Skip to main content

Books in Social sciences and humanities

    • Preventing Workplace Violence: A Training Guide for Managers and Supervisors

      • 1st Edition
      • September 2, 2014
      • Rosalind Jackson
      • English
      • eBook
        9 7 8 0 1 2 8 0 0 9 2 4 6
      Preventing Workplace Violence: A Training Guide for Managers and Supervisors is a video presentation. Length: 25 minutes.In Preventing Workplace Violence: A Training Guide for Managers and Supervisors, presenter Rosalind W. Jackson provides the fundamentals of workplace violence prevention, including initial program development. This presentation explains the components needed to develop a good baseline program, and focuses on recognizing patterns of unacceptable behavior. It addresses policy development and expert consultation considerations, along with the use of education and team coordination. The presentation also includes a sample workplace violence policy statement, and discusses the impact of workplace violence on the business.Preventing Workplace Violence: A Training Guide for Managers and Supervisors is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Hacking and Penetration Testing with Low Power Devices

      • 1st Edition
      • August 29, 2014
      • Philip Polstra
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 5 1 8
      • eBook
        9 7 8 0 1 2 8 0 0 8 2 4 9
      Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!
    • Modern Enterprise Business Intelligence and Data Management

      • 1st Edition
      • August 28, 2014
      • Alan Simon
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 5 3 9 1
      • eBook
        9 7 8 0 1 2 8 0 1 7 4 5 6
      Nearly every large corporation and governmental agency is taking a fresh look at their current enterprise-scale business intelligence (BI) and data warehousing implementations at the dawn of the "Big Data Era"…and most see a critical need to revitalize their current capabilities. Whether they find the frustrating and business-impeding continuation of a long-standing "silos of data" problem, or an over-reliance on static production reports at the expense of predictive analytics and other true business intelligence capabilities, or a lack of progress in achieving the long-sought-after enterprise-wide "single version of the truth" – or all of the above – IT Directors, strategists, and architects find that they need to go back to the drawing board and produce a brand new BI/data warehousing roadmap to help move their enterprises from their current state to one where the promises of emerging technologies and a generation’s worth of best practices can finally deliver high-impact, architecturally evolvable enterprise-scale business intelligence and data warehousing. Author Alan Simon, whose BI and data warehousing experience dates back to the late 1970s and who has personally delivered or led more than thirty enterprise-wide BI/data warehousing roadmap engagements since the mid-1990s, details a comprehensive step-by-step approach to building a best practices-driven, multi-year roadmap in the quest for architecturally evolvable BI and data warehousing at the enterprise scale. Simon addresses the triad of technology, work processes, and organizational/human factors considerations in a manner that blends the visionary and the pragmatic.
    • The Biology of Thought

      • 1st Edition
      • August 28, 2014
      • Krishnagopal Dharani
      • English
      • Paperback
        9 7 8 0 1 2 8 1 0 2 3 8 1
      • Hardback
        9 7 8 0 1 2 8 0 0 9 0 0 0
      • eBook
        9 7 8 0 1 2 8 0 1 1 6 1 4
      The question of "what is thought" has intrigued society for ages, yet it is still a puzzle how the human brain can produce a myriad of thoughts and can store seemingly endless memories. All we know is that sensations received from the outside world imprint some sort of molecular signatures in neurons – or perhaps synapses – for future retrieval. What are these molecular signatures, and how are they made? How are thoughts generated and stored in neurons? The Biology of Thought explores these issues and proposes a new molecular model that sheds light on the basis of human thought. Step-by-step it describes a new hypothesis for how thought is produced at the micro-level in the brain – right at the neuron. Despite its many advances, the neurobiology field lacks a comprehensive explanation of the fundamental aspects of thought generation at the neuron level, and its relation to intelligence and memory. Derived from existing research in the field, this book attempts to lay biological foundations for this phenomenon through a novel mechanism termed the "Molecular-Grid Model" that may explain how biological electrochemical events occurring at the neuron interact to generate thoughts. The proposed molecular model is a testable hypothesis that hopes to change the way we understand critical brain function, and provides a starting point for major advances in this field that will be of interest to neuroscientists the world over.
    • The Role of Gender in Educational Contexts and Outcomes

