Skip to main content

Books in Social sciences and humanities

  • Philosophy of Information

    • 1st Edition
    • English
    Information is a recognized fundamental notion across the sciences and humanities, which is crucial to understanding physical computation, communication, and human cognition. The Philosophy of Information brings together the most important perspectives on information. It includes major technical approaches, while also setting out the historical backgrounds of information as well as its contemporary role in many academic fields. Also, special unifying topics are high-lighted that play across many fields, while we also aim at identifying relevant themes for philosophical reflection. There is no established area yet of Philosophy of Information, and this Handbook can help shape one, making sure it is well grounded in scientific expertise. As a side benefit, a book like this can facilitate contacts and collaboration among diverse academic milieus sharing a common interest in information.
  • SAP Security Configuration and Deployment

    The IT Administrator's Guide to Best Practices
    • 1st Edition
    • Joey Hirao
    • English
    Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It's a complex area that requires focused expertise.This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations.Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security.
  • Mobile Malware Attacks and Defense

    • 1st Edition
    • Ken Dunham
    • English
    Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.* Visual PayloadsView attacks as visible to the end user, including notation of variants.* Timeline of Mobile Hoaxes and ThreatsUnderstand the history of major attacks and horizon for emerging threates.* Overview of Mobile Malware FamiliesIdentify and understand groups of mobile malicious code and their variations.* Taxonomy of Mobile MalwareBring order to known samples based on infection, distribution, and payload strategies.* Phishing, SMishing, and Vishing AttacksDetect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.* Operating System and Device VulnerabilitiesAnaly... unique OS security issues and examine offensive mobile device threats.* Analyze Mobile MalwareDesign a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware.* Forensic Analysis of Mobile MalwareConduct forensic analysis of mobile devices and learn key differences in mobile forensics.* Debugging and Disassembling Mobile MalwareUse IDA and other tools to reverse-engineer samples of malicious code for analysis.* Mobile Malware Mitigation MeasuresQualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.
  • International Business Control, Reporting and Corporate Governance

    Global business best practice across cultures, countries and organisations
    • 1st Edition
    • Georges Nurdin
    • English
    This book is designed to help Business Controllers / Accountants / Finance Directors / Bankers / Financial Analysts / Business Consultants to understand that International Business Control is much more than just a business being IFRS and US GAAP compliant, or just an extension of the domestic HQ control system.
  • A Leadership Primer for New Librarians

    Tools for Helping Today’s Early-Career Librarians Become Tomorrow’s Library Leaders
    • 1st Edition
    • Suzanne Byke + 1 more
    • English
    This book provides strategies and practical tips for leadership development in the field of librarianship. With the increase of both new graduates entering the field and upcoming retirements, there is a foreseeable gap in library leadership. Many early-career librarians will move into roles they are not ready for and others will find themselves having to lead without being in traditional leadership roles. This book offers suggestions for librarians facing these challenging new circumstances. The book shows how to create leadership opportunities when none appear to be present, how to take charge of your own professional development, and how to become an effective follower as well as an effective leader. The book helps the reader to recognize and take advantage of the leadership opportunities set before them.
  • A Sense of Control

    Virtual Communities for People with Mobility Impairments
    • 1st Edition
    • Christine Tilley
    • English
    This work develops a theoretical framework for a virtual community for people with long-term, severe mobility disabilities. It proposes strategies for implementing a virtual community model based on user information needs. The central theme to emerge from their narratives is how the use of information and communications technology (ICT) allows them to regain a sense of control. The conclusion is that the technology provides strategies for independence and facilitates self-empowerment.
  • Disaster Communications in a Changing Media World

    • 1st Edition
    • George Haddow + 1 more
    • English
    Communications is key to the success of disaster mitigation, preparedness, response and recovery. Accurate information disseminated to the general public, to elected officials and community leaders, and to the media reduces risk, saves lives and property, and speeds recovery. The ability to communicate is no longer an afterthought or a luxury; timely communication is now as important as logistics or the pre-deployment of materials. Planning and controlling the flow of information before, during and after a disaster will define your organization's credibility, trustworthiness, authority, and effectiveness.The emergence of new media like the internet, e-mail, blogs, text messaging, cell phone photos, and the increasing role played by "first informers"-- witnesses who now have the ability to transmit information immediately from the event--are redefining the roles of government and media.The government's historical role as gatekeeper is now an anachronism. Traditional media's role as the sole conduit of reliable and officially-sanctione... information has been eclipsed by the advent of new media. The tools and rules of communications are evolving and disaster communications must evolve to capitalize on these changes and exploit the opportunities they provide. Bloggers have the potential either to add to the chaos during a crisis, or to help convey accurate data and report on local conditions. Disaster communications must incorporate a way to manage their impact and if possible use them for the common good.Finally, even though the means to the end are evolving, the goals, the values, and the underlying principles of effective disaster communication-- the need for transparency, increased accessibility, trustworthiness and reliability, and to create partnerships with the media--have not changed and need to be embraced along with the practical ability to convey information effectively.
  • Concise Encyclopedia of Languages of the World

    • 1st Edition
    • Keith Brown + 1 more
    • English
    Concise Encyclopedia of Languages of the World is an authoritative single-volume reference resource comprehensively describing the major languages and language families of the world. It will provide full descriptions of the phonology, semantics, morphology, and syntax of the world’s major languages, giving insights into their structure, history and development, sounds, meaning, structure, and language family, thereby both highlighting their diversity for comparative study, and contextualizing them according to their genetic relationships and regional distribution.Based on the highly acclaimed and award-winning Encyclopedia of Language and Linguistics, this volume will provide an edited collection of almost 400 articles throughout which a representative subset of the world's major languages are unfolded and explained in up-to-date terminology and authoritative interpretation, by the leading scholars in linguistics. In highlighting the diversity of the world’s languages — from the thriving to the endangered and extinct — this work will be the first point of call to any language expert interested in this huge area. No other single volume will match the extent of language coverage or the authority of the contributors of Concise Encyclopedia of Languages of the World.
  • Handbook of Empirical Corporate Finance

    Empirical Corporate Finance
    • 1st Edition
    • Volume 2
    • Bjørn Espen Eckbo
    • English
    This second volume of a two-part series examines three major topics. First, it devotes five chapters to the classical issue of capital structure choice. Second, it focuses on the value-implications of major corporate investment and restructuring decisions, and then concludes by surveying the role of pay-for-performance type executive compensation contracts on managerial incentives and risk-taking behavior. In collaboration with the first volume, this handbook takes stock of the main empirical findings to date across an unprecedented spectrum of corporate finance issues. The surveys are written by leading empirical researchers that remain active in their respective areas of interest. With few exceptions, the writing style makes the chapters accessible to industry practitioners. For doctoral students and seasoned academics, the surveys offer dense roadmaps into the empirical research landscape and provide suggestions for future work.
  • Network Quality of Service Know It All

    • 1st Edition
    • Adrian Farrel
    • English
    The term Quality of Service, abbreviated QoS, refers to network resource control mechanisms. Quality of Service is the ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow. This book brings all of the elements of network quality of service (QoS) together in a single volume, saving the reader the time and expense of making multiple purchases. It introduces network QoS, explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field. It is a quick and efficient way to bring valuable content together from leading experts in the field while creating a one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources.