Skip to main content

Books in Social sciences and humanities

    • Background Screening and Investigations

      Managing Hiring Risk from the HR and Security Perspectives
      • 1st Edition
      • W. Barry Nixon + 1 more
      • English
      Hiring highly qualified people is crucial to every company, and Background Screening and Investigations is an essential guide to succeeding in a turbulent business environment. A crucial part of any hiring process should be employment background screening, pre- and post-hire, which gives hiring personnel a glimpse into a person's past behavior patterns, propensities, and likely future behavior. Background Screening and Investigations describes all aspects of the employment background screening processes - its history and evolution, the imperative for implementing a screening process, and the creation of a comprehensive policy. Nixon and Kerr show how security and human resources professionals can work together to negotiate legal hurdles and make their background screening process successful.
    • Handbook of the Neuroscience of Language

      • 1st Edition
      • Brigitte Stemmer + 1 more
      • English
      In the last ten years the neuroscience of language has matured as a field. Ten years ago, neuroimaging was just being explored for neurolinguistic questions, whereas today it constitutes a routine component. At the same time there have been significant developments in linguistic and psychological theory that speak to the neuroscience of language. This book consolidates those advances into a single reference. The Handbook of the Neuroscience of Language provides a comprehensive overview of this field. Divided into five sections, section one discusses methods and techniques including clinical assessment approaches, methods of mapping the human brain, and a theoretical framework for interpreting the multiple levels of neural organization that contribute to language comprehension. Section two discusses the impact imaging techniques (PET, fMRI, ERPs, electrical stimulation of language cortex, TMS) have made to language research. Section three discusses experimental approaches to the field, including disorders at different language levels in reading as well as writing and number processing. Additionally, chapters here present computational models, discuss the role of mirror systems for language, and cover brain lateralization with respect to language. Part four focuses on language in special populations, in various disease processes, and in developmental disorders. The book ends with a listing of resources in the neuroscience of language and a glossary of items and concepts to help the novice become acquainted with the field. Editors Stemmer & Whitaker prepared this book to reflect recent developments in neurolinguistics, moving the book squarely into the cognitive neuroscience of language and capturing the developments in the field over the past 7 years.
    • Introduction to Security

      • 8th Edition
      • Robert Fischer + 1 more
      • English
      Introduction to Security has been the leading introduction to private security for over 30 years, celebrated for its balanced and professional approach to this increasingly important area. Now the 8th edition expands the key topics and adds material important in the 21st century environment. The author team brings together top-level professional experience in industry with years of teaching experience. As a recommended title for security certifications, it is a crucial resource for the 30,000+ ASIS International members, and is also used as a core security textbook in universities throughout the country. This is Butterworth-Heineman... best-selling security text of all time, an essential reference for all security professionals.
    • Handbook of Anxiety and Fear

      • 1st Edition
      • Volume 17
      • D. Caroline Blanchard + 2 more
      • English
      This Handbook brings together and integrates comprehensively the core approaches to fear and anxiety. Its four sections: Animal models; neural systems; pharmacology; and clinical approaches, provide a range of perspectives that interact to produce new light on these important and sometimes dysfunctional emotions. Fear and anxiety are analyzed as patterns that have evolved on the basis of their adaptive functioning in response to threat. These patterns are stringently selected, providing a close fit with environmental situations and events; they are highly conservative across mammalian species, producing important similarities, along with some systematic differences, in their human expression in comparison to that of nonhuman mammals. These patterns are described, with attention to both adaptive and maladaptive components, and related to new understanding of neuroanatomic, neurotransmitter, and genetic mechanisms. Although chapters in the volume acknowledge important differences in views of fear and anxiety stemming from animal vs. human research, the emphasis of the volume is on a search for an integrated view that will facilitate the use of animal models of anxiety to predict drug response in people; on new technologies that will enable direct evaluation of biological mechanisms in anxiety disorders; and on strengthening the analysis of anxiety disorders as biological phenomena.
    • Check Point NGX R65 Security Administration

      • 1st Edition
      • Ralph Bonnell
      • English
      Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of all sizes to reduce the cost and complexity of security management and ensure that their security systems can be easily extended to adapt to new and emerging threats. This title is a continuation of Syngress' best-selling references on Check Point's market leading Firewall and VPN products.
    • Biosecurity and Bioterrorism

      Containing and Preventing Biological Threats
      • 1st Edition
      • Jeffrey Ryan + 1 more
      • English
      Biosecurity and Bioterrorism is the first book to take a holistic approach to biosecurity with coverage of pathogens, prevention and response methodology. The book is organized into four thematic sections: Part I provides a conceptual understanding of biowarfare, bioterrorism and the laws we have to counteract this; Part II investigates known bioagents and the threat from emerging diseases; Part III focuses on agricultural terrorism and food security; Part IV outlines international, US, and local initiatives for biodefense and biosecurity. Case studies illustrate biodefense against both intentional terrorism and natural outbreaks. The authors bring an extraordinary combination of experience in academia and the clinical world, as well as real-world experience in technical and practical matters, to their writing. They make technical material clear and fascinating for readers with a basic knowledge of biology. Ryan and Glarum address the hazards in the context of vulnerability assessments and the planning strategies government and industry can take to prepare for and respond to such events.
    • Secrets Stolen, Fortunes Lost

      Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
      • 1st Edition
      • Richard Power + 1 more
      • English
      The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.
    • Handbook of Development Economics

      • 1st Edition
      • T. Paul Schultz + 1 more
      • English
      The field of development economics has evolved since volume 3 of the Handbook of Development Economics was published more than a decade ago. Volume 4 takes stock of some of the newer trends and their implications for research in the field and our understanding of economic development.The handbook is divided into four sections which reflect these developments, of which the first deals with agricultural and rural development. Section two is concerned with developments in the theory and evidence regarding public goods and political economy. The third section is focused on the behavior of households and individuals regarding various aspects of human capital investments, in the face of the various constraints, particularly market incentives and public goods. The final section contains papers that describe the different methods now available, both experimental and non-experimental, to conduct program evaluations, as well as describing papers that implement these methods.The authors of the chapters are all experts in the fields they survey and extend, and this volume promises to be an invaluable addition to the Handbooks in Economics series and a useful reference to graduate students, researchers and professionals in the field of development economics.
    • Clinical Assessment and Intervention for Autism Spectrum Disorders

      • 1st Edition
      • Johnny L. Matson
      • English
      Autism spectrum disorder has received increasing research in recent years, with more information on assessment and treatment than can be readily assimilated from primary literature by clinicians. Clinical Assessment and Intervention for Autism Spectrum Disorders summarizes evidence-based assessments and intervention for Autism across the life-span, providing clinicians with a practical overview of how best to assess and treat this disorder. The book begins with a discussion of what warrants a determination of being "evidence based" and a description of the disorder from a life span perspective. The book also provides a chapter on differential diagnosis of autism relative to other disorders. What follows are separate sections on assessment and intervention. These chapters discuss first how to assess and then separately how to treat behavioral problems, communication and social skills issues, academic and vocational skills, and the use of pharmacology and an assessment of possible pharmacological effects. Intended for practitioners assessing and treating children with developmental delays, the book provides clinicians with best practices for assessing and treating delays associated with autism.
    • OSSEC Host-Based Intrusion Detection Guide

      • 1st Edition
      • Daniel Cid + 2 more
      • English
      This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented...until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems.-- Stephen Northcutt OSSEC determines if a host has been compromised in this manner by taking the equivalent of a picture of the host machine in its original, unaltered state. This "picture" captures the most relevant information about that machine's configuration. OSSEC saves this "picture" and then constantly compares it to the current state of that machine to identify anything that may have changed from the original configuration. Now, many of these changes are necessary, harmless, and authorized, such as a system administrator installing a new software upgrade, patch, or application. But, then there are the not-so-harmless changes, like the installation of a rootkit, trojan horse, or virus. Differentiating between the harmless and the not-so-harmless changes determines whether the system administrator or security professional is managing a secure, efficient network or a compromised network which might be funneling credit card numbers out to phishing gangs or storing massive amounts of pornography creating significant liability for that organization. Separating the wheat from the chaff is by no means an easy task. Hence the need for this book. The book is co-authored by Daniel Cid, who is the founder and lead developer of the freely available OSSEC host-based IDS. As such, readers can be certain they are reading the most accurate, timely, and insightful information on OSSEC.