Skip to main content

Books in Social sciences and humanities

    • Season of Birth

      • 1st Edition
      • August 11, 2015
      • Per Dalén
      • English
      • Paperback
        9 7 8 0 7 2 0 4 2 8 2 7 8
      • eBook
        9 7 8 1 4 8 3 1 4 2 1 0 4
      Season of Birth: A Study of Schizophrenia and Other Mental Disorders discusses the correlation between season of birth and mental disorders. The book provides reviews of studies relevant to understanding how the season of birth relates to various mental disorders. The first five chapters cover pregnancy and birth related issues. These chapters cover vital statistics, obstetrics, and neonatal and congenital abnormalities and disorders. The next two chapters deal with intelligence and mental disorders, respectively. Chapters 8 to 12 discuss the studies done on Swedish and South African demographics. Chapter 13 talks about the congenital malformations outside the central nervous system, while Chapter 14 deals with neoplastic diseases. The fifteenth chapter covers the other pathological conditions, and the last chapter discusses the normal somatic characteristics. The text will be of great use to researchers and practitioners of psychology and psychiatry. Readers who are concerned with various mental disorders will also find the book informative.
    • Forensic Evidence Field Guide

      • 1st Edition
      • January 19, 2015
      • Peter Pfefferli
      • English
      • eBook
        9 7 8 0 1 2 7 9 9 9 2 5 8
      Forensic Evidence Field Guide: A Collection of Best Practices highlights the essentials needed to collect evidence at a crime scene. The unique spiral bound design is perfect for use in the day-to-day tasks involved in collecting evidence in the field. The book covers a wide range of evidence collection and management, including characteristics of different types of crime scenes (arson, burglary, homicide, hit-and-run, forensic IT, sexual assault), how to recover the relevant evidence at the scene, and best practices for the search, gathering, and storing of evidence. It examines in detail the properties of biological/DNA evidence, bullet casings and gunshot residue, explosive and fire debris, fibers and hair, fingerprint, footprint, and tire impression evidence, and much more. This guide is a vital companion for forensic science technicians, crime scene investigators, evidence response teams, and police officers.
    • Breaking into Information Security

      • 1st Edition
      • December 5, 2015
      • Josh More + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 8 3 9
      • eBook
        9 7 8 0 1 2 8 0 0 9 8 9 5
      Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren’t always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.
    • Workplace Safety

      • 1st Edition
      • October 23, 2015
      • Randall W. Ferris + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 7 5 2
      • eBook
        9 7 8 0 1 2 8 0 2 7 8 9 9
      Workplace Safety: Establishing an Effective Violence Prevention Program includes a powerful model on how to overcome organizational rationalization, objection, and denial when confronted with proposing a workplace violence protection program. The book offers real-life cases studies on how violence was successfully avoided using the book’s program, and also shows how to recognize and report precursor behaviors that precede violence. In addition, the book demonstrates proven methods for properly, and effectively, responding to violence should it occur, and tactfully managing the aftermath.
    • A Study of Black Hole Attack Solutions

      • 1st Edition
      • November 3, 2015
      • Iraj Sadegh Amiri + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 3 6 7 6
      • eBook
        9 7 8 0 1 2 8 0 5 3 7 9 9
      Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.
    • Environmental and Animal Rights Extremism, Terrorism, and National Security

      • 1st Edition
      • January 23, 2015
      • Elzbieta Posluszna
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 4 7 8 3
      • eBook
        9 7 8 0 1 2 8 0 1 7 0 4 3
      As concerns about human treatment of the environment and animals have increased over the years, so have decentralized and extremist groups related to these causes. Environmental and Animal Rights Extremism, Terrorism, and National Security analyzes the international development of radical movements relating to environmental concerns and animal rights in the context of the threats they pose to national security. In addition to tracing the factors responsible for the rapid growth of these movements over the last 25 years, this text presents countermeasures that governments can deploy to neutralize the risk posed by these threats now and in the future. Bringing to bear new developments such as cyber activity and online activism, Environmental and Animal Rights Extremism, Terrorism, and National Security offers an examination of the direct and indirect violence, lone-wolf terrorism, and leaderless resistance that have characterized these radical wings from their inception.By not only identifying the tactics and organizational structures often employed by these groups, but also addressing future trends toward increased radicalization, Environmental and Animal Rights Extremism, Terrorism, and National Security is an important resource for identifying, anticipating, and mitigating threats posed by such movements.
    • You: For Sale

      • 1st Edition
      • August 20, 2015
      • Stuart Sumner
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 4 0 5 7
      • eBook
        9 7 8 0 1 2 8 0 3 4 2 3 1
      Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK – have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been happening for years, with firms such as Google capturing everything you type into a browser and selling it to the highest bidder. Apps take information about where you go, and your contact book details, harvest them and sell them on – and people just click the EULA without caring. No one is revealing the dirty secret that is the tech firms harvesting customers’ personal data and selling it for vast profits – and people are totally unaware of the dangers. You: For Sale is for anyone who is concerned about what corporate and government invasion of privacy means now and down the road. The book sets the scene by spelling out exactly what most users of the Internet and smart phones are exposing themselves to via commonly used sites and apps such as facebook and Google, and then tells you what you can do to protect yourself. The book also covers legal and government issues as well as future trends. With interviews of leading security experts, black market data traders, law enforcement and privacy groups, You: For Sale will help you view your personal data in a new light, and understand both its value, and its danger.
    • Security Technology Convergence Insights

      • 1st Edition
      • April 1, 2015
      • Ray Bernard
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 8 4 2 1
      • eBook
        9 7 8 0 1 2 8 0 3 0 0 1 1
      Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information technology (IT) advances continued to accelerate, the physical security industry continued to lag behind IT advances by at least two to three years. Security Technology Convergence Insights explores this sometimes problematic convergence of physical security technology and information technology and its impact on security departments, IT departments, vendors, and management.
    • Artificial Intelligence in Behavioral and Mental Health Care

      • 1st Edition
      • September 10, 2015
      • David D. Luxton
      • English
      • Hardback
        9 7 8 0 1 2 4 2 0 2 4 8 1
      • eBook
        9 7 8 0 1 2 8 0 0 7 9 2 1
      Artificial Intelligence in Behavioral and Mental Health Care summarizes recent advances in artificial intelligence as it applies to mental health clinical practice. Each chapter provides a technical description of the advance, review of application in clinical practice, and empirical data on clinical efficacy. In addition, each chapter includes a discussion of practical issues in clinical settings, ethical considerations, and limitations of use. The book encompasses AI based advances in decision-making, in assessment and treatment, in providing education to clients, robot assisted task completion, and the use of AI for research and data gathering. This book will be of use to mental health practitioners interested in learning about, or incorporating AI advances into their practice and for researchers interested in a comprehensive review of these advances in one source.
    • Interpreting Biomedical Science

      • 1st Edition
      • June 11, 2015
      • Ülo Maiväli
      • English
      • Hardback
        9 7 8 0 1 2 4 1 8 6 8 9 7
      • eBook
        9 7 8 0 1 2 4 1 9 9 5 6 9
      Interpreting Biomedical Science: Experiment, Evidence, and Belief discusses what can go wrong in biological science, providing an unbiased view and cohesive understanding of scientific methods, statistics, data interpretation, and scientific ethics that are illustrated with practical examples and real-life applications. Casting a wide net, the reader is exposed to scientific problems and solutions through informed perspectives from history, philosophy, sociology, and the social psychology of science. The book shows the differences and similarities between disciplines and different eras and illustrates the concept that while sound methodology is necessary for the progress of science, we cannot succeed without a right culture of doing things.