystifying the Institutional Repository for Success is a practical guide to creating and sustaining an institutional repository through marketing, partnering, and understanding the academic needs of all stakeholders on campus. This title is divided into seven chapters, covering: traditional scholarly communication and open access publishing; the academic shift towards open access; what the successful institutional repository looks like; institutional repository collaborations and building campus relationships; building internal and external campus institutional repository relationships; the impact and value proposition of institutional repositories; and looking ahead to open access opportunities.
  • Local Community in the Era of Social Media Technologies

    A Global Approach
    • 1st Edition
    • Hui-Lan Titangos
    • English
    Social media technologies can help connect local communities to the wider world. Local Community in the Era of Social Media Technologies introduces the experience of bringing a local community to the world. This book, with the model of Santa Cruz County, California, develops a truly global approach to the subject. The first section of the book covers the early efforts of recording the local Santa Cruz area, before moving on to deal with Library 1.0. The next section looks at the present situation with Library 2.0 and its benefits. The book ends with a discussion of future directions and the implications of Library 3.0 and beyond.
  • Network and System Security

    • 2nd Edition
    • John Vacca
    • English
    Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
  • Cyber Security and IT Infrastructure Protection

    • 1st Edition
    • John Vacca
    • English
    This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements:• Checklists throughout each chapter to gauge understanding• Chapter Review Questions/Exercises and Case Studies• Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc.
  • Managing Information Security

    • 2nd Edition
    • John Vacca
    • English
    Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.
  • FISMA Compliance Handbook

    Second Edition
    • 1st Edition
    • Laura P. Taylor
    • English
    This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government’s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
  • Interpreting Aerial Photographs to Identify Natural Hazards

    • 1st Edition
    • Charles E. Glass
    • English
    Authored by a world-renowned aerial photography and remote sensing expert, Geographic Aerial Photography: Identifying Earth-Surface Hazards Through Image Interpretation is the most practical and authoritative reference available for any professional or student looking for a reference on how to recognize, analyze, interpret and avoid – or successfully plan for – dangerous contingencies. Whether they are related to natural terrain, geology, vegetation, hydrology or land use patterns – it’s critical for you to be able to recognize dangerous conditions when and where they exist. Failure to adequately recognize and characterize geomorphic, geologic, and hydrologic dangers on the ground using aerial photography is one of the major factors contributing to due to natural hazards and disasters, damage to architectural structures, and often the subsequent loss of human life as a result. Aerial photographs provide one of the most prevalent, inexpensive and under-utilized tools to those with the knowledge and expertise to interpret them.
  • X-Ways Forensics Practitioner’s Guide

    • 1st Edition
    • Brett Shavers + 1 more
    • English
    The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches. With X-Ways Forensics Practitioner's Guide, you will be able to use X-Ways Forensics to its fullest potential without any additional training. The book takes you from installation to the most advanced features of the software. Once you are familiar with the basic components of X-Ways, the authors demonstrate never-before-documen... features using real life examples and information on how to present investigation results. The book culminates with chapters on reporting, triage and preview methods, as well as electronic discovery and cool X-Ways apps.
  • From the Files of a Security Expert Witness

    • 1st Edition
    • Charles A. Sennewald
    • English
    From the Files of a Security Expert Witness guides the reader through the experience of testifying in court on security issues in civil litigation. Written by one of the security profession's best-known expert witnesses, the book explores 36 cases that reflect the high drama of true crime, including kidnapping, rape, and murder. Many of these cases led to premises liability lawsuits based on claims of negligence, inadequate security, false arrest and imprisonment, excessive use of force, and others. Effective security specialists, whether or not they are considering becoming expert witnesses, should be familiar with the facts of these cases, their theories of liability and theories of defense. Encompassing aspects of criminal and tort law, all within the context of forensic security consulting, this book offers valuable insights from an experienced security professional.
  • Forensic Victimology

    Examining Violent Crime Victims in Investigative and Legal Contexts
    • 2nd Edition
    • Brent E. Turvey
    • English
    Published in 2009, the first edition of Forensic Victimology introduced criminologists and criminal investigators to the idea of systematically gathering and examining victim information for the purposes of addressing investigative and forensic issues. The concepts presented within immediately proved vital to social scientists researching victims-offender relationships; investigators and forensic scientists seeking to reconstruct events and establish the elements of a crime; and criminal profilers seeking to link pattern crimes. This is because the principles and guidelines in Forensic Victimology were written to serve criminal investigation and anticipate courtroom testimony. As with the first, this second edition of Forensic Victimology is an applied presentation of a traditionally theoretical subject written by criminal justice practitioners with years of experience-both in the field and in the classroom. It distinguishes the investigative and forensic aspects of applied victim study as necessary adjuncts to what has often been considered a theoretical field. It then identifies the benefits of forensic victimology to casework, providing clearly defined methods and those standards of practice necessary for effectively serving the criminal justice system.