Skip to main content

Books in Social sciences and humanities

    • Scripting VMware Power Tools: Automating Virtual Infrastructure Administration

      • 1st Edition
      • Al Muller
      • English
      This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.This book will cover the native tools that VMware provides with ESX Server. It will then discuss in detail the different scripting API’s and how they can be leveraged to provide some very useful, practical and time saving tools to manage a virtual infrastructure. From virtual server provisioning to backups and everything in between, this book is a one stop shop for virtual tools.
    • Hack the Stack

      Using Snort and Ethereal to Master The 8 Layers of An Insecure Network
      • 1st Edition
      • Stephen Watkins + 5 more
      • English
      This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker’s exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur. What makes this book unique is that it presents the material in a layer by layer approach which offers the readers a way to learn about exploits in a manner similar to which they most likely originally learned networking. This methodology makes this book a useful tool to not only security professionals but also for networking professionals, application programmers, and others. All of the primary protocols such as IP, ICMP, TCP are discussed but each from a security perspective. The authors convey the mindset of the attacker by examining how seemingly small flaws are often the catalyst of potential threats. The book considers the general kinds of things that may be monitored that would have alerted users of an attack.
    • Handbook of the Economics of Education

      • 1st Edition
      • Volume 2
      • Eric A. Hanushek + 1 more
      • English
      The Handbooks in Economics series continues to provide the various branches of economics with handbooks which are definitive reference sources, suitable for use by professional researchers, advanced graduate students, or by those seeking a teaching supplement. With contributions from leading researchers, each Handbook presents an accurate, self-contained survey of the current state of the topic under examination. These surveys summarize the most recent discussions in journals, and elucidate new developments. Although original material is also included, the main aim of this series is the provision of comprehensive and accessible surveys
    • Enemy at the Water Cooler

      True Stories of Insider Threats and Enterprise Security Management Countermeasures
      • 1st Edition
      • Brian T Contos
      • English
      The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level. Today’s headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16-year-old hacker. We are talking about insiders like you and me, trusted employees with access to information - consultants, contractors, partners, visitors, vendors, and cleaning crews. Anyone in an organization’s building or networks that possesses some level of trust.
    • Microsoft Windows Security Fundamentals

      For Windows 2003 SP1 and R2
      • 1st Edition
      • Jan De Clercq + 1 more
      • English
      This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks. Since its release in 2003 the Microsoft Exchange server has had two important updates, SP1 and SP2. SP1, allows users to increase their security, reliability and simplify the administration of the program. Within SP1, Microsoft has implemented R2 which improves identity and access management across security-related boundaries. R2 also improves branch office server management and increases the efficiency of storage setup and management. The second update, SP2 minimizes spam, pop-ups and unwanted downloads. These two updated have added an enormous amount of programming security to the server software.
    • Elsevier's Dictionary of Chemoetymology

      The Whys and Whences of Chemical Nomenclature and Terminology
      • 1st Edition
      • Alexander Senning
      • English
      Noting a marked lack of comprehensiveness and/or contemporaneity among typical reference works on chemical etymology, as well as a somewhat spotty coverage of chemical terms and their etymology in comprehensive dictionaries and textbooks the author decided to write an up-to-date desk reference on chemical etymology which would satisfy the needs of casual readers as well as those of more demanding users of etymological lore. Characteristic user-friendly features of the present work include avoidance of cumbersome abbreviations, avoidance of entries in foreign alphabets, and a broad coverage of all chemical disciplines including mineralogy. Biological, medical, geological, physical and mathematical terms are only considered where they appear of interest to mainstream chemists.This book does not provide definitions of terms (unless required in the etymological context) nor guidance as to the timeliness of different nomenclature systems. The typical user will from the outset be well aware of the exact meaning of the terms he or she focuses on and only require the etymological background to be used. Examples of sources which have been drawn upon in the preparation of this book, apart from the extremely useful Internet resource Google, are listed, but an exhausting enumeration would be tiresome and impractical..
    • Philosophy of Anthropology and Sociology

      A Volume in the Handbook of the Philosophy of Science Series
      • 1st Edition
      • English
      This volume concerns philosophical issues that arise from the practice of anthropology and sociology. The essays cover a wide range of issues, including traditional questions in the philosophy of social science as well as those specific to these disciplines. Authors attend to the historical development of the current debates and set the stage for future work.
    • Network Security Assessment: From Vulnerability to Patch

      • 1st Edition
      • Steve Manzuik + 2 more
      • English
      This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detailed timelines of exploit development, vendors’ time to patch, and corporate path installations. Next, the differences between security assessment s and penetration tests will be clearly explained along with best practices for conducting both. Next, several case studies from different industries will illustrate the effectiveness of varying vulnerability assessment methodologies. The next several chapters will define the steps of a vulnerability assessment including: defining objectives, identifying and classifying assets, defining rules of engagement, scanning hosts, and identifying operating systems and applications. The next several chapters provide detailed instructions and examples for differentiating vulnerabilities from configuration problems, validating vulnerabilities through penetration testing. The last section of the book provides best practices for vulnerability management and remediation.
    • Philosophy of Psychology and Cognitive Science

      • 1st Edition
      • English
      Psychology is the study of thinking, and cognitive science is the interdisciplinary investigation of mind and intelligence that also includes philosophy, artificial intelligence, neuroscience, linguistics, and anthropology. In these investigations, many philosophical issues arise concerning methods and central concepts. The Handbook of Philosophy of Psychology and Cognitive Science contains 16 essays by leading philosophers of science that illuminate the nature of the theories and explanations used in the investigation of minds. Topics discussed include representation, mechanisms, reduction, perception, consciousness, language, emotions, neuroscience, and evolutionary psychology.
    • Venture Capital in Europe

      • 1st Edition
      • Greg N. Gregoriou + 2 more
      • English
      Until recently, only the United States had an active venture capital market. This is changing rapidly, as many other countries have experienced rapid growth in venture capital financing over the past five years. This book contains new scientific articles showcasing the latest research on venture capital in Europe. Venture capital investment remains a hot topic with portfolio managers, individual investors, academics worldwide. This book examines in detail all the major issues regarding venture capital investment: contracting, financing, regulation, valuation, etc. and identifies new trends in the venture capital arena. Features a foreword by Josh Lerner.