Skip to main content

Books in Social sciences and humanities

    • Post & Telecommunications

      • 1st Edition
      • October 27, 2016
      • S. Wall + 1 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 7 7 1 5
      • eBook
        9 7 8 1 4 8 3 2 9 5 8 0 0
      The review describes the publicly available sources of statistical information about postal and telecommunications in the United Kingdom. It covers public letter and parcel mail, postal orders, telephone, telegraph, telex, data and facsmile services. Given the 1981 Post Office reorganisation and the 1984 privatisation of British Telecom, this volume should prove a valuable resource to researchers and professionals requiring a guide to information in this rapidly changing field.
    • Data Hiding Techniques in Windows OS

      • 1st Edition
      • September 8, 2016
      • Nihad Ahmad Hassan + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 4 4 9 0
      • eBook
        9 7 8 0 1 2 8 0 4 4 9 6 4
      "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics – it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®. This is your hands-on guide to understand, detect and use today’s most popular techniques in hiding and exploring hidden data under Windows® machines, covering all Windows® versions from XP till Windows® 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows® functions, techniques are presented in a way to easily implement them directly on your computer.
    • Media and Information Literacy in Higher Education

      • 1st Edition
      • November 18, 2016
      • Dianne Oberg + 1 more
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 6 3 0 6
      • eBook
        9 7 8 0 0 8 1 0 0 6 3 1 3
      Media and Information Literacy in Higher Education: Educating the Educators is written for librarians and educators working in universities and university colleges, providing them with the information they need to teach media and information literacy to students at levels ranging from bachelor to doctoral studies. In order to do so, they need to be familiar with students’ strengths and weaknesses regarding MIL. This book investigates what university and college students need to know about searching for, and evaluating, information, and how teaching and learning can be planned and carried out to improve MIL skills. The discussions focus on the use of process-based inquiry approaches for developing media and information literacy competence, involving students in active learning and open-ended investigations and emphasizing their personal learning process. It embraces face-to-face teaching, and newer forms of online education.
    • The Biology of Human Conduct

      • 1st Edition
      • January 21, 2016
      • G. L. Mangan
      • H. J. Eysenck
      • English
      • Paperback
        9 7 8 1 4 8 3 1 1 2 9 6 1
      • eBook
        9 7 8 1 4 8 3 1 4 5 3 8 9
      The Biology of Human Conduct: East-West Models of Temperament and Personality is a three-part book that explores models of temperament, typology and personality, and personality and conditioning. The first part has four chapters detailing the behavior genetic model; typological models; human typology and higher mental processes; and interactional approach to development. The second part covers theories of personality; strength of the nervous system; the orientation reaction; mobility, concentration, and lability; and the structure of nervous system properties. The last part shows sources of variance in conditioning and socialization.
    • Social Choice and Welfare

      • 1st Edition
      • Volume 145
      • April 20, 2016
      • P.K. Pattanaik + 1 more
      • English
      • eBook
        9 7 8 1 4 8 3 2 9 0 5 9 1
      This volume comprises papers presented at the Symposium on Collective Choice, by leading experts in this field. It presents recent advances in Social Choice Theory and Welfare Economics. The papers are classified in two broad groups: (1) those dealing with the ethical aspects of the theory of social choice and (2) those concerned with the positive aspects.The papers in the first part are concerned with the Arrow-type aggregation problem or aspects of it and with more specific questions relating to optimality, justice and welfare. In part II several papers discuss the problem of strategic misrevelation of preferences by individuals, others discuss simple voting games, social choice-correspondenc... and electoral competition.The main features are: - Recent advances in social choice theory and welfare economics - New mathematical approaches to social choice theory (differential and algebraic topology) -New aspects of the concepts of justice and optimality in welfare economics and social choice.
    • The Wine Value Chain in China

