Skip to main content

Books in Social sciences and humanities

    • Joint-Use Libraries

      Libraries for the Future
      • 1st Edition
      • Sarah McNicol
      • English
      This book examines all aspects of joint-use libraries, from the implications of government policy, to design and operational issues and evaluation. It considers all forms of joint-use library (e.g. school-public, college-public, university-public, health-university), reflecting on different models adopted around the world. Some of the main issues discussed include: partnership working, staffing and management, stock, digital resources, learning and literacy and community involvement.
    • Integrating ISA Server 2006 with Microsoft Exchange 2007

      • 1st Edition
      • Fergus Strachan
      • English
      This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange for raw beginners. Instead, its pragmatic purpose is to smooth the path of the busy administrator who is under pressure to get the integration done quickly, and done right, the first time. It features "break-out sessions" for issues that require in-depth discussion, "tips and tricks" sections that hone in on and demystify trouble spots, and "FAQs" alphabetized by topic that act as a quick-reference for readers who just want a quick answer to a specific question.Readers will learn how to:*Create the protocol definitions and firewall policy to allow only authorized users to connect to your Exchange Server*Configure SMTP Filtering and SMTP Message Screener*Troubleshoo... the SSL connection to your Exchange Server*Take advantage of ISA 2006's integrated Exchange 2007 support*Enable forms-based authentication for Outlook Web Access*Leverage unified SSL, VPN, application-layer filtering and endpoint securityto optimize access for mobile devices*Configure user-based settings to provide pre-authenticated access to specific Web applications...and much more!
    • Handbook of Motivation and Cognition Across Cultures

      • 1st Edition
      • Richard Sorrentino + 1 more
      • English
      In recent years there has been a wealth of new research in cognition, particularly in relation to supporting theoretical constructs about how cognitions are formed, processed, reinforced, and how they then affect behavior. Many of these theories have arisen and been tested in geographic isolation. It remains to be seen whether theories that purport to describe cognition in one culture will equally prove true in other cultures. The Handbook of Motivation and Cognition Across Cultures is the first book to look at these theories specifically with culture in mind. The book investigates universal truths about motivation and cognition across culture, relative to theories and findings indicating cultural differences. Coverage includes the most widely cited researchers in cognition and their theories- as seen through the looking glass of culture. The chapters include self-regulation by Tory Higgins, unconscious thought by John Bargh, attribution theory by Bernie Weiner, and self-verification by Bill Swann, among others. The book additionally includes some of the best new researchers in cross-cultural psychology, with contributors from Germany, New Zealand, Japan, Hong Kong, and Australia. In the future, culture may be the litmus test of a theory before it is accepted, and this book brings this question to the forefront of cognition research.
    • Handbook of Financial Intermediation and Banking

      • 1st Edition
      • Anjan V. Thakor + 1 more
      • English
      The growth of financial intermediation research has yielded a host of questions that have pushed "design" issues to the fore even as the boundary between financial intermediation and corporate finance has blurred. This volume presents review articles on six major topics that are connected by information-theoreti... tools and characterized by valuable perspectives and important questions for future research. Touching upon a wide range of issues pertaining to the designs of securities, institutions, trading mechanisms and markets, industry structure, and regulation, this volume will encourage bold new efforts to shape financial intermediaries in the future.
    • The Real MCTS/MCITP Exam 70-620 Prep Kit

      Independent and Complete Self-Paced Solutions
      • 1st Edition
      • Anthony Piltzecker
      • English
      This exam is designed to validate proficieny supporting Windows Vista client. This exam will fulfill the Windows Vista Technology Specialist requirements of Exam 70-620.The Microsoft Certified Technology Specialist (MCTS) on Windows Vista credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience in Tier 1 or Tier 2 phone support in an upper midsize organization or enterprise environment. MCTS candidates should have experience resolving issues concerning network connectivity, desktop operating systems, security, and applications. Their experience should also include addressing logon problems, performing password resets, and resolving most issues with desktop applications.
    • Securing Windows Server 2008

      Prevent Attacks from Outside and Inside Your Organization
      • 1st Edition
      • Aaron Tiensivu
      • English
      Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack.As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including: 1. Network Access Protection, which gives administrators the power to isolate computers that don't comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.2. Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.3. Protectio... of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.4. Protection against malicious software with User Account Control with a new authentication architecture.5. Incr... control over your user settings with Expanded Group Policy....to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power.
    • Evaluating Children's Interactive Products

      Principles and Practices for Interaction Designers
      • 1st Edition
      • Panos Markopoulos + 3 more
      • English
      Evaluating Children's Interactive Products directly addresses the need to ensure that interactive products designed for children — whether toys, games, educational products, or websites — are safe, effective, and entertaining. It presents an essential background in child development and child psychology, particularly as they relate to technology; captures best practices for observing and surveying children, training evaluators, and capturing the child user experience using audio and visual technology; and examines ethical and legal issues involved in working with children and offers guidelines for effective risk management. Based on the authors' workshops, conference courses, and own design experience and research, this highly practical book reads like a handbook, while being thoroughly grounded in the latest research. Throughout, the authors illustrate techniques and principles with numerous mini case studies and highlight practical information in tips and exercises and conclude with three in-depth case studies. This book is recommended for usability experts, product developers, and researchers in the field.
    • Emergency Management and Tactical Response Operations

      Bridging the Gap
      • 1st Edition
      • Thomas D. Phelan
      • English
      Is emergency management education undoing an age-old tradition in the American Fire Service? Has the time arrived to educate emergency managers in college classrooms rather than in twenty years of tactical operations experience? Over one hundred forty-three (143) institutions of higher education are now offering certificate or degree programs in emergency management with no tactical operations experience required for admission. Resistance by veteran law enforcement officers and fire fighters may have to be overcome if we are to prepare emergency managers with required skill sets. Dr. Tom Phelan explores the skills being taught to emergency management students and addresses the concerns of experienced first responders in accepting their leadership.
    • Motor Vehicle Collisions: Medical, Psychosocial, and Legal Consequences

      • 1st Edition
      • Melanie P Duckworth + 2 more
      • English
      Motor Vehicle Collisions: Medical, Psychosocial, and Legal Consequences is a comprehensive review of the motor vehicle collision (MVC) experience and includes chapters relevant to the assessment and treatment of multiple consequences of MVC involvement, including medical, psychosocial, and legal difficulties. The book is designed to be accessible to both clinicians and researchers interested in the study of MVCs and in the management of MVC-related problems. The aim of this book is to capture the MVC experience from a multidisciplinary perspective, This book will serve as a necessary reference for physicians, rehabilitation specialists, allied medical professionals, psychologists, and lawyers.
    • Nessus Network Auditing

      • 2nd Edition
      • Russ Rogers
      • English
      The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.Perform a Vulnerability AssessmentUse Nessus to find programming errors that allow intruders to gain unauthorized access.Obtain and Install NessusInstall from source or binary, set up up clients and user accounts, and update your plug-ins.Modify the Preferences TabSpecify the options for Nmap and other complex, configurable components of Nessus.Understand Scanner Logic and Determine Actual RiskPlan your scanning strategy and learn what variables can be changed.Prioritize VulnerabilitiesPrior... and manage critical vulnerabilities, information leaks, and denial of service errors.Deal with False PositivesLearn the different types of false positives and the differences between intrusive and nonintrusive tests.Get Under the Hood of NessusUnderstand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL).Scan the Entire Enterprise NetworkPlan for enterprise deployment by gauging network bandwith and topology issues.