      • 1st Edition
      • Volume 47
      • August 27, 2014
      • English
      • Hardback
        9 7 8 0 1 2 4 1 1 5 8 2 8
      • eBook
        9 7 8 0 1 2 4 1 1 5 7 6 7
      Volume 47 of Advances in Child Development and Behavior includes chapters that highlight some the most recent research in the area of gender in educational, contexts and outcomes. A wide array of topics are discussed in detail, including sexism, race and gender issues, sexual orientation, single-sex education, and physical education. Each chapter provides in-depth discussions, and this volume serves as an invaluable resource for developmental or educational psychology researchers, scholars, and students.
    • Information Hiding in Speech Signals for Secure Communication

      • 1st Edition
      • August 27, 2014
      • Zhijun Wu
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 3 2 8 1
      • eBook
        9 7 8 0 1 2 8 0 1 4 8 1 3
      In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more. This book shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN.
    • Security Leader Insights for Risk Management

      • 1st Edition
      • August 27, 2014
      • Richard Chase
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 8 4 0 9
      • eBook
        9 7 8 0 1 2 8 0 0 9 0 4 8
      How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Risk Management, a collection of timeless leadership best practices featuring insights from some of the nation’s most successful security practitioners, you can.This book can be used as a quick and effective resource to bring your security staff up to speed on security’s role in risk management. Instead of re-inventing the wheel when faced with a new challenge, these proven practices and principles will allow you to execute with confidence knowing that your peers have done so with success. Part one looks at the risk assessment and subtopics such as compliance, using risk assessments to increase security’s influence, and risk indicator dashboards. Part two discusses risk management topics such as board-level risk, global risk, risk appetite, and enterprise risk management (ERM).Security Leader Insights for Risk Management is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real-world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
    • Cerebellar Conditioning and Learning

      • 1st Edition
      • Volume 117
      • August 26, 2014
      • English
      • Hardback
        9 7 8 0 1 2 4 2 0 2 4 7 4
      • eBook
        9 7 8 0 1 2 8 0 0 7 9 1 4
      This volume of International Review of Neurobiology is on Cerebellar Conditioning and Learning. It reviews current knowledge and understanding, provides a starting point for researchers and practitioners entering the field.
    • Proactive Marketing for the New and Experienced Library Director

      • 1st Edition
      • August 25, 2014
      • Melissa U.D. Goldsmith + 1 more
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 8 7 3
      • eBook
        9 7 8 1 7 8 0 6 3 4 6 8 5
      Academic libraries have continually looked for technological solutions to low circulation statistics, under-usage by students and faculty, and what is perceived as a crisis in relevance, seeing themselves in competition with Google and Wikipedia. Academic libraries, however, are as relevant as they have been historically, as their primary functions within their university missions have not changed, but merely evolved. Going beyond the Gate Count argues that the problem is not relevance, but marketing and articulation. This book offers theoretical reasoning and practical advice to directors on how to better market the function of the library within and beyond the home institution. The aim of this text is to help directors, and ultimately, their librarians and staff get students and faculty back into the library, as a result of better articulation of the library’s importance. The first chapter explores the promotion of academic libraries and their function as educational systems. The next two chapters focus on the importance of the role social media and virtual presence in the academic library, and engaging and encouraging students to use the library through a variety of methods, such as visually oriented special collections. Remaining chapters discuss collaboration and collegiality, formalized reporting and marketing.
    • The Preservation and Protection of Library Collections

      • 1st Edition
      • August 25, 2014
      • Bogdan Zerek
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 5 9 0
      • eBook
        9 7 8 1 7 8 0 6 3 4 4 0 1
      Preservation involves a complex of activities including climate, air-quality, and surface control, as well as microbiological control, which is a key part of preserving and protecting library collections. The Preservation and Protection of Library Collections examines microbiological control for preservation of library and archival collections. A supporting tool for conservators, this title should be integrated into conservation and preservation policy. The book comprises nine sections that cover three aspects: microbiology, surveying, and the response required. Chapters in this title cover the nature of the library collections, physical and chemicals factors and their impact on microbiological issues, as well as biological factors and methods of microbiological control of the air and objects. Later chapters examine methods of object disinfection, disaster response, methods of microbiological control and evaluation of collections, and includes a vocabulary guide, appendices, literature information and references.