Skip to main content

Books in Social sciences and humanities

  • IT Manager's Handbook

    Getting your New Job Done
    • 3rd Edition
    • Bill Holtsnider + 1 more
    • English
    IT Manager’s Handbook, Third Edition, provides a practical reference that you will return to again and again in an ever-changing corporate environment where the demands on IT continue to increase. Make your first 100 days really count with the fundamental principles and core concepts critical to your success as a new IT Manager. This is a must-read for new IT managers and a great refresher for seasoned managers trying to maintain expertise in the rapidly changing IT world. This latest edition includes discussions on how to develop an overall IT strategy as well as demonstrate the value of IT to the company. It will teach you how to: manage your enterprise’s new level of connectivity with a new chapter covering social media, handheld devices, and more; implement and optimize cloud services to provide a better experience for your mobile and virtual workforce at a lower cost to your bottom line; integrate mobile applications into your company’s strategy; and manage the money, including topics such as department budgets and leasing versus buying. You will also learn how to work with your customers, whomever those might be for your IT shop; hire, train, and manage your team and their projects so that you come in on time and budget; and secure your systems to face some of today's most challenging security challenges. This book will appeal to new IT managers in all areas of specialty, including technical professionals who are transitioning into IT management.
  • Cyber Attacks

    Protecting National Infrastructure, STUDENT EDITION
    • 1st Edition
    • Edward Amoroso
    • English
    Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure. This approach includes controversial themes such as the deliberate use of deception to trap intruders. This volume thus serves as an attractive framework for a new national strategy for cyber security. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. In this edition, each principle is presented as a separate security strategy and illustrated with compelling examples. The book adds 50-75 pages of new material aimed specifically at enhancing the student experience and making it more attractive for instructors teaching courses such as cyber security, information security, digital security, national security, intelligence studies, technology and infrastructure protection. It now also features case studies illustrating actual implementation scenarios of the principles and requirements discussed in the text, along with a host of new pedagogical elements, including chapter outlines, chapter summaries, learning checklists, and a 2-color interior. Furthermore, a new and complete ancillary package includes test bank, lesson plans, PowerPoint slides, case study questions, and more. This text is intended for security practitioners and military personnel as well as for students wishing to become security engineers, network operators, software designers, technology managers, application developers, etc.
  • The Dysregulated Adult

    Integrated Treatment Approaches
    • 1st Edition
    • Georgia A. DeGangi
    • English
    People experiencing disorders in regulation are highly sensitive to stimulation from the environment, emotionally reactive, and have difficulty maintaining an organized and calm life style. They are impulsive, easily frustrated, and as a result make decisions that lead to an overwrought state-or who conversely retreat entirely from the world. This disorder is most likely to accompany diagnoses of bipolar or mood disorder, anxiety, depression, obsessive-compulsive disorder, Asperger’s syndrome, eating or sleep disorders, and/or attention deficit disorder. This book instructs therapists how best to treat the dysregulated adult, providing diagnostic checklists, and a chapter by chapter inventory in approaching treatment of dysregulation in a variety of life skills.
  • Multinational Corporation Subsidiaries in China

    An Empirical Study of Growth and Development Strategy
    • 1st Edition
    • Jinghua Zhao + 3 more
    • English
    This comprehensive study examines the global strategies of multinational corporations (MNCs), the strategic evolution and the categories of their subsidiaries in China based on 150 MNCs. It is the first large-scale project of this nature to be conducted. The research has significant bearing on strategic planning for firms that have set up, are setting up or are planning to establish subsidiaries in China, and the firms that try to compete in the global marketplace. The findings are significant for the West, owing to the current economic crisis and the need to determine if subsidiary expansion strategies will help Western firms achieve the portfolio effects in operations and avoid the harmful impact of macro events such as the existing global financial crisis. Additional empirical findings, analysis, discussions, and suggestions for future studies are also presented.
  • Encyclopedia of Human Behavior

