Skip to main content

Books in Social sciences and humanities

    • The Globalization of Chinese Business

      • 1st Edition
      • August 15, 2014
      • Robert Taylor
      • English
      • Paperback
        9 7 8 0 0 8 1 0 1 3 7 8 6
      • Hardback
        9 7 8 1 8 4 3 3 4 7 6 8 2
      • eBook
        9 7 8 1 7 8 0 6 3 4 4 9 4
      The main theme of the book is the globalisation of China’s markets and Chinese business management in the context of ongoing reform at home and the country’s growing global economic role. The Globalisation of Chinese Business includes contributions relating to a wide range of manufacturing and service sectors, encompassing such areas as foreign investment, state and private enterprise, human resource management, consumer culture and advertising, financial markets and healthcare. Following an introduction by the editor there are four sections, the first focused on the globalisation of Chinese management and the second on the evolution of Chinese management. The remaining sections contain chapters on China’s growing service sector, growing markets and competition, and healthcare system reform. An epilogue by the editor in the remaining section concludes.
    • Windows Performance Analysis Field Guide

      • 1st Edition
      • August 12, 2014
      • Clint Huffman
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 7 0 1 8
      • eBook
        9 7 8 0 1 2 4 1 6 7 0 4 9
      Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach to performance monitoring and analysis from experts who do this work every day. Think of this book as your own guide to "What would Microsoft support do?" when you have a Windows performance issue. Author Clint Huffman, a Microsoft veteran of over fifteen years, shows you how to identify and alleviate problems with the computer resources of disk, memory, processor, and network. You will learn to use performance counters as the initial indicators, then use various tools to "dig in" to the problem, as well as how to capture and analyze boot performance problems.
    • The Handbook for School Safety and Security

      • 1st Edition
      • August 12, 2014
      • Lawrence J. Fennelly + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 5 6 8 2
      • eBook
        9 7 8 0 1 2 8 0 0 6 2 5 2
      School security is one of the most pressing public concerns today. Yet in most schools, there is little security expertise or detailed knowledge about how to implement and manage a security program. The Handbook for School Safety and Security rectifies this problem by providing the salient information school administrators and security professionals need to address the most important security issues schools face. Made up of contributions from leading experts in school security, The Handbook for School Safety and Security provides a wealth of practical information for securing any K-12 school. It discusses key approaches and best practices for school crime prevention, including such topics as crisis management and mass notification. It also covers the physical measure needed for protecting a school, including detailed discussions of access control, lighting, alarms, and locks. While there is no single fix for the myriad of security challenges facing today’s school security professionals, the best practices found in The Handbook for School Safety and Security will help increase the safety and security of any school.
    • Technology Entrepreneurship

      • 2nd Edition
      • August 12, 2014
      • Thomas N. Duening + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 1 7 5 0
      • eBook
        9 7 8 0 1 2 4 2 0 2 3 4 4
      The focus of this book is on technology ventures — how they start, operate, and sometimes exit profitably. In short, it covers all the elements required to launch a successful technology company, including discussion of cutting-edge trends such as "entrepreneurial method" and "lean startup," emphasis on the ideation process and development of an effective business plan, coverage of product and market development, intellectual property, structuring your venture, raising capital, sales and marketing, people management, and even strategies for exiting your venture. This is not another armchair book about entrepreneurship. It’s a working guide for engineers and scientists who want to actually be entrepreneurs.
    • Security for Business Professionals

      • 1st Edition
      • August 12, 2014
      • Bradley A. Wayland
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 5 6 5 1
      • eBook
        9 7 8 0 1 2 8 0 0 6 2 1 4
      Security for Business Professionals offers business executives and managers everything they need to set-up a security program, especially for those who don’t have the resources to hire an in-house security staff. It can also be used for assessing the adequacy of an existing security program. The book provides an overview of the key security objectives and challenges that managers face, such as how to measure the effectiveness of a security program and balance the costs and benefits. It also shows how to develop security procedures that conform to key regulatory requirements, and how to assess an organization’s most important risks, vulnerabilities, and threats. Security for Business Professionals addresses key physical and informational security concerns, including areas such as asset protection, loss prevention, and personnel security. It also discusses how to develop emergency and incident response plans, and concludes with suggested safety and security exercises and training recommendations.
    • Building an Information Security Awareness Program

