Skip to main content

Books in Social sciences and humanities

    • Libraries in the Twenty-First Century

      Charting Directions in Information Services
      • 1st Edition
      • Stuart J. Ferguson
      • English
      Libraries in the Twenty-First Century brings together library educators and practitioners to provide a scholarly yet accessible overview of library and information management and the challenges that the twenty-first century offers the information profession. The papers in this collection illustrate the changing nature of the library as it evolves into its twenty-first century manifestation. The national libraries of Australia and New Zealand, for instance, have harnessed information and communication technologies to create institutions that are far more national, even democratic, in terms of delivery of service and sheer presence than their print-based predecessors.Aimed at practitioners and students alike, this publication covers specific types of library and information agencies, discusses specific aspects of library and information management and places developments in library and information services in a number of broad contexts: socio-economic, ethico-legal, historical and educational.
    • The Art of War for Security Managers

      10 Steps to Enhancing Organizational Effectiveness
      • 1st Edition
      • Scott Watson
      • English
      The classic book The Art of War (or as it is sometimes translated, The Art of Strategy) by Sun Tzu is often used to illustrate principles that can apply to the management of business environments. The Art of War for Security Managers is the first book to apply the time-honored principles of Sun Tzu’s theories of conflict to contemporary organizational security.Corporate leaders have a responsibility to make rational choices that maximize return on investment. The author posits that while conflict is inevitable, it need not be costly. The result is an efficient framework for understanding and dealing with conflict while minimizing costly protracted battles, focusing specifically on the crucial tasks a security manager must carry out in a 21st century organization.
    • Security+ Study Guide

      • 2nd Edition
      • Ido Dubrawsky + 1 more
      • English
      Over 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study GuidesThe Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test preparation software for the edge you need to achieve certification on your first try! This system is comprehensive, affordable, and effective!* Completely Guaranteed Coverage of All Exam ObjectivesAll five Security+ domains are covered in full: General Security Concepts, Communication Security, Infrastructure Security, Basics of Cryptography, and Operational / Organizational Security * Fully Integrated LearningThis package includes a Study Guide and one complete practice exam. * Each chapter starts by explaining the exam objectives covered in the chapterYou will always know what is expected of you within each of the exam’s domains.* Exam-Specific Chapter ElementsNotes, Tips, Alerts, Exercises, Exam’s Eyeview, and Self Test with fully explained answers. * Test What You LearnedHundreds of self-test review questions test your knowledge of specific exam objectives. A Self Test Appendix features answers to all questions with complete explanations of correct and incorrect answers.
    • Memory Evolutive Systems; Hierarchy, Emergence, Cognition

      • 1st Edition
      • Volume 4
      • A C Ehresmann + 1 more
      • English
      Memory Evolutive Systems; Hierarchy, Emergence, Cognition provides comprehensive and comprehensible coverage of Memory Evolutive Systems (MEM). Written by the developers of the MEM, the book proposes a mathematical model for autonomous evolutionary systems based on the Category Theory of mathematics. It describes a framework to study and possibly simulate the structure of living systems and their dynamic behavior. This book contributes to understanding the multidisciplinary interfaces between mathematics, cognition, consciousness, biology and the study of complexity. It is organized into three parts. Part A deals with hierarchy and emergence and covers such topics as net of interactions and categories; the binding problem; and complexifications and emergence. Part B is about MEM while Part C discusses MEM applications to cognition and consciousness. The book explores the characteristics of a complex evolutionary system, its differences from inanimate physical systems, and its functioning and evolution in time, from its birth to its death. This book is an ideal reference for researchers, teachers and students in pure mathematics, computer science, cognitive science, study of complexity and systems theory, Category Theory, biological systems theory, and consciousness theory. It would also be of interest to both individuals and institutional libraries.
    • Cognition, Brain, and Consciousness

      Introduction to Cognitive Neuroscience
      • 1st Edition
      • Bernard J. Baars + 1 more
      • Bernard J. Baars + 1 more
      • English
      A textbook for psychology, neuroscience, pre-medical students, and everybody interested in the neuroscience of cognition. A wave of new research is transforming our understanding of the human mind and brain. Many educational fields now require a basic understanding of the new topic of cognitive neuroscience. However, available textbooks are written more for biology audiences than for psychology and related majors. This text aims to bridge that gap. A background in biology of neuroscience is not required. The thematic approach builds on widely understood concepts in psychology, such as working memory, selective attention, and social cognition. Edited by two leading experts in the field, the book guides the reader along a clear path to understand the latest findings. FEATURES: Written specifically for psychology, pre-medical, education and neuroscience undergraduate and graduate students The thematic approach builds on on accepted concepts, not presuming a background in neuroscience or biology Includes two Appendices on brain imaging and neural networks written by Thomas Ramsoy and Igor Aleksander Introduces the brain in a step-by-step, readable style, with gradually increasing sophistication Richly illustrated in full color with clear and detailed drawings that build the brain from top to bottome, simplifying the layout of the brain for students Pedagogy includes exercises and study questions at the end of each chapter
    • Social Marketing

