Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • International Handbook of Giftedness and Talent

    • 2nd Edition
    • December 18, 2000
    • K. A. Heller + 3 more
    • English
    The first edition of this popular reference work was published in 1993 and received critical acclaim for its achievement in bringing together international perspectives on research and development in giftedness and talent. Scholars welcomed it as the first comprehensive volume in the field and it has proved to be an indispensable resource to researchers. Since the first edition, the scholarly field of giftedness and talent studies has expanded and developed, welcoming contributions from researchers in related disciplines. Several theoretical frameworks outlined in the first edition have now been empirically tested and a number of new trends have emerged. The Second Edition of the International Handbook of Giftedness and Talent provides an invaluable research tool to academics, researchers and students interested in the field of giftedness and talent. The contributors are renowned in the field and the broad range of topics on giftedness that have been studied in the past century, right up to the late 1990s, are represented in this volume. It is truly international in scope, bringing together leading scholars and teachers from all around the world. This new edition has been fully updated and rewritten and includes 22 completely new chapters. It provides a comprehensive review and critical synthesis of significant theory; a unique cross-national perspective with contributions from over 100 distinguished authors covering 24 nations; significant contributions from scholars working in related fields; an increased focus on empirically supported scholarship; and is arranged for quick and easy reference with comprehensive subject and author indexes.
  • Managing Cisco Network Security

    • 1st Edition
    • November 27, 2000
    • Florent Parent
    • English
  • Building Cisco Remote Access Networks

    • 1st Edition
    • November 15, 2000
    • Wayne Lawson
    • English
    An increasing number of companies are designing and implementing Remote Access Networks, which allow users who are not physically connected to a Wide Area Network (WAN) or Local Area Network (LAN) to access the network's servers, applications and databases or to participate in video conferencing and conference calls. The ability for a remote user to function as if they were in the next office dramatically improves overall efficiency while reducing total cost of ownership. Cisco Systems, the world's largest internetworking vendor, is the pioneer of the enabling technologies for Remote Access Networks. This book will identify and explain all of the Cisco products necessary for designing and building a remote access network and integrating it with legacy systems.This book is a professional reference detailing all of the strategies, tactics and methods for designing, configuring and maintaining Cisco Remote Access Networks. It will include thorough discussions of all Cisco Access Servers and routers.
  • E-Mail Virus Protection Handbook

    Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks
    • 1st Edition
    • November 6, 2000
    • Syngress
    • English
    The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.
  • Building CISCO Networks for Windows 2000

    • 1st Edition
    • October 17, 2000
    • Syngress
    • English
    Microsoft Corporation, the world's largest software vendor, and Cisco Systems, the world's largest internetworking vendor, have jointly developed a common software interface for managing Cisco hardware on Microsoft networks: Cisco Network Services for Active Directory (CNS/AD). Until now, network administrators have been forced to master two completely different product interfaces to effectively manage their networks. Configuring Cisco Network Services for Active Directory is the first book announced for this enormous Information Technology audience. This book is a practical guide to managing CNS/AD. It focuses on how to promote system efficiency and improve network service by using CNS/AD to centralize network management, using the directory as a repository for all policies that govern network usage. The book also describes how to manage Cisco Internetworking Operating System (IOS) networking features and network resources in the same unified way as other enterprise resources, such as user access controls, files, and printers.
  • Transfer of Learning

    Cognition and Instruction
    • 1st Edition
    • Volume .
    • September 28, 2000
    • Robert E. Haskell
    • English
    Educators and educational psychologists recognize transfer of learning as perhaps the most significant issue in all fields of instruction. Transfer of learning cuts across all educational domains, curricula, and methods. Despite its importance, research and experience clearly show that significant transfer of learning in either the classroom or in everyday life seldom occurs. Simply put, transfer of learning is illustrated by the phrases "It reminds me of..." or "It's like..." or "It's the same as...". This book addresses the fundamental problem of how past or current learning is applied and adapted to similar and/or new situations. Based on a review of the applied educational and cognitive research, as well as on the author's teaching experience with transfer of learning, this book presents a new framework for understanding and achieving transfer of learning. Current education and educational psychology textbooks either lack or lament the lack of research and guidance to educators on promoting transfer of learning. Thus this book is a necessary basis for all instruction and learning. Based on history and research, the book shows that transfer of learning is not just a technique of learning or instruction, but a way of thinking and knowing.
  • Questioned Documents

    A Lawyer's Handbook
    • 1st Edition
    • September 21, 2000
    • Jay Levinson
    • English
    Questioned documents are any documents that may be used as evidence in a trial, ranging from handwritten notes to counterfeit currency to contracts. This concise new handbook is designed specifically to aid lawyers involved in cases that involve questioned documents (QD) evidence. It explains the basics of document examination and helps litigators improve the way they present document evidence and question witnesses. It also provides references to professional literature and other legal sources, making it easy to find further information when needed.Questioned Documents: A Lawyer's Handbook provides analyses applied to many types of investigations and types of documents. It outlines the techniques for determining authenticity, age, ink and paper sources, handwriting identification, equipment used, forgeries, alterations, erasures, and more. In addition to helping the attorneys who mush present the QD evidence and ask the questions, this handbook is also an important resource for the expert witnesses who will be asked those questions at trial.
  • Handbook of Diversity in Parent Education

    The Changing Faces of Parenting and Parent Education
    • 1st Edition
    • September 14, 2000
    • Marvin J. Fine + 1 more
    • English
    Traditionally, books on parent education have focused on techniques from a certain tradition, either behavioral or humanistic, that could be applied to any problem of parenting or child behavior change. These books have used a "cook-book" approach that is frequently oblivious to environmental conditions that influence behavior or take into account the individual differences of the children or families involved. This book highlights the complexity of our society and times by exploring the problems faced by diverse types of parents, children, and parenting situations. Moreover, the sensitive issues of parenting in unique populations are handled in a caring, straight-forward way with an emphasis on research-based parent education programs along with tips and strategies for everyday use.
  • Netspionage

    The Global Threat to Information
    • 1st Edition
    • September 11, 2000
    • William C. Boni + 1 more
    • English
    This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by "hackers," "cyberpunks," and even intelligence agencies) has already resulted in several incidents that foreshadow the perilous future. Close study of these incidents demonstrates how difficult yet how important it is to confront the challenges of "netspionage" and its less intrusive cousins. The authors present a set of the known incidents and then outline protective measures that will reduce the potential and consequences of netspionage.Unlike most security books, this one is written for managers and executives in non-protection roles of the organization, since they are the ones who must take a leadership role in safeguarding the information assets of the networked enterprise.
  • Encyclopedia of Forensic Sciences

    • 1st Edition
    • August 24, 2000
    • Jay A. Siegel + 3 more
    • English
    The Encyclopedia of Forensic Sciences is the first resource to provide comprehensive coverage of the core theories, methods, techniques, and applications employed by forensic scientists. One of the more pressing concerns in forensic science is the collection of evidence from the crime scene and its relevance to the forensic analysis carried out in the laboratory. The Encyclopedia will serve to inform both the crime scene worker and the laboratory worker of their protocols, procedures, and limitations. The more than 200 articles contained in the Encyclopedia form a repository of core information that will be of use to instructors, students, and professionals in the criminology, legal, and law enforcement communities.