    • 2nd Edition
    • Vilayanur S. Ramachandran
    • English
    The Encyclopedia of Human Behavior, Second Edition, Three Voluime Set is an award-winning three-volume reference on human action and reaction, and the thoughts, feelings, and physiological functions behind those actions. Presented alphabetically by title, 300 articles probe both enduring and exciting new topics in physiological psychology, perception, personality, abnormal and clinical psychology, cognition and learning, social psychology, developmental psychology, language, and applied contexts. Written by leading scientists in these disciplines, every article has been peer-reviewed to establish clarity, accuracy, and comprehensiveness. The most comprehensive reference source to provide both depth and breadth to the study of human behavior, the encyclopedia will again be a much-used reference source. This set appeals to public, corporate, university and college libraries, libraries in two-year colleges, and some secondary schools. Carefully crafted, well written, and thoroughly indexed, the encyclopedia helps users—whether they are students just beginning formal study of the broad field or specialists in a branch of psychology—understan... the field and how and why humans behave as we do.
  • Handbook of Loss Prevention and Crime Prevention

    • 5th Edition
    • Lawrence J. Fennelly
    • English
    The Handbook of Loss Prevention and Crime Prevention, 5e, is a trusted resource for physical security professionals, students, and candidates for the coveted Certified Protection Professional (CPP) certification administered by ASIS International. The U.S. government recently announced that employees will have to obtain CPP certification to advance in their careers. Edited by the security practitioner and author Lawrence Fennelly, this handbook gathers in a single volume the key information on each topic from eminent subject-matter experts. Taken together, this material offers a range of approaches for defining security problems and tools for designing solutions in a world increasingly characterized by complexity and chaos. The 5e adds cutting-edge content and up-to-the-minute practical examples of its application to problems from retail crime to disaster readiness.
  • Windows Forensic Analysis Toolkit

    Advanced Analysis Techniques for Windows 7
    • 3rd Edition
    • Harlan Carvey
    • English
    Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7 provides an overview of live and postmortem response collection and analysis methodologies for Windows 7. It considers the core investigative and analysis concepts that are critical to the work of professionals within the digital forensic analysis community, as well as the need for immediate response once an incident has been identified. Organized into eight chapters, the book discusses Volume Shadow Copies (VSCs) in the context of digital forensics and explains how analysts can access the wealth of information available in VSCs without interacting with the live system or purchasing expensive solutions. It also describes files and data structures that are new to Windows 7 (or Vista), Windows Registry Forensics, how the presence of malware within an image acquired from a Windows system can be detected, the idea of timeline analysis as applied to digital forensic analysis, and concepts and techniques that are often associated with dynamic malware analysis. Also included are several tools written in the Perl scripting language, accompanied by Windows executables. This book will prove useful to digital forensic analysts, incident responders, law enforcement officers, students, researchers, system administrators, hobbyists, or anyone with an interest in digital forensic analysis of Windows 7 systems.
  • The Psychology of Learning and Motivation

    • 1st Edition
    • Volume 56
    • English
    The Psychology of Learning and Motivation series publishes empirical and theoretical contributions in cognitive and experimental psychology, ranging from classical and instrumental conditioning to complex learning and problem solving. Each chapter thoughtfully integrates the writings of leading contributors, who present and discuss significant bodies of research relevant to their discipline. Volume 56 includes chapters on such varied topics as emotion and memory interference, electrophysiology, mathematical cognition, and reader participation in narrative.
  • Handbook on Securing Cyber-Physical Critical Infrastructure

    • 1st Edition
    • Sajal K Das + 2 more
    • English
    The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques – while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.
  • Content Strategy at Work

    Real-world Stories to Strengthen Every Interactive Project
    • 1st Edition
    • Margot Bloomstein
    • English
    Content is king… and the new kingmaker… and your message needs to align with your model and metrics and other mumbo jumbo, right? Whether you’re slogging through theory or buzzwords, there’s no denying content strategy is coming of age. But what’s in it for you? And if you’re not a content strategist, why should you care? Because even if content strategy isn’t your job, content’s probably your problem—and probably more than you think. You or your business has a message you want to deliver, right? You can deliver that message through various channels and content types, from Tweets to testimonials and photo galleries galore, and your audience has just as many ways of engaging with it. So many ways, so much content… so where’s the problem? That is the problem. And you can measure it in time, creativity, money, lost opportunity, and the sobs you hear equally from creative directors, project managers, and search engine marketing specialists. The solution is content strategy, and this book offers real-world examples and approaches you can adopt, no matter your role on the team. Put content strategy to work for you by gathering this book into your little hands and gobbling up never-before seen case studies from teams at Johns Hopkins Medicine, MINI, Icebreaker, and more. Content Strategy at Work is a book for designers, information architects, copywriters, project managers, and anyone who works with visual or verbal content. It discusses how you can communicate and forge a plan that will enable you, your company, or your client get that message across and foster better user experiences.