      • 1st Edition
      • August 7, 2014
      • Bill Gardner + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 9 9 6 7 5
      • eBook
        9 7 8 0 1 2 4 1 9 9 8 1 1
      The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up. Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management support for implementing the program. Author Bill Gardner is one of the founding members of the Security Awareness Training Framework. Here, he walks you through the process of developing an engaging and successful training program for your organization that will help you and your staff defend your systems, networks, mobile devices, and data. Forewords written by Dave Kennedy and Kevin Mitnick!
    • Introduction to Environmental Forensics

      • 3rd Edition
      • July 30, 2014
      • Brian L. Murphy + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 4 0 4 6 9 6 2
      • eBook
        9 7 8 0 1 2 4 0 4 7 0 7 5
      The third edition of Introduction to Environmental Forensics is a state-of-the-art reference for the practicing environmental forensics consultant, regulator, student, academic, and scientist, with topics including compound-specific isotope analysis (CSIA), advanced multivariate statistical techniques, surrogate approaches for contaminant source identification and age dating, dendroecology, hydrofracking, releases from underground storage tanks and piping, and contaminant-transpor... modeling for forensic applications. Recognized international forensic scientists were selected to author chapters in their specific areas of expertise and case studies are included to illustrate the application of these methods in actual environmental forensic investigations. This edition provides updates on advances in various techniques and introduces several new topics.
    • Advanced Topics in Forensic DNA Typing: Interpretation

      • 1st Edition
      • July 28, 2014
      • John M. Butler
      • English
      • Hardback
        9 7 8 0 1 2 4 0 5 2 1 3 0
      • eBook
        9 7 8 0 1 2 4 0 5 8 5 4 5
      Advanced Topics in Forensic DNA Typing: Interpretation builds upon the previous two editions of John Butler’s internationally acclaimed Forensic DNA Typing textbook with forensic DNA analysts as its primary audience. Intended as a third-edition companion to the Fundamentals of Forensic DNA Typing volume published in 2010 and Advanced Topics in Forensic DNA Typing: Methodology published in 2012, this book contains 16 chapters with 4 appendices providing up-to-date coverage of essential topics in this important field. Over 80 % of the content of this book is new compared to previous editions.
    • Radical Information Literacy

      • 1st Edition
      • July 25, 2014
      • Andrew Whitworth
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 4 8 4
      • eBook
        9 7 8 1 7 8 0 6 3 4 2 9 6
      What would a synthetic theory of Digital, Media and Information Literacy (DMIL) look like? Radical Information Literacy presents, for the first time, a theory of DMIL that synthesises the diversity of perspectives and positions on DMIL, both in the classroom and the workplace, and within the informal learning processes of society. This title is based on original analysis of how decisions are made about the relevance of information and the other resources used in learning, showing how society has privileged objective approaches (used in rule-based decision making) to the detriment of subjective and intersubjective perspectives which promote individual and community contexts. The book goes on to analyse the academic and popular DMIL literature, showing how the field may have been, consciously or unwittingly, complicit in the ‘objectification’ of learning and the disempowerment of individuals and communities. Alternative ways of conceiving the subject are then presented, towards a reversal of these trends.
    • Library Instruction Design

      • 1st Edition
      • July 25, 2014
      • Di Su
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 7 4 1 5
      • eBook
        9 7 8 1 7 8 0 6 3 4 0 7 4
      The design philosophies of Google and Apple represent different approaches to new product design. Google's model features bottom-up and data-driven decision-making processes, while Apple's model is to design and build products top-down. Library instruction program design may learn from these differing but complementary approaches. Inspired by Google’s and Apple’s success, Library Instruction Design details how library instruction program design may learn from the philosophy of product design in the business world. In designing library instruction, a Google-philosophy approach teaches what the user wants to know while an Apple-philosophy approach teaches what the librarian thinks the user needs to learn. These two design philosophies aim at different teaching objectives reflecting library and information science education in modern society. The book is divided into five sections, with opening sections covering library instruction, the philosophy of library instruction design and design philosophy from different angles. Later sections discuss applying Google’s model and applying Apple’s model.