Skip to main content

Books in Social sciences and humanities

    • China's Financial Markets

      An Insider's Guide to How the Markets Work
      • 1st Edition
      • Salih N. Neftci + 1 more
      • English
      China’s financial markets represent about $2 trillion and are expected to grow to about $10 trillion by 2008. As these markets continue to open to outside investment, a thorough understanding of how they operate will be essential for success. In this book, Salih Neftci, an expert in finance whose teaching and research span North America, Europe and Asia, and Michelle Menager-Xu, a Chinese finance professional currently working in Geneva, bring together an unprecedented collection of Chinese insiders who are experts in their respective industries. These experts provide a detailed description of the banking system, the money, equity, futures, FX, and bond markets, the insurance sector, the mortgage market and mortgage instruments, and the regulators. Readers will learn how each of these financial sectors operates, how the government, regulators, and the central bank are involved, each sector’s history, size and projected growth, an analysis of its current situation and discussion of future trends, the major players, and how the game is played. This is a must-read book for financial success in this emerging market.
    • Constructing Adulthood

      Agency and Subjectivity in Adolescence and Adulthood
      • 1st Edition
      • Volume 11
      • Ross Macmillan
      • English
      Advances in Life Course Research publishes original theoretical analyses, integrative reviews, policy analyses and position papers, and theory-based empirical papers on issues involving all aspects of the human life course. Adopting a broad conception of the life course, it invites and welcomes contributions from all disciplines and fields of study interested in understanding, describing, and predicting the antecedents of and consequences for the course that human lives take from birth to death, within and across time and cultures, regardless of methodology, theoretical orientation, or disciplinary affiliation. Each volume is organized around a unifying theme.
    • Elsevier's Dictionary of Mammals

      • 1st Edition
      • Murray Wrobel
      • English
      This authoritative dictionary has been compiled with the aim of giving an overview of the English, German, French and Italian names of mammals. The Basic Table contains, in alphabetical order, the scientific names of families, genera, species and sub-species and synonyms with the identified names detailed in all four languages. These are given in the singular for species and sub-species and in the plural for other terms. The synonyms and subspecies are offered in detail. The editor offers numerous alternative spellings of vernacular names. This dictionary is an outstanding guide for every researcher in mammalogy.
    • The Vein Book

      • 1st Edition
      • John J. Bergan
      • English
      The Vein Book is a comprehensive reference on veins and venous circulation. In one volume it provides complete, authoritative, and up-to-date information about venous function and dysfunction, bridging the gap between clinical medicine and basic science. It is the single authoritative resource which consolidates present knowledge and stimulates further developments in this rapidly changing field.
    • Stress Testing for Risk Control Under Basel II

      • 1st Edition
      • Dimitris N. Chorafas
      • English
      The Consultative paper issued by the Basel Committee on Banking Supervision (Basel II) cites the failure of bankers to adequately stress test exposures as a major reason for bad loans. Sample quotes from this crucial document: * "Banks should take into consideration potential future changes in economic conditions when assessing individual credits and their credit portfolios, and should assess their credit risk exposures under stressful conditions." * "The recent disturbances in Asia and Russia illustrate how close linkages among emerging markets under stress conditions and previously undetected correlations between market and credit risks, as well as between those risks and liquidity risk, can produce widespread losses."* "Effective stress testing which takes account of business or product cycle effects is one approach to incorporating into credit decisions a fuller understanding of a borrower's credit risk."Written for professionals in financial services with responsibility for IT and risk measurement, management, and modeling, Dimitris Chorafas explains in clear language the testing methodology necessary for risk control to meet Basel II requirements. Stress testing is the core focus of the book, covering stress analysis and the use of scenarios, models, drills, benchmarking, backtesting, and post-mortems, creditworthiness, wrong way risk and statistical inference, probability of default, loss given default and exposure at default, stress testing expected losses, correlation coefficients, and unexpected losses, stress testing related to market discipline and control action, and pillars 2 and 3 of Basel II.
    • Devolution, Port Governance and Port Performance

