Skip to main content

Books in Social sciences and humanities

    • Assessing the Impact of Foreign Aid

      • 1st Edition
      • November 10, 2015
      • Viktor Jakupec + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 6 6 0 0
      • eBook
        9 7 8 0 1 2 8 0 3 6 7 1 6
      Assessing the Impact of Foreign Aid: Value for Money and Aid for Trade provides updated information on how to improve foreign aid programs, exploring the concept and practice of impact assessment within the sometimes-unproblema... approaches advocated in current literature of value for money and aid for trade. Contributors from multi-lateral agencies and NGOs discuss the changing patterns of Official Development Assistance and their effects on impact assessment, providing theoretical, political, structural, methodological, and practical frameworks, discussions, and a theory-practice nexus. With twin foci of economics and policy this book raises the potential for making sophisticated and coherent decisions on aid allocation to developing countries.
    • Theoretical and Experimental Methods for Defending Against DDoS Attacks

      • 1st Edition
      • November 10, 2015
      • Iraj Sadegh Amiri + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 3 9 1 1
      • eBook
        9 7 8 0 1 2 8 0 5 3 9 9 7
      Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim’s IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.
    • Domain Specificity of Creativity

      • 1st Edition
      • November 6, 2015
      • John Baer
      • English
      • Hardback
        9 7 8 0 1 2 7 9 9 9 6 2 3
      • eBook
        9 7 8 0 1 2 8 0 0 2 8 9 6
      Recent research findings have challenged the idea that creativity is domain-general. Domain Specificity of Creativity brings together the research information on domain specificity in creativity -- both the research that supports it and answers to research arguments that might seem to challenge it. The implications for domain specificity affect how we move forward with theories of creativity, testing for creativity, and teaching for creativity. The book outlines what these changes are and how creativity research and applications of that research will change in light of these new findings.
    • Exercise-Cognition Interaction

      • 1st Edition
      • November 6, 2015
      • Terry McMorris
      • English
      • Hardback
        9 7 8 0 1 2 8 0 0 7 7 8 5
      • eBook
        9 7 8 0 1 2 8 0 1 1 4 8 5
      Exercise-Cognition Interaction: Neuroscience Perspectives is the only book on the market that examines the neuroscientific correlation between exercise and cognitive functioning. The upsurge in research in recent years has confirmed that cognitive-psychology theory cannot account for the effects of exercise on cognition, and both acute and chronic exercise effect neurochemical and psychophysiological changes in the brain that, in turn, affect cognitive functioning. This book provides an overview of the research into these effects, from theoretical research through current studies that emphasize neuroscientific theories and rationales. It addition, users will find a thorough examination of the effects of exercise interventions on cognitive functioning in special populations, including the elderly, children, and those suffering from a variety of diseases, including schizophrenia, diabetes, and an array of neurological disorders. With contributions from leading researchers in the field, this book will be the go-to resource for neuroscientists, psychologists, medical professionals, and other researchers who need an understanding of the role exercise plays in cognitive functioning.
    • Modeling the Psychopathological Dimensions of Schizophrenia

      • 1st Edition
      • Volume 23
      • November 5, 2015
      • Mikhail Pletnikov + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 8 0 0 9 8 1 9
      • eBook
        9 7 8 0 1 2 8 0 1 1 8 4 3
      Modeling the Psychopathological Dimensions of Schizophrenia: From Molecules to Behavior is the first book to offer a comprehensive review of the new theoretical, clinical, and basic research framework that considers psychotic illness as a group of dimensional representations of psychopathology rather than as traditional distinct categorical diagnoses. Psychotic illness, typified by schizophrenia, is a devastating condition increasingly recognized as a disorder of abnormal brain development and dysconnectivity. Its complex etiology involves both genetic and environmental factors, as well as the interplay among them. This book describes the current understanding of the clinical and pathological features of schizophrenia, with a particular focus on the evolving conceptualization of schizophrenia and related diagnostic categories of psychotic illness as combinations of dimensional abnormalities. It provides an overview of modern strategies for generating cellular and whole animal models of schizophrenia as well as detailed reviews of the specific experimental preparations and paradigms aimed at molecular, developmental, and brain-network mechanisms that are the underlying aspects of abnormal behavior and various aspects of schizophrenia. This groundbreaking book is an authoritative overview of the translational impact of emerging clinical insights on basic research approaches in schizophrenia that will advance the reader’s understanding of the five major dimensions of psychopathology in schizophrenia and related psychoses and resolve the genetic and neurobiological underpinnings of these dimensions.
    • Valuation

