Skip to main content

Books in Social sciences and humanities

    • Augmented Reality Law, Privacy, and Ethics

      • 1st Edition
      • December 9, 2014
      • Brian Wassom
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 2 0 8 7
      • eBook
        9 7 8 0 1 2 8 0 0 5 2 4 8
      Augmented Reality (AR) is the blending of digital information in a real-world environment. A common example can be seen during any televised football game, in which information about the game is digitally overlaid on the field as the players move and position themselves. Another application is Google Glass, which enables users to see AR graphics and information about their location and surroundings on the lenses of their "digital eyewear", changing in real-time as they move about. Augmented Reality Law, Privacy, and Ethics is the first book to examine the social, legal, and ethical issues surrounding AR technology. Digital eyewear products have very recently thrust this rapidly-expanding field into the mainstream, but the technology is so much more than those devices. Industry analysts have dubbed AR the "eighth mass medium" of communications. Science fiction movies have shown us the promise of this technology for decades, and now our capabilities are finally catching up to that vision. Augmented Reality will influence society as fundamentally as the Internet itself has done, and such a powerful medium cannot help but radically affect the laws and norms that govern society. No author is as uniquely qualified to provide a big-picture forecast and guidebook for these developments as Brian Wassom. A practicing attorney, he has been writing on AR law since 2007 and has established himself as the world's foremost thought leader on the intersection of law, ethics, privacy, and AR. Augmented Reality professionals around the world follow his Augmented Legality® blog. This book collects and expands upon the best ideas expressed in that blog, and sets them in the context of a big-picture forecast of how AR is shaping all aspects of society.
    • Industrial Network Security

      • 2nd Edition
      • December 9, 2014
      • Eric D. Knapp + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 1 1 4 9
      • eBook
        9 7 8 0 1 2 4 2 0 1 8 4 2
      As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
    • Managing the One-Person Library

      • 1st Edition
      • December 9, 2014
      • Larry Cooperman
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 6 7 1 5
      • eBook
        9 7 8 1 7 8 0 6 3 3 5 7 2
      Managing the one-person library provides a useful and needed resource for solo librarians confronted with the challenges of running a small library. The author uniquely focuses on topics encountered by solo librarians, such as IT troubleshooting and library security. Chapters on library management, collection development, serials management, and library marketing are included to enable solo librarians to easily manage day-to-day operations in these areas, and advise on how to respond to any challenges that should (and will) arise. This book will provide a much-needed resource manual that will allow solo librarians of all backgrounds, and paraprofessionals, to manage their collections as effectively as their larger librarian counterparts.
    • Handbook of the Economics of International Migration

      • 1st Edition
      • Volume 1A+1B
      • December 8, 2014
      • Barry Chiswick + 1 more
      • English
      • Hardback
        9 7 8 0 4 4 4 6 3 3 7 2 9
      • eBook
        9 7 8 0 4 4 4 6 3 3 8 8 0
      The economic literature on international migration interests policymakers as well as academics throughout the social sciences. These volumes, the first of a new subseries in the Handbooks in Economics, describe and analyze scholarship created since the inception of serious attention began in the late 1970s. This literature appears in the general economics journals, in various field journals in economics (especially, but not exclusively, those covering labor market and human resource issues), in interdisciplinary immigration journals, and in papers by economists published in journals associated with history, sociology, political science, demography, and linguistics, among others.
    • The Complete Business Process Handbook

      • 1st Edition
      • December 6, 2014
      • Mark Von Rosing + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 7 9 9 9 5 9 3
      • eBook
        9 7 8 0 1 2 8 0 0 4 7 2 2
      The Complete Business Process Handbook is the most comprehensive body of knowledge on business processes with revealing new research. Written as a practical guide for Executives, Practitioners, Managers and Students by the authorities that have shaped the way we think and work with process today. It stands out as a masterpiece, being part of the BPM bachelor and master degree curriculum at universities around the world, with revealing academic research and insight from the leaders in the market. This book provides everything you need to know about the processes and frameworks, methods, and approaches to implement BPM. Through real-world examples, best practices, LEADing practices and advice from experts, readers will understand how BPM works and how to best use it to their advantage. Cases from industry leaders and innovators show how early adopters of LEADing Practices improved their businesses by using BPM technology and methodology. As the first of three volumes, this book represents the most comprehensive body of knowledge published on business process. Following closely behind, the second volume uniquely bridges theory with how BPM is applied today with the most extensive information on extended BPM. The third volume will explore award winning real-life examples of leading business process practices and how it can be replaced to your advantage.
    • Building an Intelligence-Led Security Program

      • 1st Edition
      • December 5, 2014
      • Allan Liska
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 1 4 5 3
      • eBook
        9 7 8 0 1 2 8 0 2 3 7 0 9
      As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents. The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way.
    • Introduction to US Cybersecurity Careers

      • 1st Edition
      • December 5, 2014
      • Henry Dalziel
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 2 2 6
      • eBook
        9 7 8 0 1 2 8 0 2 7 4 3 1
      Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field. This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.
    • A Machine-Learning Approach to Phishing Detection and Defense

      • 1st Edition
      • December 5, 2014
      • O.A. Akanbi + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 9 2 7 5
      • eBook
        9 7 8 0 1 2 8 0 2 9 4 6 6
      Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.
    • How to Define and Build an Effective Cyber Threat Intelligence Capability

      • 1st Edition
      • December 5, 2014
      • Henry Dalziel
      • Eric Olson + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 3 0 1
      • eBook
        9 7 8 0 1 2 8 0 2 7 5 2 3
      Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.
    • How to Defeat Advanced Malware

      • 1st Edition
      • December 5, 2014
      • Henry Dalziel
      • Simon Crosby
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 3 1 8
      • eBook
        9 7 8 0 1 2 8 0 2 7 5 3 0
      How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization... The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization...