Skip to main content

Books in Social sciences and humanities

  • The Bioarchaeology of Metabolic Bone Disease

    • 1st Edition
    • Megan B. Brickley + 1 more
    • English
    The Bioarchaeology of Metabolic Bone Disease provides a comprehensive and invaluable source of information on this important group of diseases. It is an essential guide for those engaged in either basic recording or in-depth research on human remains from archaeological sites. The range of potential tools for investigating metabolic diseases of bone are far greater than for many other conditions, and building on clinical investigations, this book will consider gross, surface features visible using microscopic examination, histological and radiological features of bone, that can be used to help investigate metabolic bone diseases.
  • OS X Exploits and Defense

    Own it...Just Like Windows or Linux!
    • 1st Edition
    • Chris Hurley + 6 more
    • English
    Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security. Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed! Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
  • The Real MCTS/MCITP Exam 70-649 Prep Kit

    Independent and Complete Self-Paced Solutions
    • 1st Edition
    • Brien Posey
    • English
    This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSE skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640, 70-642, and 70-643.The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.
  • The Banker's Handbook on Credit Risk

    Implementing Basel II
    • 1st Edition
    • Morton Glantz + 1 more
    • English
    The Banker's Handbook on Credit Risk shows you how to comply with Basel II regulations on credit risk step by step, building on the basics in credit risk up to advanced credit risk methodologies. This advanced credit/risk management book takes a "new tools" approach to Basel II implementation. The hands-on applications covered in this book are vast, including areas of Basel II banking risk requirements (credit risk, credit spreads, default risk, value at risk, market risk, and so forth) and financial analysis (exotic options and valuation), to risk analysis (stochastic forecasting, risk-based Monte Carlo simulation, portfolio optimization) and real options analysis (strategic options and decision analysis). This book is targeted at banking practitioners and financial analysts who require the algorithms, examples, models, and insights in solving more advanced and even esoteric problems. The book comes complete with a DVD filled with sample modeling videos, case studies, and software applications to help the reader get started immediately. The various trial software applications included allows the reader to quickly access the approximately 670 modeling functions, 250 analytical model templates, and powerful risk-based simulation software to help in the understanding and learning of the concepts covered in the book, and also to use the embedded functions and algorithms in their own models. In addition, the reader can get started quickly in running risk-based Monte Carlo simulations, run advanced forecasting methods, and perform optimization on a myriad of situations, as well as structure and solve customized real options and financial options problems.
  • Practical Financial Modelling

    A Guide to Current Practice
    • 2nd Edition
    • Jonathan Swan
    • English
    This second edition of Practical Financial Modelling is vital tool for all finance and management professionals whose work involves the production and development of complex spreadsheets and financial models. The author bridges the gap between the Excel manual and financial literature with a wealth of practical advise and useful tips.The book identifies good practice and highlights those areas which are prone to error and inconsistency resulting in a refreshingly simple approach to building and using financial models suitable for novice and experienced modellers. By using practical worked examples the most effective ways in which problems can be solved are explored. Key themes include: model structure, audit formulae and functions and model use. New to the second edition:Instructive information on Excel 2007 and its enhanced modelling functions and feature; Risk controls in developing and using financial models; Test-yourself modelling problems and applied examples in every chapter; Substantial information related to reporting and charting techniques and an appendix devoted to parallel comparison of how-to in Excel 2003 and 2007.
  • The Real MCTS/MCITP Exam 70-643 Prep Kit

    Independent and Complete Self-Paced Solutions
    • 1st Edition
    • Brien Posey + 5 more
    • English
    This exam is designed to validate Windows Server 2008 applications platform configuration skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-643. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.
  • The Real MCTS/MCITP Exam 70-648 Prep Kit

    Independent and Complete Self-Paced Solutions
    • 1st Edition
    • Brien Posey
    • English
    This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSAs) AD and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSA skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640 and 70-643.The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.
  • Criminal Profiling

    An Introduction to Behavioral Evidence Analysis
    • 3rd Edition
    • Brent E. Turvey
    • English
    Now in its third edition, Criminal Profiling is established as an industry standard text. It moves evidence-based criminal profiling into a full embrace of the scientific method with respect to examining and interpreting behavioral evidence. If focuses on criminal profiling as an investigative and forensic process, helping to solve crime through an honest understanding of the nature and behavior of the most violent criminals. Throughout the text, the author outlines specific principles and practice standards for Behavioral Evidence Analysis, focusing on the application of theory and method to real cases. Criminal Profiling, Third Edition, is an ideal companion for students and professionals alike, including investigators, forensic scientists, criminologists, mental health professionals, and attorneys. With contributing authors representing law enforcement, academic, mental health, and forensic science communities, it offers a balanced perspective not found in other books on this subject. Readers will use it as a comprehensive reference text, a handbook for evaluating physical evidence, a tool to bring new perspectives to cold cases, and as an aid in preparing for criminal trials.
  • Research in Accounting Regulation

    • 1st Edition
    • Volume 20
    • Gary Previts
    • English
  • Managing Catastrophic Loss of Sensitive Data

    A Guide for IT and Security Professionals
    • 1st Edition
    • Constantine Photopoulos
    • English
    Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes.