Skip to main content

Books in Social sciences and humanities

    • Climate, Environment, and Society in the Pacific during the Last Millennium

      • 1st Edition
      • Volume 6
      • Patrick D. Nunn
      • English
      The nature of global change in the Pacific Basin is poorly known compared to other parts of the world. Climate, Environment, and Society in the Pacific during the Last Millennium describes the climate changes that occurred in the Pacific during the last millennium and discusses how these changes controlled the broad evolution of human societies, typically filtered by the effects of changing sea level and storminess on food availability and interaction. Covering the entire period since AD 750 in the Pacific, this book describes the influences of climate change on environments and societies during the Medieval Warm Period and the Little Ice Age, focusing on the 100-year transition between these – a period of rapid change known as the AD 1300 Event.
    • How to Cheat at Securing SQL Server 2005

      • 1st Edition
      • Mark Horninger
      • English
      The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help in order to get SQL Server secured as quickly and safely as possible.
    • Interpersonal Relations Across the Life Course

      • 1st Edition
      • Volume 12
      • Timothy J Owens + 1 more
      • English
      This volume (number 12) is subtitled Interpersonal Relations across the Life Course. It is inspired by the increased awareness in recent years of the way in which structural and psychosocial dimensions of the life course shape interpersonal relations. Interest in this issue has included both the maintenance of long-term relationships that may span many phases of the life course and the development of relationships that are specific to particular phases. The volume is a combination of invited and author initiated papers--all anonymously peer reviewed--that seeks to present a cohesive source of information on the multiform nature and influences of interpersonal relations from a variety of perspectives, theoretical frames, and substantive areas. Contributions reflect:Macro-micro linkages and interpersonal relations, (i.e., age structures, social institutions, and race/ethnicity) Parenting across the life course Parent-adult child relations and transitionsTransitio... in non-kin relationshipsSocial relationships and well-being
    • Handbook of Industrial Organization

      • 1st Edition
      • Volume 3
      • Mark Armstrong + 1 more
      • English
      This is Volume 3 of the Handbook of Industrial Organization series (HIO). Volumes 1 & 2 published simultaneously in 1989 and many of the chapters were widely cited and appeared on graduate reading lists. Since the first volumes published, the field of industrial organization has continued to evolve and this volume fills the gaps. While the first two volumes of HIO contain much more discussion of the theoretical literature than of the empirical literature, it was representative of the field at that time. Since then, the empirical literature has flourished, while the theoretical literature has continued to grow, and this new volume reflects that change of emphasis.Thie volume is an excellent reference and teaching supplement for industrial organization or industrial economics, the microeconomics field that focuses on business behavior and its implications for both market structures and processes, and for related public policies.
    • Practical Embedded Security

      Building Secure Resource-Constrained Systems
      • 1st Edition
      • Timothy Stapko
      • English
      The great strides made over the past decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem: their designs are now being targeted by the same malicious attackers whose predations have plagued traditional systems for years. Rising concerns about data security in embedded devices are leading engineers to pay more attention to security assurance in their designs than ever before. This is particularly challenging due to embedded devices’ inherent resource constraints such as limited power and memory. Therefore, traditional security solutions must be customized to fit their profile, and entirely new security concepts must be explored. However, there are few resources available to help engineers understand how to implement security measures within the unique embedded context. This new book from embedded security expert Timothy Stapko is the first to provide engineers with a comprehensive guide to this pivotal topic. From a brief review of basic security concepts, through clear explanations of complex issues such as choosing the best cryptographic algorithms for embedded utilization, the reader is provided with all the information needed to successfully produce safe, secure embedded devices.
    • The Information Literacy Cookbook

