Skip to main content

Books in Social sciences and humanities

    • Industrial Network Security

      • 1st Edition
      • August 15, 2011
      • Eric D. Knapp + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 4 5 2
      • eBook
        9 7 8 1 5 9 7 4 9 6 4 6 9
      Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems covers implementation guidelines for security measures of critical infrastructure. The book describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented. It also discusses common pitfalls and mistakes and how to avoid them. After reading this book, students will understand and address the unique security concerns that face the world's most important networks. This book examines the unique protocols and applications that are the foundation of industrial control systems and provides comprehensive guidelines for their protection. Divided into 11 chapters, it explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also explores industrial networks as they relate to "critical infrastructure" and cyber security; potential risks and consequences of a cyber attack against an industrial control system; compliance controls in relation to network security practices; industrial network protocols such as Modbus and DNP3; assessment of vulnerabilities and risk; how to secure enclaves; regulatory compliance standards applicable to industrial network security; and common pitfalls and mistakes, like complacency and deployment errors. This book is a valuable resource for plant operators and information security analysts, as well as compliance officers who want to pass an audit with minimal penalties and/or fines. It will also appeal to IT and security professionals working on networks and control systems operations.
    • Comparative Osteology

      • 1st Edition
      • August 12, 2011
      • Bradley Adams + 1 more
      • English
      • Spiral-bound
        9 7 8 0 1 2 3 8 8 4 3 7 4
      • eBook
        9 7 8 0 1 2 3 8 8 4 4 0 4
      In the forensic context it is quite common for nonhuman bones to be confused with human remains and end up in the medical examiner or coroner system. It is also quite common for skeletal remains (both human and nonhuman) to be discovered in archaeological contexts. While the difference between human and nonhuman bones is often very striking, it can also be quite subtle. Fragmentation only compounds the problem. The ability to differentiate between human and nonhuman bones is dependent on the training of the analyst and the available reference and/or comparative material. Comparative Osteology is a photographic atlas of common North American animal bones designed for use as a laboratory and field guide by the forensic scientist or archaeologist. The intent of the guide is not to be inclusive of all animals, but rather to present some of the most common species which also have the highest likelihood of being potentially confused with human remains.
    • Technology and Knowledge Flow

      • 1st Edition
      • August 5, 2011
      • Guglielmo Trentin
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 6 4 6 3
      • eBook
        9 7 8 1 7 8 0 6 3 2 6 7 4
      This book outlines how network technology can support, foster and enhance the Knowledge Management, Sharing and Development (KMSD) processes in professional environments through the activation of both formal and informal knowledge flows. Understanding how ICT can be made available to such flows in the knowledge society is a factor that cannot be disregarded and is confirmed by the increasing interest of companies in new forms of software-mediated social interaction. The latter factor is in relation both to the possibility of accelerating internal communication and problem solving processes, and/or in relation to dynamics of endogenous knowledge growth of human resources.The book will focus specifically on knowledge flow (KF) processes occurring within networked communities of professionals (NCP) and the associated virtual community environments (VCE) that foster horizontal dynamics in the management, sharing and development of fresh knowledge. Along this line a further key issue will concern the analysis and evaluation techniques of the impact of Network Technology use on both community KF and NCP performance.
    • Understanding Librarians

      • 1st Edition
      • August 5, 2011
      • Barbara Hull
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 6 1 5 9
      • eBook
        9 7 8 1 7 8 0 6 3 2 6 9 8
      Aimed at professionals and trainee professionals within the library and information service (LIS) fields, this book reminds the reader of the frequently ignored communication-gulf between the professional and the layman, and in particular the lack of true communication between LIS professionals and the user. It focuses especially on ‘non-standard’ users, such as non-native speakers or those with some disability. The author provides accessible examples of good practice, assesses their degree of success and suggests further ways to improve performance in information provision.
    • Qualitative Research and the Modern Library

      • 1st Edition
      • July 30, 2011
      • Valeda Dent Goodman
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 6 4 4 9
      • eBook
        9 7 8 1 7 8 0 6 3 2 6 8 1
      Qualitative Research and the Modern Library examines the present-day role and provides suggestions for areas that might be suited to this type of research for the purposes of evaluation. The author discusses how the results from such research might be applied, and the overall impact of using this type of research to inform development of a more user-centred organisation. The book provides a thoughtful look at the implications of using qualitative research to inform decision-making processes within libraries and is written by an author and library researcher with international experience in various types of libraries, implementing/improvi... programs and services, and supporting user needs.
    • Cognition in Education

