Skip to main content

Books in Social sciences and humanities

  • Global Information Inequalities

    Bridging the Information Gap
    • 1st Edition
    • Deborah Charbonneau
    • English
    The disparity in access to information is a worldwide phenomenon. Global Information Inequalities offers a captivating look into problems of information access across the world today. One of the unique strengths of the book is the use of examples of library initiatives from around the world to illustrate the range of possibilities for equitable access and library service delivery in a global context. It contains numerous examples of a wide variety of information problems and solutions ranging from developing literacy programs in rural communities in Tanzania, building school libraries in China, making government-related information more transparent in Chile, to exploring how digital technologies have the potential to revolutionize the lives of people with sensory-disabilities... The contributions in Global Information Inequalities address a number of core professional issues, including access to information, library services, collection development, global collaboration, intellectual property, and digital information. The contributors are from Argentina, Canada, Chile, China, Iceland, Malaysia, Peru, South Africa, Tanzania, United States, and Zambia, thereby providing a wide range of perspectives on librarianship. Written in a simple, thorough, and multidisciplinary approach, the book presents and discusses key issues in various library settings and from different perspectives. Overall, this work contributes to a global examination and exploration of libraries in various parts of the world. This book has a wide appeal and is applicable to various library environments (including academic, public, and special libraries).
  • Expatriates in Asia

    Breaking Free from the Colonial Paradigm
    • 1st Edition
    • Scott Hipsher
    • English
    The Asia-Pacific region is recognized as the fastest growing economic region in the world as well as one of the most difficult places for expatriates to work. Classical literature, modern popular entertainment, as well as academic studies often create an impression of Asia in the West which can encourage the formation of a set of expectations about working in Asia that hinder the expatriate adjustment process. This book provides conceptual frameworks as well as practical advice on working in the exciting and challenging environments found in the dynamic and diverse continent of Asia.
  • Trends in Mobile Technology and Business in the Asia-Pacific Region

    • 1st Edition
    • Youngjin Yoo + 2 more
    • English
    This book introduces trends and developments in the area of mobile technology and business in the Asia Pacific region – an area which has emerged as a hotbed for not only much economic development generally, but also the mobile revolution that is sweeping through the globe. Although mobile technology did not originate in the region, over the last decade mobile and wireless technologies and services have rapidly grown in this area. Some companies from this area are taking the leading roles in many aspects of industry (hardware, software and service) and international standard setting organizations as well. The book presents 12 in-depth case studies written by specialists covering many countries in the region in order to provide an evolutionary perspective on mobile technology and business. The book offers both macro-level public policy implications and firm-level strategy for this emerging technology.
  • Malware Forensics

    Investigating and Analyzing Malicious Code
    • 1st Edition
    • Eoghan Casey + 2 more
    • English
    Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of live forensics, where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss live forensics on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. It is the first book detailing how to perform live forensic techniques on malicious code. The book gives deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more. It explores over 150 different tools for malware incident response and analysis, including forensic tools for preserving and analyzing computer memory. Readers from all educational and technical backgrounds will benefit from the clear and concise explanations of the applicable legal case law and statutes covered in every chapter. In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter. This book is intended for system administrators, information security professionals, network personnel, forensic examiners, attorneys, and law enforcement working with the inner-workings of computer memory and malicious code.
  • The IT / Digital Legal Companion

    A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
    • 1st Edition
    • Gene K. Landy + 1 more
    • English
    The IT/Digital Legal Companion is a comprehensive business and legal guidance covering intellectual property for digital business; digital contract fundamentals; open source rules and strategies; development, consulting and outsourcing; software as a service; business software licensing, partnering, and distribution; web and Internet agreements; privacy on the Internet; digital multimedia content clearance and distribution; IT standards; video game development and content deals; international distribution; and user-created content, mash-ups, MMOGs, and web widgets.Chapters deal with topics such as copyrights on the Internet, for software protection and around the world; trademarks and domain names; patents and digital technology companies; trade secrets and non-disclosure agreements; confidentiality, rights transfer, and non-competition agreements for employees; introduction to digital product and service contracts; a pragmatic guide to open source; IT services - development, outsourcing, and consulting; beta test agreements; commercial end-user agreements; terms of use for web sites and online applications; privacy and use of personal data; digital technology standards - opportunities, risks, and strategies; content for digital media; and deals in the web and mobile value chains.This book is intended for executives, entrepreneurs, finance and business development officers; technology and engineering officers; marketers, licensing professionals, and technology professionals; in-house counsel; and anyone else that deals with software or digital technology in business.
  • DW 2.0: The Architecture for the Next Generation of Data Warehousing

    • 1st Edition
    • W.H. Inmon + 2 more
    • English
    DW 2.0: The Architecture for the Next Generation of Data Warehousing is the first book on the new generation of data warehouse architecture, DW 2.0, by the father of the data warehouse. The book describes the future of data warehousing that is technologically possible today, at both an architectural level and technology level. The perspective of the book is from the top down: looking at the overall architecture and then delving into the issues underlying the components. This allows people who are building or using a data warehouse to see what lies ahead and determine what new technology to buy, how to plan extensions to the data warehouse, what can be salvaged from the current system, and how to justify the expense at the most practical level. This book gives experienced data warehouse professionals everything they need in order to implement the new generation DW 2.0. It is designed for professionals in the IT organization, including data architects, DBAs, systems design and development professionals, as well as data warehouse and knowledge management professionals.
  • WISC-IV Clinical Assessment and Intervention

    • 2nd Edition
    • Aurelio Prifitera + 2 more
    • English
    The Wechsler Intelligence Scale for Children: Fourth Edition (WISC-IV) is one of the most often used measures to assess intelligence and cognitive functions in children, ages 6-16 years. The second edition of the WISC-IV Clinical Assessment and Intervention will include new information obtained from the clinical use of the WISC-IV in practice. Information on the basic use of the assessment tool is condensed from three chapters into one, with four new chapters discussing how to use and interpret WISC-IV with additional clinical populations. These new populations include pervasive Developmental Disorders including autism, Social and emotional disorders, psychiatric disorders, and medical disorders that may affect intelligence. An additional new chapter discusses intervention planning across patient populations. Each of the chapters (revised original chapters and new chapters) will additionally include case studies including diagnosis and intervention.Overall... the material in the book is 65% changed, new, and updated. These changes make the second edition better able to meet a clinician's needs in using and interpreting this test.
  • Securing Citrix XenApp Server in the Enterprise

    • 1st Edition
    • Tariq Azad
    • English
    Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains.
  • Kismet Hacking

    • 1st Edition
    • Frank Thornton + 2 more
    • English
    Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.
  • Advances in Child Development and Behavior

    • 1st Edition
    • Volume 36
    • Robert V. Kail
    • English
    Volume 36 of the Advances in Child Development and Behavior series includes ten chapters that highlight some of the most recent research in developmental and educational psychology. A wide array of topics are discussed in detail, including King Solomon's Take on Word Learning, Orthographic Learning, Attachment and Affect Regulation, Function, Family Dynamics, Rational Thought, Childhood Aggression, Social Cognitive Neuroscience of Infancy, Children's Thinking, and Remote Transfer in Children, and much more. Each chapter provides in depth discussions of various developmental psychology specializations. This volume serves as an invaluable resource for psychology researchers and advanced psychology students.