Skip to main content

Books in Social sciences and humanities

    • Handbook of Economic Forecasting

      • 1st Edition
      • Volume 2A-2B
      • August 26, 2013
      • Graham Elliott + 1 more
      • English
      • eBook
        9 7 8 0 4 4 4 6 2 7 4 1 4
      The highly prized ability to make financial plans with some certainty about the future comes from the core fields of economics. In recent years the availability of more data, analytical tools of greater precision, and ex post studies of business decisions have increased demand for information about economic forecasting. Volumes 2A and 2B, which follows Nobel laureate Clive Granger's Volume 1 (2006), concentrate on two major subjects. Volume 2A covers innovations in methodologies, specifically macroforecasting and forecasting financial variables. Volume 2B investigates commercial applications, with sections on forecasters' objectives and methodologies. Experts provide surveys of a large range of literature scattered across applied and theoretical statistics journals as well as econometrics and empirical economics journals. The Handbook of Economic Forecasting Volumes 2A and 2B provide a unique compilation of chapters giving a coherent overview of forecasting theory and applications in one place and with up-to-date accounts of all major conceptual issues.
    • Network and System Security

      • 2nd Edition
      • August 26, 2013
      • John Vacca
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 8 9 9
      • eBook
        9 7 8 0 1 2 4 1 6 6 9 5 0
      Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
    • Cyber Security and IT Infrastructure Protection

      • 1st Edition
      • August 22, 2013
      • John Vacca
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 8 1 3
      • eBook
        9 7 8 0 1 2 4 2 0 0 4 7 0
      This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements:• Checklists throughout each chapter to gauge understanding• Chapter Review Questions/Exercises and Case Studies• Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc.
    • Venture Capital and Private Equity Contracting

      • 2nd Edition
      • August 21, 2013
      • Douglas J. Cumming + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 1 0 0 7 6 9
      • Hardback
        9 7 8 0 1 2 4 0 9 5 3 7 3
      • eBook
        9 7 8 0 1 2 4 0 9 5 9 6 0
      Other books present corporate finance approaches to the venture capital and private equity industry, but many key decisions require an understanding of the ways that law and economics work together. This revised and updated 2e offers broad perspectives and principles not found in other course books, enabling readers to deduce the economic implications of specific contract terms. This approach avoids the common pitfalls of implying that contractual terms apply equally to firms in any industry anywhere in the world. In the 2e, datasets from over 40 countries are used to analyze and consider limited partnership contracts, compensation agreements, and differences in the structure of limited partnership venture capital funds, corporate venture capital funds, and government venture capital funds. There is also an in-depth study of contracts between different types of venture capital funds and entrepreneurial firms, including security design, and detailed cash flow, control and veto rights. The implications of such contracts for value-added effort and for performance are examined with reference to data from an international perspective. With seven new or completely revised chapters covering a range of topics from Fund Size and Diseconomies of Scale to Fundraising and Regulation, this new edition will be essential for financial and legal students and researchers considering international venture capital and private equity.
    • Managing Information Security

      • 2nd Edition
      • August 21, 2013
      • John Vacca
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 8 8 2
      • eBook
        9 7 8 0 1 2 4 1 6 6 9 4 3
      Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.
    • FISMA Compliance Handbook

      • 1st Edition
      • August 20, 2013
      • Laura P. Taylor
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 8 7 1 2
      • eBook
        9 7 8 0 1 2 4 0 5 9 1 5 3
      This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government’s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
    • Interpreting Aerial Photographs to Identify Natural Hazards

