Skip to main content

Books in Social sciences and humanities

    • Customer Care

      A Training Manual for Library Staff
      • 1st Edition
      • Pat Gannon-Leary + 1 more
      • English
      Customer Care provides a detailed course suitable for delivery to library staff at all levels. It can be used as a stand-alone reference work for customer care processes and procedures or, alternatively, it can be used by library staff to tailor a customer care course to suit the requirements and training needs of their own staff.
    • Abstracts and Abstracting

      A Genre and Set of Skills for the Twenty-First Century
      • 1st Edition
      • Tibor Koltay
      • English
      Despite their changing role, abstracts remain useful in the digital world. Highly beneficial to information professionals and researchers who work and publish in different fields, this book summarizes the most important and up-to-date theory of abstracting, as well as giving advice and examples for the practice of writing different kinds of abstracts. The book discusses the length, the functions and basic structure of abstracts, outlining a new approach to informative and indicative abstracts. The abstractors’ personality, their linguistic and non-linguistic knowledge and skills are also discussed with special attention.
    • Seven Deadliest Wireless Technologies Attacks

      • 1st Edition
      • Brad Haines
      • English
      Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised. This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.
    • Bidding Strategies, Financing and Control

      Modern Empirical Developments
      • 1st Edition
      • Bjørn Espen Eckbo
      • English
      A selection of republished corporate finance articles and book chapters that can serve as an advanced corporate finance supplementary text for courses that use no textbooks. Combining convenience and an affordable price with retypeset pages and a high-quality index, the 600 pages of volume two, "Bidding Strategies, Financing, and Corporate Control", focus on a range of special topics, ranging from theories and evidence on strategic bidding behavior (offer premiums, toeholds, bidder competition, winner’s curse adjustments, and managerial overconfidence), issues arising when bidding for targets in bankruptcy auctions, effects of deal protection devices (termination agreements, poison pills), role of large shareholder voting in promoting takeover gains, deal financing issues (such as raising the cash used to pay for the target), managerial incentive effects of takeovers, governance spillovers from cross-border mergers, and returns to merger arbitrage. Including an index and new introduction, this volume will simplify and facilitate students’ interaction with new concepts and applications.
    • The Professional Protection Officer

      Practical Security Strategies and Emerging Trends
      • 1st Edition
      • IFPO
      • Sandi J. Davies
      • English
      The Professional Protection Officer: Security Strategies, Tactics and Trends, Second Edition, is the definitive reference and instructional text for career oriented security officers in both the private and public sectors. The first edition originated with the birth of the International Foundation for Protection Officers (IFPO) in 1988, which has been using the book as the official text since that time. Each subsequent edition has brought new and enlightened information to the protection professional. The material in this new edition includes all of the subjects essential to training of protection professionals, and has been updated to reflect new strategies, tactics, and trends in this dynamic field.Written by leading security educators, trainers and consultants, this valuable resource has served as the definitive text for both students and professionals worldwide. This new edition adds critical updates and fresh pedagogy, as well as new diagrams, illustrations, and self assessments. The Professional Protection Officer: Security Strategies, Tactics and Trends is tailored to the training and certification needs of today’s protection professionals and proves to be the most exciting and progressive edition yet.
    • Takeover Activity, Valuation Estimates and Merger Gains

      Modern Empirical Developments
      • 1st Edition
      • Bjørn Espen Eckbo
      • English
      A selection of republished corporate finance articles and book chapters that can serve as an advanced corporate finance supplementary text for courses that use no textbooks. Combining convenience and an affordable price with retypeset pages and a high-quality index, the 600 pages of volume one, Takeover Activity, Valuation Estimates and Merger Gains, focus on classical issues such as the existence and source of merger waves, empirical estimates of takeover announcement returns and the division of takeover gains between bidders and targets, and tests for potential sources of takeover gains (primarily involving estimation of industry wealth effects of takeovers), introducing students to modern scientific evidence about corporate takeovers. Including an index and new introduction, this volume will simplify and facilitate students’ interaction with new concepts and applications.
    • Handbook of the Economics of Innovation

      • 1st Edition
      • Volume 2
      • Bronwyn H. Hall + 1 more
      • English
      How does technology advance? How can we best assimilate innovation? These questions and others are considered by experts on the theories and applications of technological innovations. Considering subjects as diverse as the diffusion of new technologies and their industrial applications, governmental policies, and manifestations of innovation in our institutions, history, and environment, our contributors map milestones in research and speculate about the roads ahead. Wasteful, inefficient, and frequently wrongheaded, the process of technological changes is here revealed as a describable, scientific force. Two volumes, available separately and as a set.
    • Advances in Experimental Social Psychology

      • 1st Edition
      • Volume 42
      • Mark P. Zanna
      • English
      Advances in Experimental Social Psychology continues to be one of the most sought after and most often cited series in this field. Containing contributions of major empirical and theoretical interest, this series represents the best and the brightest in new research, theory, and practice in social psychology. This serial is part of the Social Sciences package on ScienceDirect. Visit info.sciencedirect.c... for more information. Advances in Experimental Social Psychology is available online on ScienceDirect — full-text online of volume 32 onward. Elsevier book series on ScienceDirect gives multiple users throughout an institution simultaneous online access to an important complement to primary research. Digital delivery ensures users reliable, 24-hour access to the latest peer-reviewed content. The Elsevier book series are compiled and written by the most highly regarded authors in their fields and are selected from across the globe using Elsevier’s extensive researcher network. For more information about the Elsevier Book Series on ScienceDirect Program, please visit: info.sciencedirect.c...
    • Seven Deadliest Microsoft Attacks

      • 1st Edition
      • Rob Kraus + 3 more
      • English
      Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the most closely guarded company secrets. If you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products, this book is for you. It pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.The book consists of seven chapters that cover the seven deadliest attacks against Microsoft software and networks: attacks against Windows passwords; escalation attacks; stored procedure attacks; mail service attacks; client-side ActiveX and macro attacks; Web service attacks; and multi-tier attacks. Each chapter provides an overview of a single Microsoft software product, how it is used, and some of the core functionality behind the software. Furthermore, each chapter explores the anatomy of attacks against the software, the dangers of an attack, and possible defenses to help prevent the attacks described in the scenarios.This book will be a valuable resource for those responsible for oversight of network security for either small or large organizations. It will also benefit those interested in learning the details behind attacks against Microsoft infrastructure, products, and services; and how to defend against them. Network administrators and integrators will find value in learning how attacks can be executed, and transfer knowledge gained from this book into improving existing deployment and integration practices.
    • Network and System Security

      • 1st Edition
      • John Vacca
      • English
      Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization; cryptography; system intrusion; UNIX and Linux security; Internet security, intranet security; LAN security; wireless network security; cellular network security, RFID security, and more. This compilation of 13 chapters is tightly focused and ideally suited as an essential desk reference in this high-growth subject area.