Skip to main content

Books in Social sciences and humanities

  • Investing in Hedge Funds

    A Guide to Measuring Risk and Return Characteristics
    • 1st Edition
    • June 29, 2013
    • Turan Bali + 2 more
    • English
    This book will present a comprehensive view of the risk characteristics, risk-adjusted performances, and risk exposures of various hedge fund indices. It will distinguish itself from other books and journal articles by focusing solely on hedge fund indices and emphasizing tail risk as a predictor of hedge fund index returns. The three chapters in this short book have not been previously published.
  • Professional Penetration Testing

    Creating and Learning in a Hacking Lab
    • 2nd Edition
    • June 27, 2013
    • Thomas Wilhelm
    • English
    Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. All disc-based content for this title is now available on the Web.
  • Handbook of Public Economics

    • 1st Edition
    • Volume 5
    • June 24, 2013
    • Alan J. Auerbach + 3 more
    • English
    In the Handbook of Public Economics, vol. 5, top scholars provide context and order to new research about mechanisms that underlie both public finance theories and applications. These fundamental subjects follow the recent, steady movement away from rational decision-making and toward more personalized approaches to tax generation and expenditure, especially in terms of the use of psychological methods and financial incentives. Closely scrutinized subjects include new research in empirical (instead of theoretical) public finance, the methods for measuring taxes (both in revenue generation and expenditure), and the roles that taxes play in specific settings, such as emerging economies, urban settings, charitable giving, and among political entities (cities, counties, states, countries). Contributors look at both the "tax" and "expenditure" sides of public finance, emphasizing recent influences that psychology and philosophy have exerted in economics with articles on behavioral finance, charitable giving, and dynamic taxation. To a field enjoying rapid growth, their articles bring context and order, illuminating the mechanisms that underlie both public finance theories and applications.
  • The Basics of Hacking and Penetration Testing

    Ethical Hacking and Penetration Testing Made Easy
    • 2nd Edition
    • June 24, 2013
    • Patrick Engebretson
    • English
    The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
  • WAIS-IV, WMS-IV, and ACS

    Advanced Clinical Interpretation
    • 1st Edition
    • June 20, 2013
    • James A. Holdnack + 3 more
    • English
    This book provides users of the Wechsler Adult Intelligence Scale (WAIS-IV) with information on applying the WAIS-IV, including additional indexes and information regarding use in special populations for advanced clinical use and interpretation. The book offers sophisticated users of the WAIS-IV and Wechsler Memory Scale (WMS-IV) guidelines on how to enhance the clinical applicability of these tests. The first section of the book provides an overview of the WAIS-IV, WMS-IV, and new Advanced Clinical Solutions for Use with the WAIS-IV/WMS-IV (ACS). In this section, examiners will learn: Normal versus atypical score variability Low-score prevalence in healthy adults versus clinical populations Assessing whether poor performance reflects a decline in function or is the result of suboptimal effort New social cognition measures found in the ACS are also presented. The second part focuses on applying the topics in the first section to specific clinical conditions, including recommended protocols for specific clientele (e.g. using demographically adjusted norms when evaluating individuals with brain injury). Common clinical conditions are discussed, including Alzheimer’s disease, mild cognitive impairment, traumatic brain injury, and more. Each chapter provides case examples applying all three test batteries and using report examples as they are obtained from the scoring assistant. Finally, the use of the WAIS-IV/WMS-IV and the ACS in forensic settings is presented.
  • Crime Prevention Through Environmental Design

    • 3rd Edition
    • June 19, 2013
    • Timothy Crowe + 1 more
    • English
    Crime Prevention Through Environmental Design, 3e is a vital book for anyone involved in architectural design, space management, and urban planning. The concepts presented in this book explain the link between design and human behavior. Understanding this link can enable a planner to use natural environmental factors to minimize loss and crime and to maximize productivity. This practical guide addresses several environmental settings, including major event facilities, small retail establishments, downtown streets, residential areas, and playgrounds. A one-stop resource with explanations of criminal behavior and the historical aspects of design, it teaches both the novice and the expert in crime prevention how to use the environment to affect human behavior in a positive manner.
  • Mathematical Models for Society and Biology

