Skip to main content

Books in Social sciences and humanities

  • The IT Regulatory and Standards Compliance Handbook

    How to Survive Information Systems Audit and Assessments
    • 1st Edition
    • Craig S. Wright
    • English
    The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs.
  • Social Structure and Emotion

    • 1st Edition
    • Jody Clay-Warner + 1 more
    • English
    As a reference that contains original and innovative research on the sociology of emotion, this book will not only appeal to sociologists but also to scholars of psychology, psychiatry, anthropology, history, social work, and business/management. With contributions from experts in the field, this text examines the role and influence of emotion in everyday social circumstances. It poses clear questions and presents the contemporary theoretical developments and empirical research linking social structure and emotion.Comparable books are narrowly focused and less comprehensive, the breadth and depth of this new work is unmatched.
  • Mathematical Difficulties

    Psychology and Intervention
    • 1st Edition
    • English
    This book examines the mathematical difficulties in typical and atypical populations. It discusses the behavioural, educational and neuropsychological characteristics of people with mathematical difficulties, and educational interventions to prevent, diagnose, treat or ameliorate such difficulties. The book brings together studies from different disciplines, including developmental psychology, neuroscience and education, and includes perspectives from practicing teachers.The book is divided into three major sections. The first includes chapters about the nature and characteristics of mathematical difficulties in the population as a whole, in relation to both psychology and education. The second deals with mathematical difficulties in children with other problems such as specific language impairment and dyslexia. The third discusses methods of interventions aimed at preventing, treating or ameliorating mathematical difficulties, and will include discussions of assessment and diagnosis.
  • The Real MCTS/MCITP Exam 70-646 Prep Kit

    Independent and Complete Self-Paced Solutions
    • 1st Edition
    • Anthony Piltzecker
    • English
    This exam is designed to validate skills as a Windows Server 2008 Server Administrator. This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-646.The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCITP candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. A MCITP Server Administrator is responsible for the operations and day-to-day management of an infrastructure of servers for an enterprise organization. Server administrators manage the infrastructure, web, and IT application servers, and use scripts to accomplish tasks on a regular basis. They conduct most server management tasks remotely by using Terminal Server or administration tools installed on their local workstation. MCITP Server Administrators also support engineering projects, and are responsible for server builds and configuration.
  • UNIX and Linux Forensic Analysis DVD Toolkit

    • 1st Edition
    • Chris Pogue + 2 more
    • English
    This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the worldwide server market with $4.2 billion in 2Q07, representing 31.7% of corporate server spending. UNIX systems have not been analyzed to any significant depth largely due to a lack of understanding on the part of the investigator, an understanding and knowledge base that has been achieved by the attacker. The book begins with a chapter to describe why and how the book was written, and for whom, and then immediately begins addressing the issues of live response (volatile) data collection and analysis. The book continues by addressing issues of collecting and analyzing the contents of physical memory (i.e., RAM). The following chapters address /proc analysis, revealing the wealth of significant evidence, and analysis of files created by or on UNIX systems. Then the book addresses the underground world of UNIX hacking and reveals methods and techniques used by hackers, malware coders, and anti-forensic developers. The book then illustrates to the investigator how to analyze these files and extract the information they need to perform a comprehensive forensic analysis. The final chapter includes a detailed discussion of loadable kernel Modules and malware. Throughout the book the author provides a wealth of unique information, providing tools, techniques and information that won't be found anywhere else.
  • Netcat Power Tools

    • 1st Edition
    • Jan Kanclirz
    • English
    Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal.* Get Up and Running with Netcat Simple yet powerful...Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.* Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.* Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town...Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.* Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user.
  • The Best Damn Windows Server 2008 Book Period

    • 2nd Edition
    • Anthony Piltzecker
    • English
    Best Damn Windows Server 2008 Book Period, Second Edition is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller.
  • Managing Relationships with Industry

    A Physician's Compliance Manual
    • 1st Edition
    • Steven C. Schachter + 3 more
    • English
    Now more than ever, doctors are being targeted by government prosecutors and whistleblowers challenging the legality of their relationships with drug and device companies. With reputations at stake and the risk of civil and criminal liability, it is incumbent upon doctors to protect themselves. Managing Relationships with Industry: A Physician’s Compliance Manual is an indispensable resource for doctors, professional societies, academic medical centers, community hospitals, and group practices struggling to understand the ever changing law and ethical standards on interactions with pharmaceutical and device companies. It is the first comprehensive summary of the law and ethics on physician relationships with industry written for the physician. Authored by a former state Attorney General, Harvard Medical School Professor, health care lawyer and professor of ethics, Managing Relationships approaches the topic from a balanced and reasoned perspective adding to the on-going national dialogue and debate on the proper limits to medicine’s relationship with industry.
  • The Psychology of Learning and Motivation

    Advances in Research and Theory
    • 1st Edition
    • Volume 49
    • English
    The Psychology of Learning and Motivation publishes empirical and theoretical contributions in cognitive and experimental psychology, ranging from classical and instrumental conditioning to complex learning and problem solving. Volume 49 contains chapters on short-term memory, theory and measurement of working memory capacity limits, development of perceptual grouping in infancy, co-constructing conceptual domains through family conversations and activities, the concrete substrates of abstract rule use, ambiguity, accessibility, and a division of labor for communicative success, and lexical expertise and reading skill.
  • Nagios 3 Enterprise Network Monitoring

    Including Plug-Ins and Hardware Devices
    • 1st Edition
    • Andrew Hay + 4 more
    • English
    The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them all for you. Once up and running, you'll see how a number of useful add-ons and enhancements for Nagios can extend the functionality of Nagios throughout your organization. And, if you want to learn how to write your own plugins...this is the book for you! In these pages you'll find a cookbook-style chapter full of useful plugins that monitor a variety of devices, from HTTP-based applications to CPU utilization to LDAP servers and more.