Skip to main content

Books in Social sciences and humanities

    • Handbook of Longitudinal Research

      Design, Measurement, and Analysis
      • 1st Edition
      • Scott Menard
      • English
      Longitudinal research is a broad field in which substantial advances have been made over the past decade. Unlike many of the existing books that only address the analysis of information. The Handbook of Longitudinal Research covers design and measurement as well as the data analysis. Designed for use by a wide-ranging audience, this Handbook not only includes perspective on the methodological and data analysis problems in longitudinal research but it also includes contributors' data sets that enable readers who lack sophisticated statistics skills to move from theories about longitudinal data into practice. As the comprehensive reference, this Handbook has no direct competition as most books in this subject area are more narrowly specialized and are pitched at a high mathematical level.
    • TechnoSecurity's Guide to E-Discovery and Digital Forensics

      A Comprehensive Handbook
      • 1st Edition
      • Jack Wiles
      • English
      TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.
    • The Psychology of Learning and Motivation

      Skill and Strategy in Memory Use
      • 1st Edition
      • Volume 48
      • English
      The view of memory use as skilled performance embraces the interactive nature of memory and higher order cognition. In considering the contexts in which memory is used, this book helps to answer such questions as: If asked where I live, how do I decide on a street address or city name? What influences my selection in a criminal lineup besides actual memory of the perpetrator? Why do expert golfers better remember courses they've played than amateur golfers? Chapters in this volume discuss strategies people use in responding to memory queries- whether and how to access memory and how to translate retrieved products into responses. Coverage includes memory for ongoing events and memory for prospective events-how we remember to do future intended actions. Individual differences in memory skill is explored across people and situations, with special consideration given to the elderly population and how strategies at encoding and retrieval can offset what would otherwise be declining memory.
    • How to Cheat at Securing Your Network

      • 1st Edition
      • Ido Dubrawsky
      • English
      Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real world, step-by-step instruction. The latest addition to the best selling "How to Cheat..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery.
    • Long-Term Commitment, Trust and the Rise of Foreign Banking in China

      • 1st Edition
      • Qing Lu
      • English
      The rapid growth of foreign banks has aroused a growing interest in the academic field and specifically as regards to the question of why foreign banks exist. This book aims to establish the relationship between trust as contextual knowledge capital built between the Chinese government and foreign banks and foreign banks. knowledge capital and the relationship between the former and foreign banks. long-term commitment. By investigating the development strategy of foreign banks and by examining and explaining the importance of foreign banks. long-term commitment to their development, this book has demonstrated that foreign banks established branches in China not only to follow their home-country customers in order to retain their knowledge capital but also to gain market access. Trust as contextual knowledge capital built between foreign banks and the Chinese government could assist their knowledge capital retention and their market access strategy. Foreign banks. long-term commitment could help them to achieve this contextual knowledge capital. This book thus has major implications for the development strategy of foreign banks in a government-oriented economy with a controlled banking sector.
    • Library Management

      A Case Study Approach
      • 1st Edition
      • Ravonne Green
      • English
      An essential reference for professionals within the Library and Information Science field, this book provides library managers with the requisite skills to utilize the case study approach as an effective method for problem solving and deliberation. The first chapter discusses the case study as a research tool. The second chapter outlines the processes involved in conducting a case study. An actual case model is presented in the third chapter. The succeeding chapters include case studies written by library management students at Valdosta State University in the USA. The chapters include discussion questions, analyses, and alternative scenarios to provoke further thought and discussion.
    • Design and Evaluation of Physical Protection Systems

      • 2nd Edition
      • Mary Lynn Garcia
      • English
      Design and Evaluation of Physical Security Systems, Second Edition, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.
    • Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

      • 1st Edition
      • David Maynor
      • English
      Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code.This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an exploitation platform. With a solid understanding of MSF’s capabilities, the book then details techniques for dramatically reducing the amount of time required for developing functional exploits.By working through a real-world vulnerabilities against popular closed source applications, the reader will learn how to use the tools and MSF to quickly build reliable attacks as standalone exploits. The section will also explain how to integrate an exploit directly into the Metasploit Framework by providing a line-by-line analysis of an integrated exploit module. Details as to how the Metasploit engine drives the behind-the-scenes exploitation process will be covered, and along the way the reader will come to understand the advantages of exploitation frameworks. The final section of the book examines the Meterpreter payload system and teaches readers to develop completely new extensions that will integrate fluidly with the Metasploit Framework.
    • Alternate Data Storage Forensics

      • 1st Edition
      • Amber Schroader + 1 more
      • English
      Learn to pull “digital fingerprints” from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at “not yet every day” devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes.
    • Molecular Photofitting

      Predicting Ancestry and Phenotype Using DNA
      • 1st Edition
      • Tony Frudakis Ph.D.
      • English
      In the field of forensics, there is a critical need for genetic tests that can function in a predictive or inferential sense, before suspects have been identified, and/or for crimes for which DNA evidence exists but eye-witnesses do not. Molecular Photofitting fills this need by describing the process of generating a physical description of an individual from the analysis of his or her DNA. The molecular photofitting process has been used to assist with the identification of remains and to guide criminal investigations toward certain individuals within the sphere of prior suspects. Molecular Photofitting provides an accessible roadmap for both the forensic scientist hoping to make use of the new tests becoming available, and for the human genetic researcher working to discover the panels of markers that comprise these tests. By implementing population structure as a practical forensics and clinical genomics tool, Molecular Photofitting serves to redefine the way science and history look at ancestry and genetics, and shows how these tools can be used to maximize the efficacy of our criminal justice system.