Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

2601-2610 of 4768 results in All results

The Protection Officer Training Manual

  • 7th Edition
  • September 2, 2003
  • IFPO
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 7 9 0 - 7
This revised edition retains the exceptional organization and coverage of the previous editions and is designed for the training and certification needs of first-line security officers and supervisors throughout the private and public security industry.

Cybersecurity Operations Handbook

  • 1st Edition
  • September 1, 2003
  • John Rittinghouse PhD CISM + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 3 0 1 8 - 5
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements.

Intelligent IT Outsourcing

  • 1st Edition
  • August 28, 2003
  • Sara Cullen + 1 more
  • English
Intelligent IT Outsourcing enables practitioners to focus in on the essential issues that need to be addressed so that the fundamental structure of their sourcing strategy and its implementation is sound. The authors provide insight into the challenges likely to be faced and give detailed advice on how to pre-empt and manage these.IT and outsourcing continue to be problematic, not least because fundamental learning about this subject fails to be applied systematically, and because IT is inherently difficult to manage. The economics are not obvious and emerging technologies have to be addressed, therefore IT goes to the heart of many enterprises and interfaces with multiple business units and processes, and there are continuous skills shortages.Unfortunately complexities are not removed in outsourced situations where additional problems come into play, for example the supplier's capabilities, whether the IT is right for an outsourcing solution, and whether the contract is robust but flexible enough to allow for outsourcing to take place. Objectives need to be realistic, and factors such as whether the internal management is mature and capable enough in this field, and the impact of prohibitive switching costs on behaviour once an outsourcing deal has been signed all have to be taken into account.The authors have built up over two decades of research, advisory and practitioner experience that enables them to distil the fundamental challenges in IT and outsourcing and demonstrate how these can be addressed.

Between School and Work

  • 1st Edition
  • August 14, 2003
  • Terttu Tuomi-Grohn + 1 more
  • English
This book opens up new theoretical perspectives and practical possibilities to analyze the learning opportunities emerging in the transitional zones between educational institutions and workplaces. International contributors draw on a range of ideas developed within constructivistic, socio-cultural and activity theory and focus in different ways on the processes of transition, transfer and boundary crossing as central to learning, especially in vocational and professional education contexts.The book begins with four chapters which locate the renewed interest in transfer and the emerging interest in boundary crossing in the context of knowledge society in terms of the following (a) the historical development of learning theories, (b) the theoretical advances made in socio-cultural approaches as regards learning, transfer and boundary crossing, and (c) sociological approaches to links between school and workplace learning. Part II contains seven chapters that present studies on learning and transfer in different domains of vocational and professional education. Part III presents three studies that describe and analyze learning in workplaces. The chapters of these three parts report on a range of empirical and developmental studies which have developed new 'tools for learning and transfer' in vocational education. The book ends with an epilogue consisting of a critical reflection on the earlier chapters in relation to how they approach two key transfer issues - the relationship between school knowledge and the knowledge acquired in working life, and the relationship between transfer and boundary crossing at the individual and collective levels.The chapters of this book are based on original research undertaken by members and invited experts of a European COST Action A 11 Working Group 2 which includes researchers from twelve different countries.

The Information Systems Security Officer's Guide

  • 2nd Edition
  • August 5, 2003
  • Gerald L. Kovacich
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 1 5 3 - 0
Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information security program, and additional metrics to measure organization performance. It also includes six entirely new chapters on emerging trends such as high-tech fraud, investigative support for law enforcement, national security concerns, and information security consulting. This essential guide covers everything from effective communication to career guidance for the information security officer. You'll turn to it again and again for practical information and advice on establishing and managing a successful information protection program.

Computers for Librarians

  • 3rd Edition
  • August 1, 2003
  • Stuart J. Ferguson + 1 more
  • English
  • eBook
    9 7 8 - 1 - 7 8 0 6 3 - 4 1 9 - 7
Computers for Librarians is aimed primarily at students of library and information management and at those library and information service professionals who feel the need for a book that will give them a broad overview of the emerging electronic library. It takes a top-down approach, starting with applications such as the Internet, information sources and services, provision of access to information resources and library management systems, before looking at data management, computer systems and technology, data communications and networking, and library systems development. It also provides an interesting set of case studies, which help to put theoretical and technical issues into context. Computers for Librarians can be read as a survey of where we are in terms of the electronic library, but it is also intended as an educational resource, and includes self-learning aids such as learning objectives, keywords and review questions for each chapter.

Statistics in Industry

  • 1st Edition
  • Volume 22
  • July 18, 2003
  • khattree Rao
  • English
  • Hardback
    9 7 8 - 0 - 4 4 4 - 5 0 6 1 4 - 6
This volume presents an exposition of topics in industrial statistics. It serves as a reference for researchers in industrial statistics/industrial engineering and a source of information for practicing statisticians/industrial engineers. A variety of topics in the areas of industrial process monitoring, industrial experimentation, industrial modelling and data analysis are covered and are authored by leading researchers or practitioners in the particular specialized topic. Targeting the audiences of researchers in academia as well as practitioners and consultants in industry, the book provides comprehensive accounts of the relevant topics. In addition, whenever applicable ample data analytic illustrations are provided with the help of real world data.

Building DMZs For Enterprise Networks

  • 1st Edition
  • July 1, 2003
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 2 6 - 1
This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter.

Elsevier's Dictionary of Plant Names of North America including Mexico

  • 1st Edition
  • July 1, 2003
  • R.C. White
  • English
  • Hardback
    9 7 8 - 0 - 4 4 4 - 5 1 2 7 2 - 7
The border between the United States of America and Mexico is the busiest in the world. This area is also the meeting place of the two great cultures of the Western Hemisphere, Spanish-speaking Latin America and English-speaking North America. Recent demographic migrations coupled with increasing globalization have necessitated closer cooperation and communication between these groups.The area of communication of this dictionary centers around the vernacular or common names of plants. Many recent immigrants from Mexico and further south have gained employment in areas of agriculture, landscaping, and commercial plant nurseries. The new residents also bring with them a rich history of herbal medicines that are becoming increasingly popular in the United States. Both groups share interests in each other's cuisines with respect to food plants and spices.This dictionary contains the Latin, English, and Spanish names for over 7,000 species of the most important plants found mainly in the southwestern United States and northern Mexico. Included are native and naturalized plants as well as plants of economic value. The main section of the book is organized alphabetically by the scientific Latin genus and species of each plant. The book is also fully indexed by common names primarily in American-English and Mexican-Spanish.

Building DMZs For Enterprise Networks

  • 1st Edition
  • July 1, 2003
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 2 6 - 1
This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter.