Skip to main content

Books in Social sciences and humanities

  • Cognitive Electrophysiology of Attention

    Signals of the Mind
    • 1st Edition
    • August 31, 2013
    • George R. Mangun
    • English
    Cognitive Electrophysiology of Attention explores the fundamental mechanisms of attention and related cognitive functions from cognitive neuroscience perspectives. Attention is an essential cognitive ability that enables humans to process and act upon relevant information while ignoring distracting information, and the capacity to focus attention is at the core of mental functioning. Understanding the neural bases of human attention remains a key challenge for neuroscientists and psychologists, and is essential for translational efforts to treat attentional deficits in a variety of neurological and psychiatric disorders. Cognitive electrophysiology is at the center of a multidisciplinary approach that involves the efforts of psychologists, neuroscientists, neuropsychologists, psychiatrists, and neurologists to identify basic brain mechanisms and develop translational approaches to improve mental health. This edited volume is authored by leading investigators in the field and discusses methods focused on electrophysiological recordings in humans, including electroencephalograp... (EEG) and event-related potential (ERP) methods, and also incorporates evidence from functional magnetic resonance imaging (fMRI). Cognitive Electrophysiology of Attention illuminates specific models about attentional mechanisms in vision, audition, multisensory integration, memory, and semantic processing in humans.
  • Offices

    A Briefing and Design Guide
    • 1st Edition
    • August 30, 2013
    • Stephen Bailey
    • Fred Lawson
    • English
  • Museums and Art Galleries

    A Design and Development Guide
    • 1st Edition
    • August 30, 2013
    • Geoff Matthews
    • Fred Lawson
    • English
  • Psychiatric Rehabilitation

    • 3rd Edition
    • August 29, 2013
    • Carlos W. Pratt + 3 more
    • English
    The third edition of Psychiatric Rehabilitation, discusses interventions to help individuals with mental illness improve the quality of their life, achieve goals, and increase opportunities for community integration so they can lead full and productive lives. This person centered approach emphasizes strengths, skill development, and the attainment of valued social roles. The third edition has been fully updated with new coverage indicating how to address medical problems while treating for mental illness, wellness and recovery, evidence based practices, and directions for future research. Retaining the easy to read, engaging style, each chapter includes key terms with definitions, case studies, profiles of leaders in the field, special issues relating to treatment and ethics, and class exercises. Providing a comprehensive overview of this growing field, the book is suitable as an undergraduate or graduate textbook, as well as a reference for practitioners and academic researchers.Special Features:Provides new coverage on comorbid medical disorders, evidence based practices, wellness and recovery, and direction for future researchIdentifies controversial issues relating to treatment and ethicsSupplies case study examples to illustrate chapter pointsHighlights key terms with definitions and key topicsOffers focus questions and class exercises as a teaching tool
  • Network and System Security

    • 2nd Edition
    • August 26, 2013
    • John Vacca
    • English
    Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
  • Cyber Security and IT Infrastructure Protection

    • 1st Edition
    • August 22, 2013
    • John Vacca
    • English
    This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements:• Checklists throughout each chapter to gauge understanding• Chapter Review Questions/Exercises and Case Studies• Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc.
  • Venture Capital and Private Equity Contracting

    An International Perspective
    • 2nd Edition
    • August 21, 2013
    • Douglas J. Cumming + 1 more
    • English
    Other books present corporate finance approaches to the venture capital and private equity industry, but many key decisions require an understanding of the ways that law and economics work together. This revised and updated 2e offers broad perspectives and principles not found in other course books, enabling readers to deduce the economic implications of specific contract terms. This approach avoids the common pitfalls of implying that contractual terms apply equally to firms in any industry anywhere in the world. In the 2e, datasets from over 40 countries are used to analyze and consider limited partnership contracts, compensation agreements, and differences in the structure of limited partnership venture capital funds, corporate venture capital funds, and government venture capital funds. There is also an in-depth study of contracts between different types of venture capital funds and entrepreneurial firms, including security design, and detailed cash flow, control and veto rights. The implications of such contracts for value-added effort and for performance are examined with reference to data from an international perspective. With seven new or completely revised chapters covering a range of topics from Fund Size and Diseconomies of Scale to Fundraising and Regulation, this new edition will be essential for financial and legal students and researchers considering international venture capital and private equity.
  • Managing Information Security

    • 2nd Edition
    • August 21, 2013
    • John Vacca
    • English
    Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.
  • FISMA Compliance Handbook

    Second Edition
    • 1st Edition
    • August 20, 2013
    • Laura P. Taylor
    • English
    This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment. Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. FISMA Compliance Handbook Second Edition, also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government’s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
  • Interpreting Aerial Photographs to Identify Natural Hazards

    • 1st Edition
    • August 14, 2013
    • Charles E. Glass
    • English
    Authored by a world-renowned aerial photography and remote sensing expert, Geographic Aerial Photography: Identifying Earth-Surface Hazards Through Image Interpretation is the most practical and authoritative reference available for any professional or student looking for a reference on how to recognize, analyze, interpret and avoid – or successfully plan for – dangerous contingencies. Whether they are related to natural terrain, geology, vegetation, hydrology or land use patterns – it’s critical for you to be able to recognize dangerous conditions when and where they exist. Failure to adequately recognize and characterize geomorphic, geologic, and hydrologic dangers on the ground using aerial photography is one of the major factors contributing to due to natural hazards and disasters, damage to architectural structures, and often the subsequent loss of human life as a result. Aerial photographs provide one of the most prevalent, inexpensive and under-utilized tools to those with the knowledge and expertise to interpret them.