Skip to main content

Books in Social sciences and humanities

  • Advances in Motivation Science

    • 1st Edition
    • Volume 2
    • August 17, 2015
    • English
    Advances in Motivation Science, Elsevier's new serial, focuses on the ways motivation has traditionally been one of the mainstays of the science of psychology, not only playing a major role in the early dynamic and Gestalt models of the mind, but also playing an integral and fundamental part of the behaviorist theories of learning and action. The cognitive revolution in the 1960 and 70's eclipsed the emphasis on motivation to a large extent, but it has returned in full force prompting this new serial on a “hot topic” of the contemporary scene that is, once again, firmly entrenched as a foundational issue in scientific psychology. This volume brings together internationally recognized experts who focus on cutting-edge theoretical and empirical contributions relating to this important area of psychology.
  • Active Shooter

    Preparing for and Responding to a Growing Threat
    • 1st Edition
    • August 17, 2015
    • Kevin Doss + 1 more
    • English
    According to Pinkerton—the leading provider of risk management services in the world—workplace violence is second only to cybersecurity as the top threat faced by organizations today. Incidents involving active shooters in the workplace are on the rise and becoming more violent and deadly. Active Shooter provides the tools necessary to identify potential violent individuals, along with the options and responses needed to save lives, reduce corporate liability, and recover from an active shooter event should it happen. Active Shooter begins with a brief history of active shooters and how they have changed over time. It shows why many perpetrators initiate attacks, what they often are thinking, and some of the indicators that could have been identified prior to the attack. The book shows how to develop an active shooter program in an organization, walking readers through the entire process including training exercises to test the efficiency of the program. With the uniquely private security perspective, Active Shooter illustrates how to communicate with law enforcement, government agencies, and the media in the event of active shooter incident. The book concludes with a discussion of how organizations can recover promptly after an incident, which is crucial for operational survival.
  • Effective Security Management

    • 6th Edition
    • August 15, 2015
    • Charles A. Sennewald + 1 more
    • English
    Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers. The sixth edition of this classic professional reference work on the topic includes newly updated and expanded coverage of topics such as the integration of security executive into the business, background checks and hiring procedures, involvement in labor disputes, organized crime, and the role of social media.
  • Why Has Development Neglected Rural Women?

    A Review of the South Asian Literature
    • 1st Edition
    • August 11, 2015
    • Nici Nelson
    • English
    Why Has Development Neglected Rural Women?: A Review of the South Asian Literature reviews literatures about the role of women in rural development in South Asia. The book details the concept of development and the importance of considering the role of women in development. Next, the selection discusses the extant literature on women's roles in rural life and economy. The title also analyzes the contemporary knowledge about rural women, and then discusses the general areas or research that should be considered in the future. The text will be of great interest to economists, political scientists, sociologists, and psychologists.
  • Securing Social Media in the Enterprise

    • 1st Edition
    • August 11, 2015
    • Henry Dalziel
    • English
    Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.
  • Season of Birth

    A Study of Schizophrenia and Other Mental Disorders
    • 1st Edition
    • August 11, 2015
    • Per Dalén
    • English
    Season of Birth: A Study of Schizophrenia and Other Mental Disorders discusses the correlation between season of birth and mental disorders. The book provides reviews of studies relevant to understanding how the season of birth relates to various mental disorders. The first five chapters cover pregnancy and birth related issues. These chapters cover vital statistics, obstetrics, and neonatal and congenital abnormalities and disorders. The next two chapters deal with intelligence and mental disorders, respectively. Chapters 8 to 12 discuss the studies done on Swedish and South African demographics. Chapter 13 talks about the congenital malformations outside the central nervous system, while Chapter 14 deals with neoplastic diseases. The fifteenth chapter covers the other pathological conditions, and the last chapter discusses the normal somatic characteristics. The text will be of great use to researchers and practitioners of psychology and psychiatry. Readers who are concerned with various mental disorders will also find the book informative.
  • Optics

    International Series of Monographs in Natural Philosophy
    • 1st Edition
    • August 11, 2015
    • J. P. Mathieu
    • D. ter Haar
    • English
    Optics, Parts 1 and 2 covers electromagnetic optics and quantum optics. The first part of the book examines the various of the important properties common to all electromagnetic radiation. This part also studies electromagnetic waves; electromagnetic optics of transparent isotropic and anisotropic media; diffraction; and two-wave and multi-wave interference. The polarization states of light, the velocity of light, and the special theory of relativity are also examined in this part. The second part is devoted to quantum optics, specifically discussing the classical molecular theory of optical phenomena and the quantization of radiant energy and of energy in atoms. This part also looks into topics such as wave mechanics, atomic and molecular spectra, and spectrometry. This book will be beneficial to those interested in studying optics, including students of physics.
  • Financial Regulation and Monetary Arrangements after 1992

    • 1st Edition
    • Volume 204
    • August 11, 2015
    • Michele Fratianni + 2 more
    • English
    Presented in this volume are analytical papers by leading academics on the consequences of regulatory reform in the 1992-process on financial markets and institutions, as well as on macro-economic adjustment and the scope of monetary and fiscal policy after 1992. Also included are policy-oriented papers by economists in academic and policy-making authorities which discuss potential policy conflicts within the EC and between the EC, EFTA, the US, Japan and Eastern Europe as a result of financial liberalization and monetary integration following 1992.The volume focuses on developments in financial markets as crucial for financial and industrial restructuring, as well as for prospects for a monetary union. Analytical papers form the basis for broader policy oriented discussion of potential policy conflicts among industrialized countries, as well as of prospects for currency reform in the Eastern block.
  • Smart Grid Security

    Innovative Solutions for a Modernized Grid
    • 1st Edition
    • August 11, 2015
    • Florian Skopik + 1 more
    • English
    The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times. Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.
  • Next Generation Red Teaming

    • 1st Edition
    • August 10, 2015
    • Henry Dalziel
    • English
    Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s that need to learn how to build a successful Red Team, as well as budding cyber security professionals who would like to learn more about the world of information security.