Skip to main content

Books in Social sciences and humanities

  • Disaster Planning for Libraries

    Process and Guidelines
    • 1st Edition
    • December 9, 2014
    • Guy Robertson
    • English
    Libraries are constantly at risk. Every day, many libraries and their collections are damaged by fire, flooding, high winds, power outages, and criminal behaviour. Every library needs a plan to protect its staff, sites and collections, including yours. Disaster Planning for Libraries provides a practical guide to developing a comprehensive plan for any library. Twelve chapters cover essential areas of plan development; these include an overview of the risks faced by libraries, disaster preparedness and responding to disasters, resuming operations after a disaster and assessing damage, declaring disaster and managing a crisis, cleaning up and management after a disaster and normalizing relations, staff training, testing disaster plans, and the in-house planning champion.
  • The Basics of Digital Forensics

    The Primer for Getting Started in Digital Forensics
    • 2nd Edition
    • December 9, 2014
    • John Sammons
    • English
    The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud and the Internet are discussed. Also, learn how to collect evidence, document the scene, and how deleted data can be recovered. The new Second Edition of this book provides the reader with real-world examples and all the key technologies used in digital forensics, as well as new coverage of network intrusion response, how hard drives are organized, and electronic discovery. This valuable resource also covers how to incorporate quality assurance into an investigation, how to prioritize evidence items to examine (triage), case processing, and what goes into making an expert witness.
  • Library 3.0

    Intelligent Libraries and Apomediation
    • 1st Edition
    • December 9, 2014
    • Tom Kwanya + 2 more
    • English
    The emerging generation of research and academic library users expect the delivery of user-centered information services. ‘Apomediation’ refers to the supporting role librarians can give users by stepping in when users need help. Library 3.0 explores the ongoing debates on the “point oh” phenomenon and its impact on service delivery in libraries. This title analyses Library 3.0 and its potential in creating intelligent libraries capable of meeting contemporary needs, and the growing role of librarians as apomediators. Library 3.0 is divided into four chapters. The first chapter introduces and places the topic in context. The second chapter considers “point oh” libraries. The third chapter covers library 3.0 librarianship, while the final chapter explores ways libraries can move towards ‘3.0'.
  • Industrial Network Security

    Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
    • 2nd Edition
    • December 9, 2014
    • Eric D. Knapp + 1 more
    • English
    As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
  • Augmented Reality Law, Privacy, and Ethics

    Law, Society, and Emerging AR Technologies
    • 1st Edition
    • December 9, 2014
    • Brian Wassom
    • English
    Augmented Reality (AR) is the blending of digital information in a real-world environment. A common example can be seen during any televised football game, in which information about the game is digitally overlaid on the field as the players move and position themselves. Another application is Google Glass, which enables users to see AR graphics and information about their location and surroundings on the lenses of their "digital eyewear", changing in real-time as they move about. Augmented Reality Law, Privacy, and Ethics is the first book to examine the social, legal, and ethical issues surrounding AR technology. Digital eyewear products have very recently thrust this rapidly-expanding field into the mainstream, but the technology is so much more than those devices. Industry analysts have dubbed AR the "eighth mass medium" of communications. Science fiction movies have shown us the promise of this technology for decades, and now our capabilities are finally catching up to that vision. Augmented Reality will influence society as fundamentally as the Internet itself has done, and such a powerful medium cannot help but radically affect the laws and norms that govern society. No author is as uniquely qualified to provide a big-picture forecast and guidebook for these developments as Brian Wassom. A practicing attorney, he has been writing on AR law since 2007 and has established himself as the world's foremost thought leader on the intersection of law, ethics, privacy, and AR. Augmented Reality professionals around the world follow his Augmented Legality® blog. This book collects and expands upon the best ideas expressed in that blog, and sets them in the context of a big-picture forecast of how AR is shaping all aspects of society.
  • Handbook of the Economics of International Migration

    • 1st Edition
    • Volume 1A+1B
    • December 8, 2014
    • Barry Chiswick + 1 more
    • English
    The economic literature on international migration interests policymakers as well as academics throughout the social sciences. These volumes, the first of a new subseries in the Handbooks in Economics, describe and analyze scholarship created since the inception of serious attention began in the late 1970s. This literature appears in the general economics journals, in various field journals in economics (especially, but not exclusively, those covering labor market and human resource issues), in interdisciplinary immigration journals, and in papers by economists published in journals associated with history, sociology, political science, demography, and linguistics, among others.
  • The Complete Business Process Handbook

    Body of Knowledge from Process Modeling to BPM, Volume 1
    • 1st Edition
    • December 6, 2014
    • Mark Von Rosing + 2 more
    • English
    The Complete Business Process Handbook is the most comprehensive body of knowledge on business processes with revealing new research. Written as a practical guide for Executives, Practitioners, Managers and Students by the authorities that have shaped the way we think and work with process today. It stands out as a masterpiece, being part of the BPM bachelor and master degree curriculum at universities around the world, with revealing academic research and insight from the leaders in the market. This book provides everything you need to know about the processes and frameworks, methods, and approaches to implement BPM. Through real-world examples, best practices, LEADing practices and advice from experts, readers will understand how BPM works and how to best use it to their advantage. Cases from industry leaders and innovators show how early adopters of LEADing Practices improved their businesses by using BPM technology and methodology. As the first of three volumes, this book represents the most comprehensive body of knowledge published on business process. Following closely behind, the second volume uniquely bridges theory with how BPM is applied today with the most extensive information on extended BPM. The third volume will explore award winning real-life examples of leading business process practices and how it can be replaced to your advantage.
  • A Machine-Learning Approach to Phishing Detection and Defense

    • 1st Edition
    • December 5, 2014
    • O.A. Akanbi + 2 more
    • English
    Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.
  • How to Define and Build an Effective Cyber Threat Intelligence Capability

    • 1st Edition
    • December 5, 2014
    • Henry Dalziel
    • Eric Olson + 1 more
    • English
    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.
  • How to Attack and Defend Your Website

    • 1st Edition
    • December 5, 2014
    • Henry Dalziel
    • Alejandro Caceres
    • English
    How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools – most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.