Skip to main content

Books in Social sciences and humanities

    • Keeping Religious Institutions Secure

      • 1st Edition
      • April 13, 2015
      • Jennie-Leigh McLamb
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 3 4 6 5
      • eBook
        9 7 8 0 1 2 8 0 1 4 8 8 2
      Keeping Religious Institutions Secure explores the unique vulnerabilities that churches, synagogues, and mosques face in regards to security, making them attractive to criminals who see them as easy targets. The text illustrates why all places of worship should think about security and the types of breaches that can drive people away. The book focuses on the most frequent security concerns experienced by houses of worship, including embezzlement, vandalism, assault, hate crime, and in rare cases, an active shooter—and how to help prevent them from occurring. Beginning with an overview of the basic security concepts and principles that can enhance the security of any religious facility, it then delves deeply into the particular security concerns of houses of worship, including the use of volunteers, protecting religious leaders, ensuring safety for children and teens, interacting with local law enforcement, handling the media, and much more.
    • Hacking Web Intelligence

      • 1st Edition
      • April 13, 2015
      • Sudhanshu Chauhan + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 8 6 7 5
      • eBook
        9 7 8 0 1 2 8 0 1 9 1 2 2
      Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that is, reconnaissance—is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.
    • Digital Curation in the Digital Humanities

      • 1st Edition
      • April 11, 2015
      • Arjun Sabharwal
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 1 4 3 1
      • eBook
        9 7 8 0 0 8 1 0 0 1 7 8 3
      Archives and special collections departments have a long history of preserving and providing long-term access to organizational records, rare books, and other unique primary sources including manuscripts, photographs, recordings, and artifacts in various formats. The careful curatorial attention to such records has also ensured that such records remain available to researchers and the public as sources of knowledge, memory, and identity. Digital curation presents an important framework for the continued preservation of digitized and born-digital collections, given the ephemeral and device-dependent nature of digital content. With the emergence of analog and digital media formats in close succession (compared to earlier paper- and film-based formats) came new standards, technologies, methods, documentation, and workflows to ensure safe storage and access to content and associated metadata. Researchers in the digital humanities have extensively applied computing to research; for them, continued access to primary data and cultural heritage means both the continuation of humanities scholarship and new methodologies not possible without digital technology. Digital Curation in the Digital Humanities, therefore, comprises a joint framework for preserving, promoting, and accessing digital collections. This book explores at great length the conceptualization of digital curation projects with interdisciplinary approaches that combine the digital humanities and history, information architecture, social networking, and other themes for such a framework. The individual chapters focus on the specifics of each area, but the relationships holding the knowledge architecture and the digital curation lifecycle model together remain an overarching theme throughout the book; thus, each chapter connects to others on a conceptual, theoretical, or practical level.
    • Emergency Preparedness for Business Professionals

      • 1st Edition
      • April 11, 2015
      • Bradley A. Wayland
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 3 8 4 6
      • eBook
        9 7 8 0 1 2 8 0 2 6 0 4 5
      Emergency Response for Business Professionals provides business managers who do not have in-house security expertise as well as the security professionals who advise them with an overview on how to prepare and react to potential unexpected incidents that can occur to their organization. The book begins with an overview of the primary principles of business emergency planning, then delves into the considerations that an organization should take when developing their emergency plan. This includes the mitigation strategies for preventing the incident from occurring in the first place. It then shows how to identify and assess the risks the organization may realistically face, choose the commensurate security measures, and create the proper emergency response policies and procedures. The book explores how to respond in the event of an actual emergency, and how to recover business operations to full functionality after an incident occurs. Emergency Response for Business Professionals looks closely at the most common emergencies that pose concerns for many organizations, such as active shooters, unauthorized visitors, workplace violence, embezzlement, fraud, theft, natural and man-made disasters, major equipment malfunctions, sabotage, labor disputes, and loss of key personnel, among others, along with the appropriate and accepted responses used to respond to each type of incident. It covers methods for training employees in emergency response, and concludes with how to plan, prepare, and conduct emergency response exercises within the organization.
    • Law Librarianship in Academic Libraries

      • 1st Edition
      • April 10, 2015
      • Yemisi Dina
      • English
      • Paperback
        9 7 8 0 0 8 1 0 0 1 4 4 8
      • eBook
        9 7 8 0 0 8 1 0 0 1 7 9 0
      In the last two decades, advancement in technology has transformed every aspect of librarianship. Law Librarianship in Academic Law Libraries discusses issues and model practices in academic law libraries. This text will help librarians and library school students understand the operation, resources and facilities that are available in the academic law library. It explains the practices and trends that are widely practiced in different parts of the world. This book describes the expectations of an aspiring professional with an interest in specializing in law librarianship; revealing facts pertaining to management and administration which are not necessarily taught in library schools. The first chapter introduces the history of academic law libraries, and defines law librarianship. The remaining chapters are dedicated to different aspects of law librarianship including the importance of emerging technologies and how they are implemented in the academic law libraries setting, finishing with a concluding chapter on global opportunities available for law librarians.
    • Mémofiches Anatomie Netter - Tronc

