Skip to main content

Books in Social sciences and humanities

  • Vertical Specialization and Trade Surplus in China

    • 1st Edition
    • May 9, 2013
    • Wei Wang
    • English
    The traditional flow of goods from primary production through to manufacturing and consumption has expanded across international borders conterminously with globalization. Vertical specialization (VS) in processing and manufacturing in China has driven export growth. In particular, intra-industry and intra-product trade between China, the US and East Asia has increased China’s trade surplus over the long term. Vertical Specialization and Trade Surplus in China aims to measure the level of VS in the Chinese manufacturing industry to provide a more accurate representation of China’s trade surplus, and gives empirical analysis on provinces and products with important VS activities in order to assess China’s trade value-added. Exploring the vertical division of labour, and foreign direct investment (FDI) driving China’s import and export imbalance, the book is divided into eight chapters, each covering an aspect of VS in China. The first chapter outlines the aims and method of the study. Chapter two covers VS trade pattern and trade surplus. Chapter three looks at FDI and the import and export imbalance, and chapter four covers the relationship between VS and import and export of foreign invested enterprises. The fifth chapter considers the causes and prospects for growth in China-US and China-Japan trade. Chapters six and seven give an empirical analysis of VS and trade surplus, and a breakdown of VS per industry in China’s provinces. Finally, chapter eight considers rebalancing imports and exports in China.
  • Advances in Experimental Social Psychology

    • 1st Edition
    • Volume 48
    • May 8, 2013
    • English
    Advances in Experimental Social Psychology continues to be one of the most sought after and most often cited series in this field. Containing contributions of major empirical and theoretical interest, this series represents the best and the brightest in new research, theory, and practice in social psychology. This serial is part of the Social Sciences package on ScienceDirect. Visit info.sciencedirect.c... for more information. Advances in Experimental Social Psychology is available online on ScienceDirect — full-text online of volume 32 onward. Elsevier book series on ScienceDirect gives multiple users throughout an institution simultaneous online access to an important complement to primary research. Digital delivery ensures users reliable, 24-hour access to the latest peer-reviewed content. The Elsevier book series are compiled and written by the most highly regarded authors in their fields and are selected from across the globe using Elsevier’s extensive researcher network. For more information about the Elsevier Book Series on ScienceDirect Program, please visit info.sciencedirect.c...
  • Simple Steps to Data Encryption

    A Practical Guide to Secure Computing
    • 1st Edition
    • April 25, 2013
    • Peter Loshin
    • English
    Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHO... having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard. The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file. There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche. By reading this title readers will be provided with a step by step hands-on guide that includes: Simple descriptions of actual threat scenarios Simple, step-by-step instructions for securing data How to use open source, time-proven and peer-reviewed cryptographic software Easy to follow tips for safer computing Unbiased and platform-independent coverage of encryption tools and techniques
  • The Case for the Chief Data Officer

    Recasting the C-Suite to Leverage Your Most Valuable Asset
    • 1st Edition
    • April 22, 2013
    • Peter Aiken + 1 more
    • English
    Data are an organization's sole, non-depletable, non-degrading, durable asset. Engineered right, data's value increases over time because the added dimensions of time, geography, and precision. To achieve data's full organizational value, there must be dedicated individual to leverage data as assets - a Chief Data Officer or CDO who's three job pillars are: Dedication solely to leveraging data assets, Unconstrained by an IT project mindset, and Reports directly to the business Once these three pillars are set into place, organizations can leverage their data assets. Data possesses properties worthy of additional investment. Many existing CDOs are fatally crippled, however, because they lack one or more of these three pillars. Often organizations have some or all pillars already in place but are not operating in a coordinated manner. The overall objective of this book is to present these pillars in an understandable way, why each is necessary (but insufficient), and what do to about it.
  • Pharmacy Law and Practice