      • 1st Edition
      • Volume 55
      • July 28, 2011
      • English
      • Hardback
        9 7 8 0 1 2 3 8 7 6 9 1 1
      • eBook
        9 7 8 0 1 2 3 8 7 7 0 7 9
      Education and cognitive psychology are natural companions—they both are focused on how people think and learn. Although collaborations have occurred for many years, recently there has been a much greater interest in collaborations that bring cognitive principles into classroom settings. This renewed collaborative research has led both to new evidence-based instructional practices and to a better understanding of cognitive principles. This volume contains overviews of research projects at the intersection of cognitive science and education. The prominent contributors—cogniti... psychologists, developmental psychologists, educational psychologists, and science educators—were chosen both for the quality of their work and the variety of their contributions—genera... principles; influence of affect and motivation; and focus on math and science education.
    • Becoming Confident Teachers

      • 1st Edition
      • July 26, 2011
      • Claire McGuinness
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 6 2 9 6
      • eBook
        9 7 8 1 7 8 0 6 3 2 7 1 1
      Becoming Confident Teachers examines the teaching role of information professionals at a time of transition and change in higher education. While instruction is now generally accepted as a core library function in the 21st century, librarians often lack sufficient training in pedagogy and instructional design; consequently finding their teaching responsibilities to be stressful and challenging. By exploring the requirements and responsibilities of the role, this book guides teaching librarians to a position where they feel confident that they have acquired the basic body of knowledge and procedures to handle any kind of instructional requests that come their way, and to be proactive in developing and promoting teaching and learning initiatives. In addition, this book suggests strategies and methods for self-development and fostering a “teacher identity,” giving teaching librarians a greater sense of purpose and direction, and the ability to clearly communicate their role to non-library colleagues and within the public sphere.
    • Advanced Topics in Forensic DNA Typing: Methodology

      • 1st Edition
      • July 21, 2011
      • John M. Butler
      • English
      • Hardback
        9 7 8 0 1 2 3 7 4 5 1 3 2
      • eBook
        9 7 8 0 1 2 3 8 7 8 2 3 6
      Intended as a companion to the Fundamentals of Forensic DNA Typing volume published in 2009, Advanced Topics in Forensic DNA Typing: Methodology contains 18 chapters with 4 appendices providing up-to-date coverage of essential topics in this important field and citation to more than 2800 articles and internet resources. The book builds upon the previous two editions of John Butler’s internationally acclaimed Forensic DNA Typing textbook with forensic DNA analysts as its primary audience. This book provides the most detailed information written to-date on DNA databases, low-level DNA, validation, and numerous other topics including a new chapter on legal aspects of DNA testing to prepare scientists for expert witness testimony. Over half of the content is new compared to previous editions. A forthcoming companion volume will cover interpretation issues.
    • Penetration Tester's Open Source Toolkit

      • 3rd Edition
      • July 18, 2011
      • Jeremy Faircloth
      • English
      • eBook
        9 7 8 1 5 9 7 4 9 6 2 8 5
      Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the student for each situation. This edition offers instruction on how and in which situations the penetration tester can best use them. Real-life scenarios support and expand upon explanations throughout. It also presents core technologies for each type of testing and the best tools for the job. The book consists of 10 chapters that covers a wide range of topics such as reconnaissance; scanning and enumeration; client-side attacks and human weaknesses; hacking database services; Web server and Web application testing; enterprise application testing; wireless penetrating testing; and building penetration test labs. The chapters also include case studies where the tools that are discussed are applied. New to this edition: enterprise application testing, client-side attacks and updates on Metasploit and Backtrack. This book is for people who are interested in penetration testing or professionals engaged in penetration testing. Those working in the areas of database, network, system, or application administration, as well as architects, can gain insights into how penetration testers perform testing in their specific areas of expertise and learn what to expect from a penetration test. This book can also serve as a reference for security or audit professionals.
    • The Four Colors of Business Growth

      • 1st Edition
      • July 18, 2011
      • Anjan V. Thakor
      • English
      • Paperback
        9 7 8 0 1 2 3 8 5 2 3 9 7
      • eBook
        9 7 8 0 1 2 3 8 5 2 4 0 3
      Defining an organization by its growth strategy enables business leaders to make better decisions about the ways their companies compete. Anjan Thakor’s four categories of growth, which he arranges into the Competing Values Framework, delivers methods for developing strategies grounded in internal cultures and industry goals. Written for professionals, this book provides easy access to concepts in fields as diverse as corporate strategy, finance, organizational behavior, change management, and leadership.