      Why should the Devil have all the best tunes?
      • 1st Edition
      • Gerard Hastings
      • English
      This book explains the principles of social marketing and examines the implications of using techniques devised on Wall Street to further social and health goals. Naomi Kein, Joel Bakan and George Monbiot have each done a great job of telling us what is wrong with corporate capitalism. This book begins to provide some solutions. It shows how we can a) borrow the techniques they use to promote consumption, to encourage more socially desirable behaviours, and b) use rigorous research to enable regulators to constrain the worst excesses of Wall Street. Modern marketing techniques now pervade every aspect of our lives: the government, charities, advocacy groups use it to encourage us to live more healthily, support good causes or be more ecologically sensitive. This book asks whether this works and what does it tell us about the relationship between business and civil society? Highly accessible with clear learning objectives, exercises and worked examples, this is also a text that stretches our understanding of the discipline and raises questions about future directions.
    • Planning and Budgeting for the Agile Enterprise

      A driver-based budgeting toolkit
      • 1st Edition
      • Richard Barrett
      • English
      Planning and budgeting is one of the hottest topics in accounting; global spending on budgeting software is booming and is predicted to continue to grow throughout this decade. It's big business. This book focuses on 'Driver-Based' budgeting (ie using external and internal non-financial drivers to predict live item expenses). The book shows the benefits that Driver-Based Budgeting brings and as such is a 'tool kit for change'. Case studies and worked examples are used throughout to ensure understanding, as well as checklists on implementation issues.
    • Translation of Addictions Science Into Practice

      • 1st Edition
      • Peter M. Miller + 1 more
      • English
      Recent advances in the understanding of the genetic, neurochemical, behavioral and cultural underpinnings of addiction have led to rapid advances in the understanding of addiction as a disease. In fact, advances in basic science and the development of new pharmacological and behavioral therapies associated with them are appearing faster than can be assimilated not only by clinical researchers but practitioners and policy makers as well. Translation of science-based addictions knowledge into improved prevention, assessment and treatment, and communication of these changes to researchers and practitioners are significant challenges to the field. The general aim of Translation of Addictions Science Into Practice is to summarize current and potential linkages between advances in addiction science and innovations in clinical practice. Whilst this book is primarily focused on translation, it also encompasses some scientific advances that are relevant to dissemination, and the book is itself a tool for disseminating innovative thinking. The goal is to generate interest in application opportunities from both recent research and theoretical advances.
    • How to Cheat at VoIP Security

      • 1st Edition
      • Thomas Porter CISSP CCNP CCDA CCS + 1 more
      • English
      The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn’t Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator’s point of view, VoIP is different. Understand why. * What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network?Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP.* The Security Considerations of Voice MessagingLearn about the types of security attacks you need to protect against within your voice messaging system.* Understand the VoIP Communication ArchitecturesUnderst... what PSTN is and what it does as well as the H.323 protocol specification, and SIP Functions and features.* The Support Protocols of VoIP EnvironmentsLearn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY.* Securing the Whole VoIP InfrastructureLearn about Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks.* Authorized Access Begins with AuthenticationLearn the methods of verifying both the user identity and the device identity in order to secure a VoIP network.* Understand Skype SecuritySkype does not log a history like other VoIP solutions; understand the implications of conducting business over a Skype connection.* Get the Basics of a VoIP Security PolicyUse a sample VoIP Security Policy to understand the components of a complete policy.
    • How to Cheat at Configuring Open Source Security Tools

      • 1st Edition
      • Michael Gregg + 4 more
      • English
      The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.* Take InventorySee how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate.* Use NmapLearn how Nmap has more features and options than any other free scanner.* Implement FirewallsUse netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable.* Perform Basic HardeningPut an IT security policy in place so that you have a concrete set of standards against which to measure. * Install and Configure Snort and WiresharkExplore the feature set of these powerful tools, as well as their pitfalls and other security considerations.* Explore Snort Add-OnsUse tools like Oinkmaster to automatically keep Snort signature files current.* Troubleshoot Network ProblemsSee how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP.* Learn Defensive Monitoring ConsiderationsSee how to define your wireless network boundaries, and monitor to know if they’re being exceeded and watch for unauthorized traffic on your network.