Skip to main content

Books in Social sciences and humanities

  • Managing the One-Person Library

    • 1st Edition
    • Larry Cooperman
    • English
    Managing the one-person library provides a useful and needed resource for solo librarians confronted with the challenges of running a small library. The author uniquely focuses on topics encountered by solo librarians, such as IT troubleshooting and library security. Chapters on library management, collection development, serials management, and library marketing are included to enable solo librarians to easily manage day-to-day operations in these areas, and advise on how to respond to any challenges that should (and will) arise. This book will provide a much-needed resource manual that will allow solo librarians of all backgrounds, and paraprofessionals, to manage their collections as effectively as their larger librarian counterparts.
  • Industrial Network Security

    Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
    • 2nd Edition
    • Eric D. Knapp + 1 more
    • English
    As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
  • Disaster Planning for Libraries

    Process and Guidelines
    • 1st Edition
    • Guy Robertson
    • English
    Libraries are constantly at risk. Every day, many libraries and their collections are damaged by fire, flooding, high winds, power outages, and criminal behaviour. Every library needs a plan to protect its staff, sites and collections, including yours. Disaster Planning for Libraries provides a practical guide to developing a comprehensive plan for any library. Twelve chapters cover essential areas of plan development; these include an overview of the risks faced by libraries, disaster preparedness and responding to disasters, resuming operations after a disaster and assessing damage, declaring disaster and managing a crisis, cleaning up and management after a disaster and normalizing relations, staff training, testing disaster plans, and the in-house planning champion.
  • Augmented Reality Law, Privacy, and Ethics

    Law, Society, and Emerging AR Technologies
    • 1st Edition
    • Brian Wassom
    • English
    Augmented Reality (AR) is the blending of digital information in a real-world environment. A common example can be seen during any televised football game, in which information about the game is digitally overlaid on the field as the players move and position themselves. Another application is Google Glass, which enables users to see AR graphics and information about their location and surroundings on the lenses of their "digital eyewear", changing in real-time as they move about. Augmented Reality Law, Privacy, and Ethics is the first book to examine the social, legal, and ethical issues surrounding AR technology. Digital eyewear products have very recently thrust this rapidly-expanding field into the mainstream, but the technology is so much more than those devices. Industry analysts have dubbed AR the "eighth mass medium" of communications. Science fiction movies have shown us the promise of this technology for decades, and now our capabilities are finally catching up to that vision. Augmented Reality will influence society as fundamentally as the Internet itself has done, and such a powerful medium cannot help but radically affect the laws and norms that govern society. No author is as uniquely qualified to provide a big-picture forecast and guidebook for these developments as Brian Wassom. A practicing attorney, he has been writing on AR law since 2007 and has established himself as the world's foremost thought leader on the intersection of law, ethics, privacy, and AR. Augmented Reality professionals around the world follow his Augmented Legality® blog. This book collects and expands upon the best ideas expressed in that blog, and sets them in the context of a big-picture forecast of how AR is shaping all aspects of society.
  • Google Earth Forensics

    Using Google Earth Geo-Location in Digital Forensic Investigations
    • 1st Edition
    • Michael Harrington + 1 more
    • English
    Google Earth Forensics is the first book to explain how to use Google Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows how to extract location-based data that can be used to display evidence in compelling audiovisual manners that explain and inform the data in contextual, meaningful, and easy-to-understand ways. As mobile computing devices become more and more prevalent and powerful, they are becoming more and more useful in the field of law enforcement investigations and forensics. Of all the widely used mobile applications, none have more potential for helping solve crimes than those with geo-location tools. Written for investigators and forensic practitioners, Google Earth Forensics is written by an investigator and trainer with more than 13 years of experience in law enforcement who will show you how to use this valuable tool anywhere at the crime scene, in the lab, or in the courtroom.
  • The Basics of Digital Forensics

    The Primer for Getting Started in Digital Forensics
    • 2nd Edition
    • John Sammons
    • English
    The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud and the Internet are discussed. Also, learn how to collect evidence, document the scene, and how deleted data can be recovered. The new Second Edition of this book provides the reader with real-world examples and all the key technologies used in digital forensics, as well as new coverage of network intrusion response, how hard drives are organized, and electronic discovery. This valuable resource also covers how to incorporate quality assurance into an investigation, how to prioritize evidence items to examine (triage), case processing, and what goes into making an expert witness.
  • Handbook of the Economics of International Migration

    • 1st Edition
    • Volume 1A+1B
    • Barry Chiswick + 1 more
    • English
    The economic literature on international migration interests policymakers as well as academics throughout the social sciences. These volumes, the first of a new subseries in the Handbooks in Economics, describe and analyze scholarship created since the inception of serious attention began in the late 1970s. This literature appears in the general economics journals, in various field journals in economics (especially, but not exclusively, those covering labor market and human resource issues), in interdisciplinary immigration journals, and in papers by economists published in journals associated with history, sociology, political science, demography, and linguistics, among others.
  • The Complete Business Process Handbook

    Body of Knowledge from Process Modeling to BPM, Volume 1
    • 1st Edition
    • Mark Von Rosing + 2 more
    • English
    The Complete Business Process Handbook is the most comprehensive body of knowledge on business processes with revealing new research. Written as a practical guide for Executives, Practitioners, Managers and Students by the authorities that have shaped the way we think and work with process today. It stands out as a masterpiece, being part of the BPM bachelor and master degree curriculum at universities around the world, with revealing academic research and insight from the leaders in the market. This book provides everything you need to know about the processes and frameworks, methods, and approaches to implement BPM. Through real-world examples, best practices, LEADing practices and advice from experts, readers will understand how BPM works and how to best use it to their advantage. Cases from industry leaders and innovators show how early adopters of LEADing Practices improved their businesses by using BPM technology and methodology. As the first of three volumes, this book represents the most comprehensive body of knowledge published on business process. Following closely behind, the second volume uniquely bridges theory with how BPM is applied today with the most extensive information on extended BPM. The third volume will explore award winning real-life examples of leading business process practices and how it can be replaced to your advantage.
  • Building an Intelligence-Led Security Program

    • 1st Edition
    • Allan Liska
    • English
    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents. The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way.
  • Introduction to US Cybersecurity Careers

    • 1st Edition
    • Henry Dalziel
    • English
    Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field. This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.