      Ingredients, Recipes and Tips for Success
      • 1st Edition
      • Jane Secker + 2 more
      • English
      This book, aimed at an international audience, provides an overview of Information Literacy (IL) in practice; what it is, why it’s become so important in the library profession and demonstrates how librarians can cultivate a better understanding of IL in their own organisations. It uses the ‘Cookbook’ theme throughout to provide a more informal approach, which will appeal to practitioners, and also reflects the need to provide guidance in the form of recipes, tips for success, regional variations, and possible substitutions if ingredients aren’t available. This approach makes it easy to read and highly valuable for the busy information professional. It includes an overview of information literacy in higher education, the schools sector, public libraries, the health service and the commercial sector. It also includes contributions from international authors.
    • International Review of Research in Mental Retardation

      Handbook of Assessment in Persons with Intellectual Disability
      • 1st Edition
      • Volume 34
      • English
      Autism Spectrum Disorder is one of the most researched and popular topics in the fields of psychology, psychiatry, and special education. In the last 30 years the amount of new information on assessment and treatment has been astounding. The field has moved from a point where many considered the condition untreatable to the current position that it may be curable in some cases and that all persons with this condition can benefit from treatment. Intervening with school age children continues to be a major focus of assessment or intervention. However, expanding the ages of those receiving more attention from younger children to older adults, is becoming more prevalent. The consensus is that intensive treatment at the earliest recognized age is critical and that many adults evince symptoms of the disorder and warrant care.The field is full of many proposed treatments many of which offer promise but no data. Thus, a book on evidence-based assessments and interventions, across the life span should be of value in helping to sort out the more credible interventions as defined by the research and what methods have the best support. Given the popularity of the topic and the vst array of potential assessments and teratments available, this volume will be aimed at delineating what the researchers have shown has the best evidence to support particular methods.Internationa... Review of Research in Mental Retardation is now available online at ScienceDirect — full-text online of volumes 23 onwards. Elsevier book series on ScienceDirect gives multiple users throughout an institution simultaneous online access to an important compliment to primary research. Digital delivery ensures users reliable, 24-hour access to the latest peer-reviewed content. The Elsevier book series are compiled and written by the most highly regarded authors in their fields and are selected from across the globe using Elsevier’s extensive researcher network. For more information about the Elsevier Book Series on ScienceDirect Program, please visit:http://www.inf...
    • The Corporate Security Professional's Handbook on Terrorism

      • 1st Edition
      • Edward Halibozek + 2 more
      • English
      The Corporate Security Professional's Handbook on Terrorism is a professional reference that clarifies the difference between terrorism against corporations and their assets, versus terrorism against government assets. It addresses the existing misconceptions regarding how terrorism does or does not affect corporations, and provides security professionals and business executives with a better understanding of how terrorism may impact them. Consisting three sections, Section I provides an explanation of what terrorism is, its history, who engages in it, and why. Section II focuses on helping the security professional develop and implement an effective anti-terrorism program in order to better protect the employees and assets of the corporation. Section III discusses the future as it relates to the likelihood of having to deal with terrorism. The book provides the reader with a practitioner’s guide, augmented by a historical assessment of terrorism and its impact to corporations, enabling them to immediately put in place useful security processes and methods to protect their corporate interests against potential acts of terror. This is guide is an essential tool for preparing security professionals and company executives to operate in an increasingly hostile global business environment.
    • The History of Information Security

      A Comprehensive Handbook
      • 1st Edition
      • Karl Maria Michael de Leeuw + 1 more
      • English
      Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered. There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.
    • Fighting Fraud

      How to Establish and Manage an Anti-Fraud Program
      • 1st Edition
      • Gerald L. Kovacich
      • English
      This practical reference provides the basics for instituting a corporate anti-fraud program that helps prepare corporate security professionals and other corporate managers for fighting corporate fraud from inside the company. Fighting Fraud provides an exceptional foundation for security professionals or business executives involved in developing and implementing a corporate anti-fraud program as part of a corporate assets protection program. The author’s intent is to provide the reader with a practitioner’s guide (a “how-to” book), augmented by some background information to put it all in perspective. The approach used should enable the readers to immediately put in place a useful anti-fraud program under the leadership of the corporate security officer (CSO), or other corporate professional.