    • 2nd Edition
    • June 19, 2013
    • Edward Beltrami
    • English
    Mathematical Models for Society and Biology, 2e, is a useful resource for researchers, graduate students, and post-docs in the applied mathematics and life science fields. Mathematical modeling is one of the major subfields of mathematical biology. A mathematical model may be used to help explain a system, to study the effects of different components, and to make predictions about behavior. Mathematical Models for Society and Biology, 2e, draws on current issues to engagingly relate how to use mathematics to gain insight into problems in biology and contemporary society. For this new edition, author Edward Beltrami uses mathematical models that are simple, transparent, and verifiable. Also new to this edition is an introduction to mathematical notions that every quantitative scientist in the biological and social sciences should know. Additionally, each chapter now includes a detailed discussion on how to formulate a reasonable model to gain insight into the specific question that has been introduced.
  • Invertebrate Learning and Memory

    • 1st Edition
    • Volume 22
    • June 18, 2013
    • Randolf Menzel + 1 more
    • English
    Understanding how memories are induced and maintained is one of the major outstanding questions in modern neuroscience. This is difficult to address in the mammalian brain due to its enormous complexity, and invertebrates offer major advantages for learning and memory studies because of their relative simplicity. Many important discoveries made in invertebrates have been found to be generally applicable to higher organisms, and the overarching theme of the proposed will be to integrate information from different levels of neural organization to help generate a complete account of learning and memory. Edited by two leaders in the field, Invertebrate Learning and Memory will offer a current and comprehensive review, with chapters authored by experts in each topic. The volume will take a multidisciplinary approach, exploring behavioral, cellular, genetic, molecular, and computational investigations of memory. Coverage will include comparative cognition at the behavioral and mechanistic level, developments in concepts and methodologies that will underlie future advancements, and mechanistic examples from the most important vertebrate systems (nematodes, molluscs, and insects). Neuroscience researchers and graduate students with an interest in the neural control of cognitive behavior will benefit, as will as will those in the field of invertebrate learning.
  • The Basics of Web Hacking

    Tools and Techniques to Attack the Web
    • 1st Edition
    • June 18, 2013
    • Josh Pauli
    • English
    The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities. The Basics of Web Hacking provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user. With Dr. Pauli’s approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how easily they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and several known-vulnerable Web application VMs that are widely available and maintained for this very purpose. Once you complete the entire process, not only will you be prepared to test for the most damaging Web exploits, you will also be prepared to conduct more advanced Web hacks that mandate a strong base of knowledge.
  • Ethical Justice

    Applied Issues for Criminal Justice Students and Professionals
    • 1st Edition
    • June 7, 2013
    • Brent E. Turvey + 1 more
    • English
    This textbook was developed from an idiom shared by the authors and contributors alike: ethics and ethical challenges are generally black and white - not gray. They are akin to the pregnant woman or the gunshot victim; one cannot be a little pregnant or a little shot. Consequently, professional conduct is either ethical or it is not. Unafraid to be the harbingers, Turvey and Crowder set forth the parameters of key ethical issues across the five pillars of the criminal justice system: law enforcement, corrections, courts, forensic science, and academia. It demonstrates how each pillar is dependent upon its professional membership, and also upon the supporting efforts of the other pillars - with respect to both character and culture.With contributions from case-working experts across the CJ spectrum, this text reveals hard-earned insights into issues that are often absent from textbooks born out of just theory and research. Part 1 examines ethic issues in academia, with chapters on ethics for CJ students, CJ educators, and ethics in CJ research. Part 2 examines ethical issues in law enforcement, with separate chapters on law enforcement administration and criminal investigations. Part 3 examines ethical issues in the forensic services, considering the separate roles of crime lab administration and evidence examination. Part 4 examines ethical issues in the courts, with chapters discussing the prosecution, the defense, and the judiciary. Part 5 examines ethical issues in corrections, separately considering corrections staff and treatment staff in a forensic setting. The text concludes with Part 6, which examines ethical issues in a broad professional sense with respect to professional organizations and whistleblowers.Ethic... Justice: Applied Issues for Criminal Justice Students and Professionals is intended for use as a textbook at the college and university, by undergraduate students enrolled in a program related to any of the CJ professions. It is intended to guide them through the real-world issues that they will encounter in both the classroom and in the professional community. However, it can also serve as an important reference manual for the CJ professional that may work in a community that lacks ethical mentoring or leadership.