      • 1st Edition
      • August 14, 2013
      • Charles E. Glass
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 0 1 8 0
      • eBook
        9 7 8 0 1 2 4 2 0 0 2 8 9
      Authored by a world-renowned aerial photography and remote sensing expert, Geographic Aerial Photography: Identifying Earth-Surface Hazards Through Image Interpretation is the most practical and authoritative reference available for any professional or student looking for a reference on how to recognize, analyze, interpret and avoid – or successfully plan for – dangerous contingencies. Whether they are related to natural terrain, geology, vegetation, hydrology or land use patterns – it’s critical for you to be able to recognize dangerous conditions when and where they exist. Failure to adequately recognize and characterize geomorphic, geologic, and hydrologic dangers on the ground using aerial photography is one of the major factors contributing to due to natural hazards and disasters, damage to architectural structures, and often the subsequent loss of human life as a result. Aerial photographs provide one of the most prevalent, inexpensive and under-utilized tools to those with the knowledge and expertise to interpret them.
    • Neuroeconomics

      • 2nd Edition
      • August 13, 2013
      • Paul W. Glimcher
      • English
      • Hardback
        9 7 8 0 1 2 4 1 6 0 0 8 8
      • eBook
        9 7 8 0 1 2 3 9 1 4 6 9 9
      In the years since it first published, Neuroeconomics: Decision Making and the Brain has become the standard reference and textbook in the burgeoning field of neuroeconomics. The second edition, a nearly complete revision of this landmark book, will set a new standard. This new edition features five sections designed to serve as both classroom-friendly introductions to each of the major subareas in neuroeconomics, and as advanced synopses of all that has been accomplished in the last two decades in this rapidly expanding academic discipline. The first of these sections provides useful introductions to the disciplines of microeconomics, the psychology of judgment and decision, computational neuroscience, and anthropology for scholars and students seeking interdisciplinary breadth. The second section provides an overview of how human and animal preferences are represented in the mammalian nervous systems. Chapters on risk, time preferences, social preferences, emotion, pharmacology, and common neural currencies—each written by leading experts—lay out the foundations of neuroeconomic thought. The third section contains both overview and in-depth chapters on the fundamentals of reinforcement learning, value learning, and value representation. The fourth section, “The Neural Mechanisms for Choice,” integrates what is known about the decision-making architecture into state-of-the-art models of how we make choices. The final section embeds these mechanisms in a larger social context, showing how these mechanisms function during social decision-making in both humans and animals. The book provides a historically rich exposition in each of its chapters and emphasizes both the accomplishments and the controversies in the field. A clear explanatory style and a single expository voice characterize all chapters, making core issues in economics, psychology, and neuroscience accessible to scholars from all disciplines. The volume is essential reading for anyone interested in neuroeconomics in particular or decision making in general.
    • X-Ways Forensics Practitioner’s Guide

      • 1st Edition
      • August 10, 2013
      • Brett Shavers + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 6 0 5 4
      • eBook
        9 7 8 0 1 2 4 1 1 6 2 2 1
      The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches. With X-Ways Forensics Practitioner's Guide, you will be able to use X-Ways Forensics to its fullest potential without any additional training. The book takes you from installation to the most advanced features of the software. Once you are familiar with the basic components of X-Ways, the authors demonstrate never-before-documen... features using real life examples and information on how to present investigation results. The book culminates with chapters on reporting, triage and preview methods, as well as electronic discovery and cool X-Ways apps.
    • From the Files of a Security Expert Witness

      • 1st Edition
      • August 9, 2013
      • Charles A. Sennewald
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 6 2 5 2
      • eBook
        9 7 8 0 1 2 4 1 1 6 2 6 9
      From the Files of a Security Expert Witness guides the reader through the experience of testifying in court on security issues in civil litigation. Written by one of the security profession's best-known expert witnesses, the book explores 36 cases that reflect the high drama of true crime, including kidnapping, rape, and murder. Many of these cases led to premises liability lawsuits based on claims of negligence, inadequate security, false arrest and imprisonment, excessive use of force, and others. Effective security specialists, whether or not they are considering becoming expert witnesses, should be familiar with the facts of these cases, their theories of liability and theories of defense. Encompassing aspects of criminal and tort law, all within the context of forensic security consulting, this book offers valuable insights from an experienced security professional.