Skip to main content

Books in Social sciences and humanities

    • Handbook of Anxiety and Fear

      • 1st Edition
      • Volume 17
      • D. Caroline Blanchard + 2 more
      • English
      This Handbook brings together and integrates comprehensively the core approaches to fear and anxiety. Its four sections: Animal models; neural systems; pharmacology; and clinical approaches, provide a range of perspectives that interact to produce new light on these important and sometimes dysfunctional emotions. Fear and anxiety are analyzed as patterns that have evolved on the basis of their adaptive functioning in response to threat. These patterns are stringently selected, providing a close fit with environmental situations and events; they are highly conservative across mammalian species, producing important similarities, along with some systematic differences, in their human expression in comparison to that of nonhuman mammals. These patterns are described, with attention to both adaptive and maladaptive components, and related to new understanding of neuroanatomic, neurotransmitter, and genetic mechanisms. Although chapters in the volume acknowledge important differences in views of fear and anxiety stemming from animal vs. human research, the emphasis of the volume is on a search for an integrated view that will facilitate the use of animal models of anxiety to predict drug response in people; on new technologies that will enable direct evaluation of biological mechanisms in anxiety disorders; and on strengthening the analysis of anxiety disorders as biological phenomena.
    • Check Point NGX R65 Security Administration

      • 1st Edition
      • Ralph Bonnell
      • English
      Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of all sizes to reduce the cost and complexity of security management and ensure that their security systems can be easily extended to adapt to new and emerging threats. This title is a continuation of Syngress' best-selling references on Check Point's market leading Firewall and VPN products.
    • Biosecurity and Bioterrorism

      Containing and Preventing Biological Threats
      • 1st Edition
      • Jeffrey Ryan + 1 more
      • English
      Biosecurity and Bioterrorism is the first book to take a holistic approach to biosecurity with coverage of pathogens, prevention and response methodology. The book is organized into four thematic sections: Part I provides a conceptual understanding of biowarfare, bioterrorism and the laws we have to counteract this; Part II investigates known bioagents and the threat from emerging diseases; Part III focuses on agricultural terrorism and food security; Part IV outlines international, US, and local initiatives for biodefense and biosecurity. Case studies illustrate biodefense against both intentional terrorism and natural outbreaks. The authors bring an extraordinary combination of experience in academia and the clinical world, as well as real-world experience in technical and practical matters, to their writing. They make technical material clear and fascinating for readers with a basic knowledge of biology. Ryan and Glarum address the hazards in the context of vulnerability assessments and the planning strategies government and industry can take to prepare for and respond to such events.
    • Secrets Stolen, Fortunes Lost

      Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
      • 1st Edition
      • Richard Power + 1 more
      • English
      The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.
    • Handbook of Development Economics

      • 1st Edition
      • T. Paul Schultz + 1 more
      • English
      The field of development economics has evolved since volume 3 of the Handbook of Development Economics was published more than a decade ago. Volume 4 takes stock of some of the newer trends and their implications for research in the field and our understanding of economic development.The handbook is divided into four sections which reflect these developments, of which the first deals with agricultural and rural development. Section two is concerned with developments in the theory and evidence regarding public goods and political economy. The third section is focused on the behavior of households and individuals regarding various aspects of human capital investments, in the face of the various constraints, particularly market incentives and public goods. The final section contains papers that describe the different methods now available, both experimental and non-experimental, to conduct program evaluations, as well as describing papers that implement these methods.The authors of the chapters are all experts in the fields they survey and extend, and this volume promises to be an invaluable addition to the Handbooks in Economics series and a useful reference to graduate students, researchers and professionals in the field of development economics.
    • Clinical Assessment and Intervention for Autism Spectrum Disorders

      • 1st Edition
      • Johnny L. Matson
      • English
      Autism spectrum disorder has received increasing research in recent years, with more information on assessment and treatment than can be readily assimilated from primary literature by clinicians. Clinical Assessment and Intervention for Autism Spectrum Disorders summarizes evidence-based assessments and intervention for Autism across the life-span, providing clinicians with a practical overview of how best to assess and treat this disorder. The book begins with a discussion of what warrants a determination of being "evidence based" and a description of the disorder from a life span perspective. The book also provides a chapter on differential diagnosis of autism relative to other disorders. What follows are separate sections on assessment and intervention. These chapters discuss first how to assess and then separately how to treat behavioral problems, communication and social skills issues, academic and vocational skills, and the use of pharmacology and an assessment of possible pharmacological effects. Intended for practitioners assessing and treating children with developmental delays, the book provides clinicians with best practices for assessing and treating delays associated with autism.
    • OSSEC Host-Based Intrusion Detection Guide

      • 1st Edition
      • Daniel Cid + 2 more
      • English
      This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented...until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems.-- Stephen Northcutt OSSEC determines if a host has been compromised in this manner by taking the equivalent of a picture of the host machine in its original, unaltered state. This "picture" captures the most relevant information about that machine's configuration. OSSEC saves this "picture" and then constantly compares it to the current state of that machine to identify anything that may have changed from the original configuration. Now, many of these changes are necessary, harmless, and authorized, such as a system administrator installing a new software upgrade, patch, or application. But, then there are the not-so-harmless changes, like the installation of a rootkit, trojan horse, or virus. Differentiating between the harmless and the not-so-harmless changes determines whether the system administrator or security professional is managing a secure, efficient network or a compromised network which might be funneling credit card numbers out to phishing gangs or storing massive amounts of pornography creating significant liability for that organization. Separating the wheat from the chaff is by no means an easy task. Hence the need for this book. The book is co-authored by Daniel Cid, who is the founder and lead developer of the freely available OSSEC host-based IDS. As such, readers can be certain they are reading the most accurate, timely, and insightful information on OSSEC.
    • Quality Money Management

      Process Engineering and Best Practices for Systematic Trading and Investment
      • 1st Edition
      • Andrew Kumiega + 1 more
      • English
      The financial markets industry is at the same crossroads as the automotive industry in the late 1970s. Margins are collapsing and customization is rapidly increasing. The automotive industry turned to quality and its no coincidence that in the money management industry many of the spectacular failures have been due largely to problems in quality control. The financial industry in on the verge of a quality revolution. New and old firms alike are creating new investment vehicles and new strategies that are radically changing the nature of the industry. To compete, mutual funds, hedge fund industries, banks and proprietary trading firms are being forced to quicklyy research, test and implement trade selection and execution systems. And, just as in the early stages of factory automation, quality suffers and leads to defects. Many financial firms fall short of quality, lacking processes and methodologies for proper development and evaluation of trading and investment systems. Authors Kumiega and Van Vliet present a new step-by-step methodology for such development. Their methodology (called K
    • The ABCs of Learning Disabilities

      • 2nd Edition
      • Bernice Wong + 3 more
      • English
      The ABCs of Learning Disabilities, Second Edition, discusses major research findings on learning disabilities in children, adolescents and adults in language, memory, social skills, self-regulation, reading, mathematics, and writing, with an additional chapter on assessment. This concise primer is intended for use as an undergraduate introductory text to the field. Written with an evenness of tone, breadth, and depth, the conveys an engaging style meant to encourage the beginning student to identify the “big picture” and to be interested in conceptual issues as well as research findings.
    • Nmap in the Enterprise

      Your Guide to Network Scanning
      • 1st Edition
      • Angela Orebaugh + 1 more
      • English
      Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies.