Skip to main content

Books in Social sciences and humanities

1381-1390 of 6227 results in All results

The Crime Scene

  • 1st Edition
  • November 14, 2015
  • Marilyn T. Miller + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 3 5 8 - 8
The Crime Scene: A Visual Guide provides visual instruction on the correct way to process a crime scene. While the primary crime scene comprises the area from which most of the physical evidence is retrieved by crime scene investigators (CSIs), forensic scientists, or law enforcement personnel, this book also covers secondary and often tertiary crime scenes, all locations where there is the potential for the recovery of evidence. By using photographs and other diagrams to show proper and improper procedures, the reader will learn how to identify the correct principles required to process a scene. The book presents chapters on the investigation, the varying types of documentation, and the tactics used to connect events through crime scene reconstruction using evidence The book's authors have a combined experience of over 70 years in crime scene investigation as primary responders and consultants giving testimony in all levels of the U.S. court system. In addition, both teach forensic science and crime scene investigation at the university level.

Managing eBook Metadata in Academic Libraries

  • 1st Edition
  • November 12, 2015
  • Donna E Frederick
  • English
  • Paperback
    9 7 8 - 0 - 0 8 - 1 0 0 1 5 1 - 6
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 0 2 1 5 - 5
Managing ebook Metadata in Academic Libraries: Taming the Tiger tackles the topic of ebooks in academic libraries, a trend that has been welcomed by students, faculty, researchers, and library staff. However, at the same time, the reality of acquiring ebooks, making them discoverable, and managing them presents library staff with many new challenges. Traditional methods of cataloging and managing library resources are no longer relevant where the purchasing of ebooks in packages and demand driven acquisitions are the predominant models for acquiring new content. Most academic libraries have a complex metadata environment wherein multiple systems draw upon the same metadata for different purposes. This complexity makes the need for standards-based interoperable metadata more important than ever. In addition to complexity, the nature of the metadata environment itself typically varies slightly from library to library making it difficult to recommend a single set of practices and procedures which would be relevant to, and effective in, all academic libraries. Considering all of these factors together, it is not surprising when academic libraries find it difficult to create and manage the metadata for their ebook collections. This book is written as a guide for metadata librarians, other technical services librarians, and ancillary library staff who manage ebook collections to help them understand the requirements for ebook metadata in their specific library context, to create a vision for ebook metadata management, and to develop a plan which addresses the relevant issues in metadata management at all stages of the lifecycle of ebooks in academic libraries from selection, to deselection or preservation.

Operating System Forensics

  • 1st Edition
  • November 12, 2015
  • Ric Messier
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 9 4 9 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 9 6 3 - 4
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.  Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.

Practical Deployment of Cisco Identity Services Engine (ISE)

  • 1st Edition
  • November 12, 2015
  • Andy Richter + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 7 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 0 4 - 6
With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.

Understanding Credit Derivatives and Related Instruments

  • 2nd Edition
  • November 10, 2015
  • Antulio N. Bomfim
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 0 1 1 6 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 4 9 0 - 6
Understanding Credit Derivatives and Related Instruments, Second Edition is an intuitive, rigorous overview that links the practices of valuing and trading credit derivatives with academic theory. Rather than presenting highly technical explorations, the book offers summaries of major subjects and the principal perspectives associated with them. The book's centerpiece is pricing and valuation issues, especially valuation tools and their uses in credit models. Five new chapters cover practices that have become commonplace as a result of the 2008 financial crisis, including standardized premiums and upfront payments. Analyses of regulatory responses to the crisis for the credit derivatives market (Basel III, Dodd-Frank, etc.) include all the necessary statistical and mathematical background for readers to easily follow the pricing topics. Every reader familiar with mid-level mathematics who wants to understand the functioning of the derivatives markets (in both practical and academic contexts) can fully satisfy his or her interests with the comprehensive assessments in this book.

