Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • X-Ways Forensics Practitioner’s Guide

    • 1st Edition
    • August 10, 2013
    • Brett Shavers + 1 more
    • English
    The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches. With X-Ways Forensics Practitioner's Guide, you will be able to use X-Ways Forensics to its fullest potential without any additional training. The book takes you from installation to the most advanced features of the software. Once you are familiar with the basic components of X-Ways, the authors demonstrate never-before-documen... features using real life examples and information on how to present investigation results. The book culminates with chapters on reporting, triage and preview methods, as well as electronic discovery and cool X-Ways apps.
  • From the Files of a Security Expert Witness

    • 1st Edition
    • August 9, 2013
    • Charles A. Sennewald
    • English
    From the Files of a Security Expert Witness guides the reader through the experience of testifying in court on security issues in civil litigation. Written by one of the security profession's best-known expert witnesses, the book explores 36 cases that reflect the high drama of true crime, including kidnapping, rape, and murder. Many of these cases led to premises liability lawsuits based on claims of negligence, inadequate security, false arrest and imprisonment, excessive use of force, and others. Effective security specialists, whether or not they are considering becoming expert witnesses, should be familiar with the facts of these cases, their theories of liability and theories of defense. Encompassing aspects of criminal and tort law, all within the context of forensic security consulting, this book offers valuable insights from an experienced security professional.
  • Forensic Victimology

    Examining Violent Crime Victims in Investigative and Legal Contexts
    • 2nd Edition
    • August 8, 2013
    • Brent E. Turvey
    • English
    Published in 2009, the first edition of Forensic Victimology introduced criminologists and criminal investigators to the idea of systematically gathering and examining victim information for the purposes of addressing investigative and forensic issues. The concepts presented within immediately proved vital to social scientists researching victims-offender relationships; investigators and forensic scientists seeking to reconstruct events and establish the elements of a crime; and criminal profilers seeking to link pattern crimes. This is because the principles and guidelines in Forensic Victimology were written to serve criminal investigation and anticipate courtroom testimony. As with the first, this second edition of Forensic Victimology is an applied presentation of a traditionally theoretical subject written by criminal justice practitioners with years of experience-both in the field and in the classroom. It distinguishes the investigative and forensic aspects of applied victim study as necessary adjuncts to what has often been considered a theoretical field. It then identifies the benefits of forensic victimology to casework, providing clearly defined methods and those standards of practice necessary for effectively serving the criminal justice system.
  • The Metadata Manual

    A Practical Workbook
    • 1st Edition
    • July 31, 2013
    • Rebecca Lubas + 2 more
    • English
    Cultural heritage professionals have high levels of training in metadata. However, the institutions in which they practice often depend on support staff, volunteers, and students in order to function. With limited time and funding for training in metadata creation for digital collections, there are often many questions about metadata without a reliable, direct source for answers. The Metadata Manual provides such a resource, answering basic metadata questions that may appear, and exploring metadata from a beginner’s perspective. This title covers metadata basics, XML basics, Dublin Core, VRA Core, and CDWA schemes and provides exercise in the creation of metadata. Finally, the book gives an overview of metadata, including mapping and sharing.
  • Security Risks in Social Media Technologies

    Safe Practices in Public Service Applications
    • 1st Edition
    • July 31, 2013
    • Alan Oxley
    • English
    Security measures can be used by management, IT staff, and users in participatory/collab... service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collab... pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collab... in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.
  • Creating and Maintaining an Information Literacy Instruction Program in the Twenty-First Century

    An Ever-Changing Landscape
    • 1st Edition
    • July 31, 2013
    • Nancy Noe
    • English
    The Association of College and Research Libraries (ACRL) set forth Characteristics of Programs of Information Literacy that Illustrate Best Practices: A Guideline. Creating and Maintaining an Information Literacy Instruction Program in the Twenty-First Century provides readers with a real-world, practical guide for creating an instruction program step-by-step, as well as a framework for reviewing, assessing, and updating existing programs. Each chapter focuses on one of the main aspects of the ACRL guidelines. Current research, anecdotal evidence and tools provide the reader with the support and instruments needed to either begin, or reinvigorate, an instruction program.The book begins by placing information literacy in programme context. It then covers how to survey your current program, and how to develop and implementing a program plan. The next chapters concentrate on administrative and institutional support; curriculum integration and campus collaboration; present and future students; pedagogy for the information professional; program marketing and outreach; assessment and future trends. Finally, this book concludes by asking its readers to re-survey their information literacy instruction program landscape once again.
  • A Handbook of Digital Library Economics

    Operations, Collections and Services
    • 1st Edition
    • July 31, 2013
    • Wendy Evans + 1 more
    • English
    This book provides a companion volume to Digital Library Economics and focuses on the ‘how to’ of managing digital collections and services (of all types) with regard to their financing and financial management. The emphasis is on case studies and practical examples drawn from a wide variety of contexts. A Handbook of Digital Library Economics is a practical manual for those involved – or expecting to be involved – in the development and management of digital libraries.
  • Managing and Supporting Student Diversity in Higher Education

    A Casebook
    • 1st Edition
    • July 31, 2013
    • Robyn Benson + 4 more
    • English
    Government initiatives in many countries emphasise social inclusion in higher education, resulting in a more diverse student population. This presents opportunities and challenges for academic and professional staff in managing and supporting these students. Managing and Supporting Student Diversity in Higher Education focuses on how students succeed amidst a culture of widening participation. The book is divided into seven chapters. The first introduces current literature and policies to present an international perspective on widening participation in higher education. The following five chapters present students’ stories on topics including getting into higher education, the international experience, coping with education later in life, and identity. Stories are followed by implications for management and support, and discussion topics for practitioners. The book concludes by looking at how students succeed in higher education and the implications for managing and supporting student diversity.
  • Multimedia Information Retrieval

    Theory and Techniques
    • 1st Edition
    • July 31, 2013
    • Roberto Raieli
    • English
    Novel processing and searching tools for the management of new multimedia documents have developed. Multimedia Information Retrieval (MIR) is an organic system made up of Text Retrieval (TR); Visual Retrieval (VR); Video Retrieval (VDR); and Audio Retrieval (AR) systems. So that each type of digital document may be analysed and searched by the elements of language appropriate to its nature, search criteria must be extended. Such an approach is known as the Content Based Information Retrieval (CBIR), and is the core of MIR. This novel content-based concept of information handling needs to be integrated with more traditional semantics. Multimedia Information Retrieval focuses on the tools of processing and searching applicable to the content-based management of new multimedia documents. Translated from Italian by Giles Smith, the book is divided into two parts. Part one discusses MIR and related theories, and puts forward new methodologies; part two reviews various experimental and operating MIR systems, and presents technical and practical conclusions.
  • Practical Anonymity

    Hiding in Plain Sight Online
    • 1st Edition
    • July 19, 2013
    • Peter Loshin
    • English
    For those with legitimate reason to use the Internet anonymously--diploma... military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. Practical Anonymity: Hiding in Plain Sight Online shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This practical guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult because most of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple. The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers. Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing