Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

2471-2480 of 4768 results in All results

Configuring NetScreen Firewalls

  • 1st Edition
  • December 31, 2004
  • Rob Cameron
  • English
  • Paperback
    9 7 8 - 1 - 9 3 2 2 6 6 - 3 9 - 9
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 7 8 - 0
The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals.Configuring NetScreen Firewalls is the first book to deliver an in-depth look at the NetScreen firewall product line. It covers all of the aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. Also covered are advanced troubleshooting techniques and the NetScreen Security Manager. This book offers novice users a complete opportunity to learn the NetScreen firewall appliance. Advanced users will find it a rich technical resource.

Aural Rehabilitation for People with Disabilities

  • 1st Edition
  • December 25, 2004
  • John Oyiborhoro
  • English
This book addresses an underserved area in the field of diagnostic and rehabilitative audiology, specifically, people with disabilities. The first section presents an overview of specific disabilities and how different cultural practices impact on their management; the second section focuses on the evaluation of hearing impairment within various disabled groups; and the third section concentrates on overall approaches to audiologic management. Evaluation and assessment chapters include cases of people with AIDS and HIV, Cerebral Palsy, Visual Impairments, Down Syndrome, Older Adults with Alzheimer's disease, as well as others. The book will serve two audiences: practicing audiologists and other hearing healthcare providers who work with disabled populations, as well as graduate students of audiology and medical students in Au.D. programs.

Introduction to Forensic Psychology

  • 2nd Edition
  • December 24, 2004
  • Bruce A. Arrigo + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 6 8 5 3 - 2
Introduction to Forensic Psychology, Second Edition is an original approach to understanding how psychologists impact the research, practice, and policy of crime, law, and justice. Divided into four sections on criminal forensics, civil forensics, policing and law enforcement, and corrections and prison practices, the text examines police, court, and correctional aspects of forensic psychology. Each of the twelve chapters are organized around relevant case illustrations, include comprehensive literature reviews, and discuss policy implications and avenues of future research. Each chapter additionally incorporates research on race, gender, and class, as well as including a practice update, highlighting a timely issue or controversy.The text thoughtfully explores a wide range of adult, juvenile, family, and community themes of interest to students, practitioners, and administrators. New to the Second Edition is a chapter on international criminal forensic psychology, and sections on assessing psychiatric work-related disability, termination of parental rights, counseling prison populations, malingering, crisis intervention in prisons/jails, and child custody evaluations. Suitable as a primary text for courses on psychology and criminal justice, the book may also serve as a reference tool for practicing forensic psychologists.

The AIDS Pandemic

  • 1st Edition
  • December 21, 2004
  • Kenneth H. Mayer + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 5 8 0 - 6
The AIDS Pandemic explores the ways in which HIV/AIDS has, and continues to transform the wide range of related disciplines it touches. Novel perspectives are provided by a unique panel of internationally recognised experts who cover the unprecedented impact onf AIDS on culture, demographics and politics around the world, including how it affected the worlds' economy, health sciences, epidemiology and public health. This important far- reaching analysis uses the lessons learned from a wide array of disciplines to help us understand the current status and evolution of the pandemic, as it continues to evolve.

Vitamin D

  • 2nd Edition
  • December 17, 2004
  • David Feldman + 2 more
  • English

Google Hacking for Penetration Testers

  • 1st Edition
  • December 17, 2004
  • Johnny Long
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 0 5 - 0
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don’t realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker’s search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.

Managing without Leadership

  • 1st Edition
  • December 15, 2004
  • Gabriele Lakomski
  • English
A critical examination of leadership theories past and present, Managing without Leadership argues that leadership as traditionally understood does not explain organizational functioning. Bounded by empiricist assumptions and methodology, and including a narrow theory of mind as symbol processor, leadership theories are unable to support their claims about leaders and their actions. Drawing on coherentist epistemology, connectionism, and the theory of self-organizing dynamic systems, a naturalistic account of organizational functioning and organization design is explored that includes leaders as non-privileged agents in the cognitive fabric of organizational life.

Link Analysis: An Information Science Approach

  • 1st Edition
  • December 14, 2004
  • Mike Thelwall
  • English
The web is central to many human activities and infringes on many others: at home, and at work, including education and research. Links between web sites can be used in information science and social science research as a valuable source of evidence about online phenomena, and about online components of offline phenomena. Given a set of websites, the links between them many reveal interesting patterns of connectedness that could reflect issues of underlying human communication or information value. Link analysis is therefore a valuable tool for information science and social science researchers investigating the web, or other phenomena with an offline component. This book provides methods, guidelines and examples to guide researchers and students through a research project, in addition to reviewing a considerable body of previous work.

Automated Fingerprint Identification Systems (AFIS)

  • 1st Edition
  • December 13, 2004
  • Peter Komarinski
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 4 1 8 3 5 1 - 3
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 5 9 8 - 1
An easy-to-understand synopsis of identification systems, presenting in simple language the process of fingerprint identification, from the initial capture of a set of finger images, to the production of a Rapsheet. No other single work exists which reviews this important identification process from beginning to end. We examine the identification process for latent (crime scene) prints and how they are identified with these systems. While the primary focus is automated fingerprint identifications, the book also touches on the emergence and use of fingerprints in other biometric systems.Criminal justice administrators, policy makers, and students of forensic science and criminal justice will find a reference to the known limitations and advantages of these systems.This book provides information as to the critical and continual need for properly trained individuals as well as an understanding of the direct and indirect costs associated with maintaining these systems. An understanding of the entire system and what it means will prove invaluable. Why are there missed identifications? Why are identifications made on one database that are not made on another database? Key terms and issues are included, and well as suggestions for improving the overall number of identifications.The book will go beyond process and also discuss issues such as interoperability, management strategies for large databases, contract development, lights out verification and several other issues which impact automated identifications.

Handbook of Forensic Drug Analysis

  • 1st Edition
  • December 13, 2004
  • Fred Smith
  • Jay A. Siegel
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 2 8 9 - 8
The Handbook of Forensic Drug Analysis is a comprehensive chemical and analytic reference for the forensic analysis of illicit drugs. With chapters written by leading researchers in the field, the book provides in-depth, up-to-date methods and results of forensic drug analyses. This Handbook discusses various forms of the drug as well as the origin and nature of samples. It explains how to perform various tests, the use of best practices, and the analysis of results. Numerous forensic and chemical analytic techniques are covered including immunoassay, gas chromatography, and mass spectrometry. Topics range from the use of immunoassay technologies for drugs-of-abuse testing, to methods of forensic analysis for cannabis, hallucinogens, cocaine, opioids, and amphetamine. The book also looks at synthetic methods and law enforcement concerns regarding the manufacture of illicit drugs, with an emphasis on clandestine methamphetamine production. This Handbook should serve as a widely used reference for forensic scientists, toxicologists, pharmacologists, drug companies, and professionals working in toxicology testing labs, libraries, and poison control centers. It may also be used by chemists, physicians and those in legal and regulatory professions, and students of graduate courses in forensic science.