Skip to main content

Books in Social sciences and humanities

  • Organising Knowledge in a Global Society

    Principles and Practice in Libraries and Information Centres
    • 1st Edition
    • Philip Hider + 1 more
    • English
    Organising Knowledge in a Global Society updates the successful first edition, which has been widely used as an introduction to the field of information organisation, both in Australia and overseas. The work reflects current practice and trends, paying particular attention to how libraries and other information services provide intellectual access to digital information resources through metadata. In this revision, the various information organisation components of the Web 2.0 phenomenon are discussed, including social tagging and folksonomies. The new edition also covers the latest developments in metadata standards, such as Resource Description and Access, and information retrieval systems such as the increasing support for faceted navigation. Examples and case studies have been updated throughout.
  • Joint-Use Libraries

    Libraries for the Future
    • 1st Edition
    • Sarah McNicol
    • English
    This book examines all aspects of joint-use libraries, from the implications of government policy, to design and operational issues and evaluation. It considers all forms of joint-use library (e.g. school-public, college-public, university-public, health-university), reflecting on different models adopted around the world. Some of the main issues discussed include: partnership working, staffing and management, stock, digital resources, learning and literacy and community involvement.
  • Information History - An Introduction

    Exploring an Emergent Field
    • 1st Edition
    • Toni Weller
    • English
    This is a pioneering introduction to the emergent field of information history. It explores how the contemporary values and concerns of our own information society have helped lead to a reconsideration of our history, and of what constitutes our historical understanding of information in the twenty-first century. In Information History, Toni Weller examines the historiography of information and asks how the key schools of thought have explored the concept in terms of its social, technological, economic and cultural understandings. Based on personal experiences, the author also proposes some practical applications of information history in research and university teaching, offering some suggestions as to how the field may develop based on its growth during the last decade.
  • Handbook of Motivation and Cognition Across Cultures

    • 1st Edition
    • Richard Sorrentino + 1 more
    • English
    In recent years there has been a wealth of new research in cognition, particularly in relation to supporting theoretical constructs about how cognitions are formed, processed, reinforced, and how they then affect behavior. Many of these theories have arisen and been tested in geographic isolation. It remains to be seen whether theories that purport to describe cognition in one culture will equally prove true in other cultures. The Handbook of Motivation and Cognition Across Cultures is the first book to look at these theories specifically with culture in mind. The book investigates universal truths about motivation and cognition across culture, relative to theories and findings indicating cultural differences. Coverage includes the most widely cited researchers in cognition and their theories- as seen through the looking glass of culture. The chapters include self-regulation by Tory Higgins, unconscious thought by John Bargh, attribution theory by Bernie Weiner, and self-verification by Bill Swann, among others. The book additionally includes some of the best new researchers in cross-cultural psychology, with contributors from Germany, New Zealand, Japan, Hong Kong, and Australia. In the future, culture may be the litmus test of a theory before it is accepted, and this book brings this question to the forefront of cognition research.
  • Integrating ISA Server 2006 with Microsoft Exchange 2007

    • 1st Edition
    • Fergus Strachan
    • English
    This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange for raw beginners. Instead, its pragmatic purpose is to smooth the path of the busy administrator who is under pressure to get the integration done quickly, and done right, the first time. It features "break-out sessions" for issues that require in-depth discussion, "tips and tricks" sections that hone in on and demystify trouble spots, and "FAQs" alphabetized by topic that act as a quick-reference for readers who just want a quick answer to a specific question.Readers will learn how to:*Create the protocol definitions and firewall policy to allow only authorized users to connect to your Exchange Server*Configure SMTP Filtering and SMTP Message Screener*Troubleshoo... the SSL connection to your Exchange Server*Take advantage of ISA 2006's integrated Exchange 2007 support*Enable forms-based authentication for Outlook Web Access*Leverage unified SSL, VPN, application-layer filtering and endpoint securityto optimize access for mobile devices*Configure user-based settings to provide pre-authenticated access to specific Web applications...and much more!
  • Handbook of Financial Intermediation and Banking

    • 1st Edition
    • Anjan V. Thakor + 1 more
    • English
    The growth of financial intermediation research has yielded a host of questions that have pushed "design" issues to the fore even as the boundary between financial intermediation and corporate finance has blurred. This volume presents review articles on six major topics that are connected by information-theoreti... tools and characterized by valuable perspectives and important questions for future research. Touching upon a wide range of issues pertaining to the designs of securities, institutions, trading mechanisms and markets, industry structure, and regulation, this volume will encourage bold new efforts to shape financial intermediaries in the future.
  • The Real MCTS/MCITP Exam 70-620 Prep Kit

    Independent and Complete Self-Paced Solutions
    • 1st Edition
    • Anthony Piltzecker
    • English
    This exam is designed to validate proficieny supporting Windows Vista client. This exam will fulfill the Windows Vista Technology Specialist requirements of Exam 70-620.The Microsoft Certified Technology Specialist (MCTS) on Windows Vista credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience in Tier 1 or Tier 2 phone support in an upper midsize organization or enterprise environment. MCTS candidates should have experience resolving issues concerning network connectivity, desktop operating systems, security, and applications. Their experience should also include addressing logon problems, performing password resets, and resolving most issues with desktop applications.
  • Securing Windows Server 2008

    Prevent Attacks from Outside and Inside Your Organization
    • 1st Edition
    • Aaron Tiensivu
    • English
    Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack.As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including: 1. Network Access Protection, which gives administrators the power to isolate computers that don't comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.2. Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.3. Protectio... of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.4. Protection against malicious software with User Account Control with a new authentication architecture.5. Incr... control over your user settings with Expanded Group Policy....to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power.
  • Evaluating Children's Interactive Products

    Principles and Practices for Interaction Designers
    • 1st Edition
    • Panos Markopoulos + 3 more
    • English
    Evaluating Children's Interactive Products directly addresses the need to ensure that interactive products designed for children — whether toys, games, educational products, or websites — are safe, effective, and entertaining. It presents an essential background in child development and child psychology, particularly as they relate to technology; captures best practices for observing and surveying children, training evaluators, and capturing the child user experience using audio and visual technology; and examines ethical and legal issues involved in working with children and offers guidelines for effective risk management. Based on the authors' workshops, conference courses, and own design experience and research, this highly practical book reads like a handbook, while being thoroughly grounded in the latest research. Throughout, the authors illustrate techniques and principles with numerous mini case studies and highlight practical information in tips and exercises and conclude with three in-depth case studies. This book is recommended for usability experts, product developers, and researchers in the field.
  • Emergency Management and Tactical Response Operations

    Bridging the Gap
    • 1st Edition
    • Thomas D. Phelan
    • English
    Is emergency management education undoing an age-old tradition in the American Fire Service? Has the time arrived to educate emergency managers in college classrooms rather than in twenty years of tactical operations experience? Over one hundred forty-three (143) institutions of higher education are now offering certificate or degree programs in emergency management with no tactical operations experience required for admission. Resistance by veteran law enforcement officers and fire fighters may have to be overcome if we are to prepare emergency managers with required skill sets. Dr. Tom Phelan explores the skills being taught to emergency management students and addresses the concerns of experienced first responders in accepting their leadership.