      • 1st Edition
      • November 21, 2016
      • Roberta Capitello
      • Steve Charters + 1 more
      • English
      • Hardback
        9 7 8 0 0 8 1 0 0 7 5 4 9
      • eBook
        9 7 8 0 0 8 1 0 0 7 6 0 0
      The Wine Value Chain in China: Global Dynamics, Marketing and Communication in the Contemporary Chinese Wine Market presents information on China and its role as a relevant player in the international wine industry, both as supplier and consumer. The book provides new insights into the global dynamics of the wine industry, expanding the knowledge of academics, practitioners, and students on the growing demand for wine in China. Special attention is paid to the supply and demand changes, their impacts on Western wine supply chains, and new market opportunities. The book contributes the latest research findings to increase the understanding of the context of wine consumption in China and the most suitable marketing and communication approaches. The book aims to provide academics with the most adequate methodological tools to study a novice market, with both conceptual and empirical chapters included. The book covers a range of topics, including the behavior of Chinese consumers and their attitudes towards wine, the cultural context of wine in China, the characteristics of the wine supply chain in China and its development, the impact of China on Western wine supply chains, wine marketing and communication in China, wine branding in China, including counterfeiting, wine education in China, the links between wine, food, luxury, and Western products in China, and wine tourism.
    • Executing Windows Command Line Investigations

      • 1st Edition
      • June 11, 2016
      • Chet Hosmer + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 2 6 8 2
      • eBook
        9 7 8 0 1 2 8 0 9 2 7 1 2
      The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.
    • Roots of Brazilian Relative Economic Backwardness

      • 1st Edition
      • July 15, 2016
      • Alexandre Rands Barros
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 7 5 6 4
      • eBook
        9 7 8 0 1 2 8 0 9 7 5 7 1
      Roots of Brazil’s Relative Economic Backwardness explains Brazil’s development level in light of modern theories regarding economic growth and international economics. It focuses on both the proximate and fundamental causes of Brazil’s slow development, turning currently dominant hypotheses upside down. To support its arguments, the book presents extensive statistical analysis of Brazilian long-term development, with some new series on per capita GDP, population ethnical composition, and human capital stock, among others. It is an important resource in the ongoing debate on the causes of Latin American underdeveloped economies.
    • Behavior Change Research and Theory

      • 1st Edition
      • November 8, 2016
      • Linda Little + 2 more
      • English
      • Hardback
        9 7 8 0 1 2 8 0 2 6 9 0 8
      • eBook
        9 7 8 0 1 2 8 0 2 7 0 5 9
      Behavior Change Research and Theory: Psychological and Technological Perspectives provides a unified account of behavior change theories and broad coverage of application domains and best practices. From a psychological and human-computer interaction perspective, the book puts a strong emphasis on the psychological foundations of behavior change, and explores the relationship between technology and behavior change. It will cover the major behavior change theories: planned behavior; health belief model; protection motivation; transtheoretical; and more recent approaches to behavior change like Nudge, and Mindspace. The section on health research and behavior change will cover interventions like diet and fitness, mental health, smoking cessation, and diabetes management. Topics also include financial and security research, and behavior change in relation to financial and other forms of sensitive information (passwords, phishing, and financial transactions). The last section will highlight the challenges and opportunities afforded by the increasing use of mobile technology with respect to the design of programs and apps aimed at facilitating behavior change and the role of social media.
    • East Asian Business in the New World

      • 1st Edition
      • September 7, 2016
      • Shaomin Li
      • English
      • Hardback
        9 7 8 0 0 8 1 0 1 2 8 3 3
      • eBook
        9 7 8 0 0 8 1 0 1 2 8 4 0
      East Asian Business in the New World: Helping Old Economies Revitalize discusses how to conduct business in East Asia. The main objective of the book is to help American workers and businesses gain competitive advantages in a global marketplace in which the emerging Asian economies are rapidly becoming major players. The American economy appears to be on decline, especially relative to the rapidly rising economies in places such as China. To revitalize the American economy and those of the ‘old world’, we must pay close attention to the economies with which America competes. The objective of this book is two-fold, with an initial focus on the opportunities and challenges of doing business in East Asia that includes tactics that will help readers understand Asian economies and business practices so that they can compete more successfully in the region. Secondly, the book seeks to teach readers how the U.S. can learn from East Asia in revitalizing its own economy. This is what sets the book apart as it analyzes the social institutions in major Asian countries, including the political, economic, and cultural institutions, and then compares them with the institutions in the U.S., identifying the strengths and weaknesses of U.S. institutions and providing strategic and policy recommendations that may help the U.S. economy and American firms compete in the global marketplace.