Skip to main content

Books in Social sciences and humanities

    • A Quick Guide to Health and Safety

      • 1st Edition
      • R Gilbert
      • English
      Health and safety issues now impose upon almost every part of business life. The system of enforcement is managed and implemented in the UK by The Health and Safety Executive (HSE) – but at times it can be difficult to know exactly which bits of this elaborate spider’s web should be applied in a given instance, and which are most important. This Quick Guide puts the subject into context, providing a rational overview and a valid starting point to applying health and safety in the workplace, and offers a concise and readily accessible interpretation of what health and safety legislation means in practice.
    • A Behavioral Approach to Asset Pricing

      • 2nd Edition
      • Hersh Shefrin
      • English
      Behavioral finance is the study of how psychology affects financial decision making and financial markets. It is increasingly becoming the common way of understanding investor behavior and stock market activity. Incorporating the latest research and theory, Shefrin offers both a strong theory and efficient empirical tools that address derivatives, fixed income securities, mean-variance efficient portfolios, and the market portfolio. The book provides a series of examples to illustrate the theory.
    • Managing Financial Information in the Trade Lifecycle

      A Concise Atlas of Financial Instruments and Processes
      • 1st Edition
      • Martijn Groot
      • English
      Information is the oxygen supply of the financial markets. Financial information, or data, is so important that companies such as Barclays and Citigroup now have executive positions of Chief Data Officer or Head of Data Acquisition. This book, by a long-time industry insider at one of the leading data management vendors, discusses the present and future of financial data management by focusing on the lifecycle of the financial instruments (stocks, bonds, options, derivatives) that generate and require data to keep the markets moving. This book is a concise reference manual of the financial information supply chain and how to maximize effectiveness and minimize cost.
    • Computational Finance Using C and C#

      • 1st Edition
      • George Levy
      • English
      Computational Finance Using C and C# raises computational finance to the next level using the languages of both standard C and C#. The inclusion of both these languages enables readers to match their use of the book to their firm’s internal software and code requirements. The book also provides derivatives pricing information for equity derivates (vanilla options, quantos, generic equity basket options); interest rate derivatives (FRAs, swaps, quantos); foreign exchange derivatives (FX forwards, FX options); and credit derivatives (credit default swaps, defaultable bonds, total return swaps).This book is organized into 8 chapters, beginning with an overview of financial derivatives followed by an introduction to stochastic processes. The discussion then shifts to generation of random variates; European options; single asset American options; multi-asset options; other financial derivatives; and C# portfolio pricing application. The text is supported by a multi-tier website which enables purchasers of the book to download free software, which includes executable files, configuration files, and results files. With these files the user can run the C# portfolio pricing application and change the portfolio composition and the attributes of the deals.This book will be of interest to financial engineers and analysts as well as numerical analysts in banking, insurance, and corporate finance.
    • Library Project Funding

      A Guide to Planning and Writing Proposals
      • 1st Edition
      • Julie Carpenter
      • English
      Managers and staff in libraries and information services in all sectors are increasingly required to prepare project proposals and bid for funding, usually for external funding, but also as part of internal strategic planning and management processes. The projects proposed must be realistic and feasible, because library managers and staff will be required to deliver their project on time and in budget. If managers get the planning wrong at project proposal stage, the consequences for implementation can be difficult to overcome. This book provides guidance on the various steps involved in project development, planning and the preparation of bids for funding based on the author’s own experience and that of many organisations in the cultural heritage and education sectors. It guides service managers and staff through the task of scoping, developing and writing viable, realistic and winning proposals, drawing on a range of techniques from strategic planning, financial management, project management and business.
    • Adaptive Behavior Assessment System-II

      Clinical Use and Interpretation
      • 1st Edition
      • Thomas Oakland + 1 more
      • English
      Adaptive Behavior Assessment System-II summarizes information on adaptive behavior and skills as well as general issues in adaptive behavior assessment with the goal of promoting sound assessment practice during uses, interpretations, and applications of the Adaptive Behavior Assessment System-II. Adaptive behavior and skills refer to personal qualities associated with the ability to meet one’s personal needs such as communication, self-care, socialization, etc. and those of others. Data from measures of adaptive behavior have been used most commonly in assessment and intervention services for persons with mental retardation. However, the display of adaptive behaviors and skills is relevant to all persons. The Adaptive Behavior Assessment System-II (ABAS-II) provides a comprehensive, norm-referenced assessment of the adaptive behavior and skills of individuals from birth through age 89. The comprehensive natures of the ABAS-II, ease in administration and scoring, and wide age range have resulted in its widespread use for a large number of assessment purposes. The book provides practical information and thus serves as a valuable resource for those who use the ABAS-II.
    • Essence of Memory

      • 1st Edition
      • Volume 169
      • Wayne S. Sossin + 3 more
      • English
      This selection of reviews gives an up-to-date picture of memory research. Great progress has been made in identifying the memory trace at the molecular and cellular level and individual reviews address the major mechanisms by which changes in synaptic strength can persist. Exciting research at the systems level is also reviewed including the growing importance of changes in inhibitory interneurons and how they play a role in memory formation. Finally, reviews present cognitive and neurobiological models of human memory that explain, characterize and organize the act of memory within a coherent framework.
    • The Bioarchaeology of Metabolic Bone Disease

      • 1st Edition
      • Megan B. Brickley + 1 more
      • English
      The Bioarchaeology of Metabolic Bone Disease provides a comprehensive and invaluable source of information on this important group of diseases. It is an essential guide for those engaged in either basic recording or in-depth research on human remains from archaeological sites. The range of potential tools for investigating metabolic diseases of bone are far greater than for many other conditions, and building on clinical investigations, this book will consider gross, surface features visible using microscopic examination, histological and radiological features of bone, that can be used to help investigate metabolic bone diseases.
    • OS X Exploits and Defense

      Own it...Just Like Windows or Linux!
      • 1st Edition
      • Chris Hurley + 6 more
      • English
      Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security. Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed! Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
    • The Real MCTS/MCITP Exam 70-649 Prep Kit

      Independent and Complete Self-Paced Solutions
      • 1st Edition
      • Brien Posey
      • English
      This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSE skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640, 70-642, and 70-643.The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.