    • 5th Edition
    • April 19, 2013
    • Jon Merrills + 1 more
    • English
    Pharmacy Law and Practice, Fifth Edition provides a straightforward and useable guide for students, practitioners, academics and others interested in pharmacy law and practice in the United Kingdom. This multi-dimensional book includes discussions of socio-political influences on legal developments to provide greater insight to the reader. It clearly sets out the background to regulatory issues together with simple and practical statements of what a pharmacist has to do to obey the law. As in previous editions, this book discusses topics thematically rather than by statute. It is a unique and reader-friendly guide that boils down the complex or difficult language of the law, describes the reasons behind it, and illustrates the application to pharmacy practice.
  • Windows Server 2012 Security from End to Edge and Beyond

    Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions
    • 1st Edition
    • April 18, 2013
    • Yuri Diogenes + 2 more
    • English
    Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments. The book's revolutionary "Test Lab Guide" approach lets you test every subject in a predefined test lab environment. This, combined with conceptual and deployment guidance, enables you to understand the technologies and move from lab to production faster than ever before. Critical material is also presented in key concepts and scenario-based approaches to evaluation, planning, deployment, and management. Videos illustrating the functionality in the Test Lab can be downloaded from the authors’ blog http://blogs.technet... Each chapter wraps up with a bullet list summary of key concepts discussed in the chapter.
  • Exploring Education for Digital Librarians

    Meaning, Modes and Models
    • 1st Edition
    • April 17, 2013
    • Sue Myburgh + 1 more
    • English
    Exploring Education for Digital Librarians provides a refreshing perspective on the discipline and profession of Library and Information Science (LIS), with a focus on preparing students for careers as librarians who can deal with present and future digital information environments. A re-examination of the knowledge base of the field, combined with a proposed theoretical structure for LIS, provide the basis for this work, which also examines competencies for practice as well as some of the international changes in the nature of higher education. The authors finally suggest a model that could be used internationally to educate librarians for their new roles and social responsibilities in a digitised, networked world.The twelve chapters of this book cover key issues in education for digital librarians, including: the necessity of regenerating the profession; current contexts; previous research on education for digital librarians; understanding the dimensions of the discipline and profession of librarianship, and the distinctions between them; the social purpose of librarianship as a profession and the theoretical framework which supports the practice of the profession; a brief analysis of curriculum design, pedagogies and teaching methods, and a glimpse of the proactive and important future role of librarianship in society.
  • Diversity and the Effective Corporate Board

    • 1st Edition
    • April 16, 2013
    • Ram Kumar Mishra + 1 more
    • English
    The book discusses the various aspects of diversity of corporate boards in terms of gender, age, nationality, tenure, education, experience and personalities. It enumerates the need for such diversity in each category and related concerns. Statistics from around the world support the authors’ claims. The nine chapters in this short book have not been previously published.
  • Assessing Vendors

    A Hands-On Guide to Assessing Infosec and IT Vendors
    • 1st Edition
    • April 10, 2013
    • Josh More
    • English
    Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. Assessing Vendors shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, digging too deeply, or making decisions too quickly. This hands-on guide will show you how to use an iterative approach to vendor analysis, so you can rapidly filter out the vendors that are clear failures and then select likely winners. It will then show you how to do progressively deeper dives into the likely winners so you can select a preferred vendor. Finally, you will learn how to negotiate with your preferred vendor to get reasonable prices and services. Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price
  • Advances in Experimental Social Psychology

    • 1st Edition
    • Volume 47
    • April 5, 2013
    • English
    Advances in Experimental Social Psychology continues to be one of the most sought after and most often cited series in this field. Containing contributions of major empirical and theoretical interest, this series represents the best and the brightest in new research, theory, and practice in social psychology. This serial is part of the Social Sciences package on ScienceDirect. Visit info.sciencedirect.c... for more information. Advances Experimental Social Psychology is available online on ScienceDirect — full-text online of volumes 32 onward. Elsevier book series on ScienceDirect gives multiple users throughout an institution simultaneous online access to an important complement to primary research. Digital delivery ensures users reliable, 24-hour access to the latest peer-reviewed content. The Elsevier book series are compiled and written by the most highly regarded authors in their fields and are selected from across the globe using Elsevier’s extensive researcher network. For more information about the Elsevier Book Series on ScienceDirect Program, please visit: info.sciencedirect.c...