      • 1st Edition
      • Volume 17
      • Mary R Brooks + 1 more
      • English
      The relationship between ports and governments has changed profoundly over the past quarter of a century. Many governments have sought to extract themselves from the business of port operations and, in many cases, the provision of port services has devolved to local governments, communities or private management and administration. As such devolution implies a change in governance model, this trend raises questions about consequent performance. This issue examines the changed port management environment, focusing particularly on government policies such as devolution, regulatory reform and newly imposed governance models, all of which have exerted a significant influence over the nature of that changed environment. The issue is structured so as to first explore the devolution and port reform approaches for 14 countries or regions, before examining how ports are governed and what the choice of governance might mean for their performance. Part I introduces the issue, and provides a framework for defining the basic concepts involved in devolution; it paints a picture of the current port environment, its likely future evolution and the expected impact this will have on the functioning of ports. Part II examines the port industry in 14 countries or administrations, and presents the thinking behind any devolution programs that have been implemented. Part III focuses on port governance and devolution generally, and examines governance from both strategic management and economics perspectives, including topics such as governance models, supranational governance and stakeholder conflict. Part IV examines the measurement of port performance and closes by providing conclusions and a future research agenda. This issue will be of interest to port managers, government officials and academics alike.
    • WarDriving and Wireless Penetration Testing

      • 1st Edition
      • Chris Hurley + 3 more
      • English
      Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester’s Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.
    • Syngress Force Emerging Threat Analysis

      From Mischief to Malicious
      • 1st Edition
      • Robert Graham
      • English
      A One-Stop Reference Containing the Most Read Topics in the Syngress Security LibraryThis Syngress Anthology Helps You Protect Your Enterprise from Tomorrow’s Threats TodayThis is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the “best of” this year’s top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future..* From Practical VoIP Security, Thomas Porter, Ph.D. and Director of IT Security for the FIFA 2006 World Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security.* From Phishing Exposed, Lance James, Chief Technology Officer of Secure Science Corporation, presents the latest information on phishing and spam.* From Combating Spyware in the Enterprise, Brian Baskin, instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and removal of spyware.* Also from Combating Spyware in the Enterprise, About.com’s security expert Tony Bradley covers the transformation of spyware.* From Inside the SPAM Cartel, Spammer-X shows how spam is created and why it works so well.* From Securing IM and P2P Applications for the Enterprise, Paul Piccard, former manager of Internet Security Systems' Global Threat Operations Center, covers Skype security.* Also from Securing IM and P2P Applications for the Enterprise, Craig Edwards, creator of the IRC security software IRC Defender, discusses global IRC security.* From RFID Security, Brad “Renderman” Haines, one of the most visible members of the wardriving community, covers tag encoding and tag application attacks.* Also from RFID Security, Frank Thornton, owner of Blackthorn Systems and an expert in wireless networks, discusses management of RFID security.* From Hack the Stack, security expert Michael Gregg covers attacking the people layer.* Bonus coverage includes exclusive material on device driver attacks by Dave Maynor, Senior Researcher at SecureWorks.
    • Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

      • 1st Edition
      • T. Bradley
      • English
      Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely.
    • Psychology of Academic Cheating

      • 1st Edition
      • Eric M. Anderman + 1 more
      • English
      Who cheats and why? How do they cheat? What are the consequences? What are the ways of stopping it before it starts? These questions and more are answered in this research based investigation into the nature and circumstances of Academic Cheating. Cheating has always been a problem in academic settings, and with advances in technology (camera cell phones, the internet) and more pressure than ever for students to test well and get into top rated schools, cheating has become epidemic. At the same time, it has been argued, the moral fiber of society as a whole has dampened to find cheating less villainous than it was once regarded. Who cheats? Why do they cheat? and Under what circumstances? Psychology of Academic Cheating looks at personality variables of those likely to cheat, but also the circumstances that make one more likely than not to try cheating. Research on the motivational aspects of cheating, and what research has shown to prevent cheating is discussed across different student populations, ages and settings.