Assessing the Impact of Foreign Aid

  • 1st Edition
  • November 10, 2015
  • Viktor Jakupec + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 6 6 0 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 6 7 1 - 6
Assessing the Impact of Foreign Aid: Value for Money and Aid for Trade provides updated information on how to improve foreign aid programs, exploring the concept and practice of impact assessment within the sometimes-unproblematic approaches advocated in current literature of value for money and aid for trade. Contributors from multi-lateral agencies and NGOs discuss the changing patterns of Official Development Assistance and their effects on impact assessment, providing theoretical, political, structural, methodological, and practical frameworks, discussions, and a theory-practice nexus. With twin foci of economics and policy this book raises the potential for making sophisticated and coherent decisions on aid allocation to developing countries.

Theoretical and Experimental Methods for Defending Against DDoS Attacks

  • 1st Edition
  • November 10, 2015
  • Iraj Sadegh Amiri + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 3 9 9 - 7
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim’s IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.

Domain Specificity of Creativity

  • 1st Edition
  • November 6, 2015
  • John Baer
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 7 9 9 9 6 2 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 2 8 9 - 6
Recent research findings have challenged the idea that creativity is domain-general.  Domain Specificity of Creativity brings together the research information on domain specificity in creativity -- both the research that supports it and answers to research arguments that might seem to challenge it.  The implications for domain specificity affect how we move forward with theories of creativity, testing for creativity, and teaching for creativity.  The book outlines what these changes are and how creativity research and applications of that research will change in light of these new findings.

Exercise-Cognition Interaction

  • 1st Edition
  • November 6, 2015
  • Terry McMorris
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 0 7 7 8 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 1 4 8 - 5
Exercise-Cognition Interaction: Neuroscience Perspectives is the only book on the market that examines the neuroscientific correlation between exercise and cognitive functioning. The upsurge in research in recent years has confirmed that cognitive-psychology theory cannot account for the effects of exercise on cognition, and both acute and chronic exercise effect neurochemical and psychophysiological changes in the brain that, in turn, affect cognitive functioning. This book provides an overview of the research into these effects, from theoretical research through current studies that emphasize neuroscientific theories and rationales. It addition, users will find a thorough examination of the effects of exercise interventions on cognitive functioning in special populations, including the elderly, children, and those suffering from a variety of diseases, including  schizophrenia, diabetes, and an array of neurological disorders. With contributions from leading researchers in the field, this book will be the go-to resource for neuroscientists, psychologists, medical professionals, and other researchers who need an understanding of the role exercise plays in cognitive functioning.

Modeling the Psychopathological Dimensions of Schizophrenia

  • 1st Edition
  • Volume 23
  • November 5, 2015
  • Mikhail Pletnikov + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 0 9 8 1 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 1 8 4 - 3
Modeling the Psychopathological Dimensions of Schizophrenia: From Molecules to Behavior is the first book to offer a comprehensive review of the new theoretical, clinical, and basic research framework that considers psychotic illness as a group of dimensional representations of psychopathology rather than as traditional distinct categorical diagnoses. Psychotic illness, typified by schizophrenia, is a devastating condition increasingly recognized as a disorder of abnormal brain development and dysconnectivity. Its complex etiology involves both genetic and environmental factors, as well as the interplay among them. This book describes the current understanding of the clinical and pathological features of schizophrenia, with a particular focus on the evolving conceptualization of schizophrenia and related diagnostic categories of psychotic illness as combinations of dimensional abnormalities. It provides an overview of modern strategies for generating cellular and whole animal models of schizophrenia as well as detailed reviews of the specific experimental preparations and paradigms aimed at molecular, developmental, and brain-network mechanisms that are the underlying aspects of abnormal behavior and various aspects of schizophrenia. This groundbreaking book is an authoritative overview of the translational impact of emerging clinical insights on basic research approaches in schizophrenia that will advance the reader’s understanding of the five major dimensions of psychopathology in schizophrenia and related psychoses and resolve the genetic and neurobiological underpinnings of these dimensions.