      • 1st Edition
      • November 5, 2015
      • Rajesh Kumar
      • English
      • Hardback
        9 7 8 0 1 2 8 0 2 3 0 3 7
      • eBook
        9 7 8 0 1 2 8 0 2 5 4 3 7
      Valuation: Theories and Concepts provides an understanding on how to value companies that employ non-standard accounting procedures, particularly companies in emerging markets and those that require a wider variety of options than standard texts provide. The book offers a broader, more holistic perspective that is perfectly suited to companies and worldwide markets. By emphasizing cases on valuation, including mergers and acquisition valuation, it responds to the growing expectation that students and professionals must generate comprehensive perspectives based on thorough investigations and a library of valuation theories. Readers will gain a better understanding of the development of complete analyses, including trend analysis of financial parameters, ratio analysis, and differing perspectives on valuation and strategic initiatives. Case studies include stock market performance and synergies and the intrinsic value of the firm are compared with offer price. In addition, full data sets for each chapter are available online.
    • The Invisible Librarian

      • 1st Edition
      • November 3, 2015
      • Aoife Lawton
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 1 7 1 4
      • eBook
        9 7 8 0 0 8 1 0 0 1 7 4 5
      The Invisible Librarian: A Librarian's Guide to Increasing Visibility and Impact provides insights into what many librarians are feeling, including questions such as "do they feel invisible?" and "How many times have they heard somebody say ‘but everything is on the Internet’?" If you are a librarian struggling to find the best strategy for the future of the profession in a rapidly changing information environment, this book is for you. People don’t realize that librarians make information available and not just by search engine. This book will make people think differently about librarians, making a case for their value and impact that is compelling, convincing, and credible. Given their versatility and knowledge, now is the time for librarians to become champions of the information age as they improve the visibility and impact of libraries to readers, to stakeholders, and in society. By the end of the book, librarians will have a Visibility Improvement Plan to guarantee future success.
    • Project Management for Information Professionals

      • 1st Edition
      • November 3, 2015
      • Margot Note
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 1 2 7 1
      • eBook
        9 7 8 0 0 8 1 0 0 1 3 3 2
      Aimed at practitioners, this handbook imparts guidance on project management techniques in the cultural heritage sector. Information professionals often direct complex endeavors with limited project management training or resources. Project Management for Information Professionals demystifies the tools and processes essential to successful project management and advises on how to manage the interpersonal dynamics and organizational culture that influence the effectiveness of these methods. With this book, readers will gain the knowledge to initiate, plan, execute, monitor, and close projects.
    • A Study of Black Hole Attack Solutions

      • 1st Edition
      • November 3, 2015
      • Iraj Sadegh Amiri + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 3 6 7 6
      • eBook
        9 7 8 0 1 2 8 0 5 3 7 9 9
      Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.
    • Traffic Anomaly Detection

      • 1st Edition
      • October 30, 2015
      • Antonio Cuadra-Sánchez + 1 more
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 0 1 2 6
      • eBook
        9 7 8 0 0 8 1 0 0 8 0 7 2
      Traffic Anomaly Detection presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic. As traffic varies throughout the day, it is essential to consider the concrete traffic period in which the anomaly occurs. This book presents the algorithms proposed specifically for this analysis and an empirical comparative analysis of those methods and settle a new information theory based technique, named "typical day analysis".