Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

2491-2500 of 4768 results in All results

Identity, Agency and Social Institutions in Educational Ethnography

  • 1st Edition
  • Volume 10
  • November 23, 2004
  • Geoff Troman + 2 more
  • English
The prime focus on the social processes of schooling within educational ethnography has tended to marginalise or eschew the importance of other 'informal' educational sites. Other social institutions, such as family, community, media and popular culture, work and prisons are salient arenas in which behaviours and lives are regulated. They all interrelate and are all implicated in the generation, management and development of social identities and the social and cultural reproduction of structures and relations. Individuals, though, are not merely shaped by these social institutions, their agency is evident in the way they creatively adapt and accommodate to the tensions and constraints of economic, educational and social policies. The maintenance of self in these situations requires identity work involving mediation, conflict, contestation and modes of resistance, which often contribute to a continual reconstruction of situations and contexts. This volume of Studies in Educational Ethnography focuses on identity and agency in a variety of social institutions in educational ethnography. The contributors explore these themes in a wide range of international contexts including; Belgium, Sweden, North America, South Africa and England. They demonstrate the capacity of educational ethnography to provide accounts of participants' perspectives and understandings to highlight the agency of educational subjects.

Programmer's Ultimate Security DeskRef

  • 1st Edition
  • November 20, 2004
  • James C Foster
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 0 4 5 - 9
The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use.While there are many books starting to address the broad subject of security best practices within the software development lifecycle, none has yet to address the overarching technical problems of incorrect function usage. Most books fail to draw the line from covering best practices security principles to actual code implementation. This book bridges that gap and covers the most popular programming languages such as Java, Perl, C++, C#, and Visual Basic.

Inside the SPAM Cartel

  • 1st Edition
  • November 13, 2004
  • Spammer-X Spammer-X
  • English
Authored by a former spammer, Inside the SPAM Cartel is a methodical, technically explicit expose of the inner workings of the SPAM economy. Readers will be shocked by the sophistication and sheer size of this underworld. From the author: "You may hate spam and think all spammers are evil, but listen to my story and see why I do this and more importantly, HOW." For most people, the term "SPAM" conjures up the image of hundreds of annoying, and at times offensive, e-mails flooding their inbox every week. But for a few, SPAM is a way of life that delivers an adrenaline rush fueled by cash, danger, retribution, porn and the avoidance of local, federal, and international law enforcement agencies. Inside the SPAM Cartel offer readers a never-before seen view inside this dark sub-economy. You'll meet the characters that control the flow of money as well as the hackers and programmers committed to keeping the enterprise up and running. You may disagree with their objectives, but you can't help but to marvel at their ingenuity and resourcefulness in defeating spam filters, avoiding being identified, and staying one step ahead of the law.

Game Console Hacking

  • 1st Edition
  • November 12, 2004
  • Joe Grand + 1 more
  • English
The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed "retro gaming" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of "Hardware Hacking: Have Fun While Voiding Your Warranty", provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do. By definition, video console game players like to have fun. Most of them are addicted to the adrenaline rush associated with "winning", and even more so when the "winning" involves beating the system by discovering the multitude of "cheats" built into most video games. Now, they can have the ultimate adrenaline rush---actually messing around with the soul of the machine and configuring it to behave exactly as the command. This book builds on the motto of "Have Fun While Voiding Your Warranty" and will appeal to the community of hardware geeks who associate unscrewing the back of their video console with para-jumping into the perfect storm.

Physical Security for IT

  • 1st Edition
  • November 8, 2004
  • Michael Erbschloe
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 5 9 0 - 3
The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets.

Windows to Linux Migration Toolkit

  • 1st Edition
  • November 5, 2004
  • David Allen
  • English
This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals who wish to maximize the value of their Windows to Linux migration services will find this book valuable. The book will help them fine-tune their migration services to make them more efficient, thorough, feature-enhanced, and cost-effective by utilizing migration scripts and best practices gleaned from the author's many years of real-world migrations in large and small companies.

Violence

  • 1st Edition
  • November 1, 2004
  • Margaret A. Zahn + 2 more
  • English
Brings together theoretical and empirical papers prepared by noted researchers and theoreticians. The first part includes chapters by criminological theorists who apply their theory of crime particularly to violence. The second part contains chapters by researchers who look at the substantive area of their expertise through the lens of theories of violence. Each chapter is original and was written specifically for this book.

Electronic Resources in the Virtual Learning Environment

  • 1st Edition
  • October 31, 2004
  • Jane Secker
  • English
  • eBook
    9 7 8 - 1 - 7 8 0 6 3 - 0 7 0 - 0
This book covers the key current topic of electronic library resources and learning in the digital age. The book begins by outlining the changing ‘information environment’ in which librarians now work. It then goes on to discuss: the development of e-learning as a concept and the impact this is having on the further and higher education sector; the changing role of the librarian in supporting online learning; the technical problems associated with connecting up library systems; the copyright and licensing of electronic resources in a digital environment; and, finally the book offers tips for librarians when becoming involved in such initiatives.

Freedom of Information

  • 1st Edition
  • October 31, 2004
  • Liz Taylor
  • English
  • eBook
    9 7 8 - 1 - 7 8 0 6 3 - 0 6 9 - 4
As from 1 January 2005, Freedom of Information (FOI) legislation will come fully into force throughout the UK and could potentially change the way in which the public sector manages information. This report provides practical advice on how to achieve compliance with the Acts; the report helps to ensure successful management of the key risks that the Acts may pose to organisations across the UK. The report also introduces some of the change management issues that will need to be addressed within organisations to facilitate the transition to a more open culture of FOI.

Biotechnology Annual Review

  • 1st Edition
  • Volume 10
  • October 30, 2004
  • M. Raafat El-Gewely
  • English
  • Hardback
    9 7 8 - 0 - 4 4 4 - 5 1 7 4 9 - 4