      • 4th Edition
      • April 9, 2015
      • John T. Hansen
      • French
      • eBook
        9 7 8 2 2 9 4 7 4 1 7 4 6
      • eBook
        9 7 8 2 2 9 4 7 5 3 1 7 6
      Ce carnet de 102 fiches constitue un outil de référence indispensable à la révision des examens d'anatomie et un mémento de l'essentiel des connaissances anatomiques de la région du Tronc. Chaque fiche est constituée de 2 pages en vis-à-vis : à gauche, une planche muette en couleur ; à droite, sa légende, accompagnée d'informations complémentaires. Son format de poche spiralé, conçu pour une consultation rapide et pratique, permet au lecteur, quel que soit son niveau de connaissances, une utilisation multiple : apprendre, réviser, s'entraîner et/ou s'auto-évaluer. Entièrement révisée, cette 4e édition propose quelques nouveaux schémas et systématise dans toutes les fiches, la rubrique Clinique qui renforce l'aspect pédagogique de l'ouvrage. L'application Mémofiches Anatomie Netter Tronc vous est offerte avec ce livre.
    • Security Technology Convergence Insights

      • 1st Edition
      • April 1, 2015
      • Ray Bernard
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 8 4 2 1
      • eBook
        9 7 8 0 1 2 8 0 3 0 0 1 1
      Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information technology (IT) advances continued to accelerate, the physical security industry continued to lag behind IT advances by at least two to three years. Security Technology Convergence Insights explores this sometimes problematic convergence of physical security technology and information technology and its impact on security departments, IT departments, vendors, and management.
    • Integrative Approaches for Health

      • 1st Edition
      • March 31, 2015
      • Bhushan Patwardhan + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 2 8 2 6
      • eBook
        9 7 8 0 1 2 8 0 1 4 3 4 9
      Despite spectacular advances, modern medicine faces formidable global challenges in several key areas—notably the persistence of major killer diseases such as malaria, tuberculosis, leprosy, and newer threats including HIV/AIDS, resistant infections, and Ebola. As such, modern medicine has not led to a significant decrease in chronic diseases like diabetes, obesity, and other degenerative and autoimmune diseases. The authors believe that modern medicine needs to experience a paradigm shift, an integration of traditions—in particular from the ancient systems like Ayurveda and Yoga. Integrative Approaches for Health: Biomedical Research, Ayurveda and Yoga brings together the basic principles of interdisciplinary systems approach for an evolving construct of future medicine. Such an approach is already emerging at the cutting edge of current research in omics, bioinformatics, computational and systems biology. Several leading institutions of medicine have adopted Yoga and complementary medicine to widen their reach, and deepen effectiveness in therapeutic practices. The amalgam of modern medicine, with its strengths in scientific rigor, blended with the basic principles of life drawn from Ayurveda and Yoga might evolve into a medicine of tomorrow. Integrative approaches are no longer alternative, perhaps taking these approaches is the only possible way to heal our sick planet. This book introduces important trends and tools for biomedical researchers and physicians alike, to innovate the practice of medicine for the better.
    • The Transformation of Academic Health Centers

      • 1st Edition
      • March 30, 2015
      • Steven Wartman
      • English
      • Hardback
        9 7 8 0 1 2 8 0 0 7 6 2 4
      • eBook
        9 7 8 0 1 2 8 0 1 0 0 4 4
      The Transformation of Academic Health Centers: The Institutional Challenge to Improve Health and Well-Being in Healthcare’s Changing Landscape presents the direct knowledge and vision of accomplished academic leaders whose unique positions as managers of some of the most complex academic and business enterprises make them expert contributors. Users will find invaluable insights and leadership perspectives on healthcare, health professions education, and bio-medical and clinical research that systematically explores the evolving role of global academic health centers with an eye focused on the transformation necessary to be successful in challenging environments. The book is divided into five sections moving from the broad perspective of the role of academic health centers to the role of education, training, and disruptive technologies. It then addresses the discovery processes, improving funding models, and research efficiency. Subsequent sections address the coming changes in healthcare delivery and future perspectives, providing a complete picture of the needs of the growing and influential healthcare sector.
    • Corporate Security Management

      • 1st Edition
      • March 30, 2015
      • Marko Cabric
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 9 3 4 3
      • eBook
        9 7 8 0 1 2 8 0 2 9 3 5 0
      Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible assets, and people. The book merges business and security perspectives to help transform this often conflicted relationship into a successful and sustainable partnership. It combines security doctrine, business priorities, and best practices to uniquely answer the Who, What, Where, Why, When and How of corporate security. Corporate Security Management explores the diverse structures of security organizations in different industries. It shows the crucial corporate security competencies needed and demonstrates how they blend with the competencies of the entire organization. This book shows how to identify, understand, evaluate and anticipate the specific risks that threaten enterprises and how to design successful protection strategies against them. It guides readers in developing a systematic approach to assessing, analyzing, planning, quantifying, administrating, and measuring the security function.