Skip to main content

Books in Social sciences and humanities

  • Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security

    • 1st Edition
    • T. Bradley
    • English
    Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely.
  • Psychology of Academic Cheating

    • 1st Edition
    • Eric M. Anderman + 1 more
    • English
    Who cheats and why? How do they cheat? What are the consequences? What are the ways of stopping it before it starts? These questions and more are answered in this research based investigation into the nature and circumstances of Academic Cheating. Cheating has always been a problem in academic settings, and with advances in technology (camera cell phones, the internet) and more pressure than ever for students to test well and get into top rated schools, cheating has become epidemic. At the same time, it has been argued, the moral fiber of society as a whole has dampened to find cheating less villainous than it was once regarded. Who cheats? Why do they cheat? and Under what circumstances? Psychology of Academic Cheating looks at personality variables of those likely to cheat, but also the circumstances that make one more likely than not to try cheating. Research on the motivational aspects of cheating, and what research has shown to prevent cheating is discussed across different student populations, ages and settings.
  • Scripting VMware Power Tools: Automating Virtual Infrastructure Administration

    • 1st Edition
    • Al Muller
    • English
    This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.This book will cover the native tools that VMware provides with ESX Server. It will then discuss in detail the different scripting API’s and how they can be leveraged to provide some very useful, practical and time saving tools to manage a virtual infrastructure. From virtual server provisioning to backups and everything in between, this book is a one stop shop for virtual tools.
  • Hack the Stack

    Using Snort and Ethereal to Master The 8 Layers of An Insecure Network
    • 1st Edition
    • Stephen Watkins + 5 more
    • English
    This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker’s exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur. What makes this book unique is that it presents the material in a layer by layer approach which offers the readers a way to learn about exploits in a manner similar to which they most likely originally learned networking. This methodology makes this book a useful tool to not only security professionals but also for networking professionals, application programmers, and others. All of the primary protocols such as IP, ICMP, TCP are discussed but each from a security perspective. The authors convey the mindset of the attacker by examining how seemingly small flaws are often the catalyst of potential threats. The book considers the general kinds of things that may be monitored that would have alerted users of an attack.
  • Handbook of the Economics of Education

    • 1st Edition
    • Volume 2
    • Eric A. Hanushek + 1 more
    • English
    The Handbooks in Economics series continues to provide the various branches of economics with handbooks which are definitive reference sources, suitable for use by professional researchers, advanced graduate students, or by those seeking a teaching supplement. With contributions from leading researchers, each Handbook presents an accurate, self-contained survey of the current state of the topic under examination. These surveys summarize the most recent discussions in journals, and elucidate new developments. Although original material is also included, the main aim of this series is the provision of comprehensive and accessible surveys
  • Microsoft Windows Security Fundamentals

    For Windows 2003 SP1 and R2
    • 1st Edition
    • Jan De Clercq + 1 more
    • English
    This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks. Since its release in 2003 the Microsoft Exchange server has had two important updates, SP1 and SP2. SP1, allows users to increase their security, reliability and simplify the administration of the program. Within SP1, Microsoft has implemented R2 which improves identity and access management across security-related boundaries. R2 also improves branch office server management and increases the efficiency of storage setup and management. The second update, SP2 minimizes spam, pop-ups and unwanted downloads. These two updated have added an enormous amount of programming security to the server software.
  • Elsevier's Dictionary of Chemoetymology

    The Whys and Whences of Chemical Nomenclature and Terminology
    • 1st Edition
    • Alexander Senning
    • English
    Noting a marked lack of comprehensiveness and/or contemporaneity among typical reference works on chemical etymology, as well as a somewhat spotty coverage of chemical terms and their etymology in comprehensive dictionaries and textbooks the author decided to write an up-to-date desk reference on chemical etymology which would satisfy the needs of casual readers as well as those of more demanding users of etymological lore. Characteristic user-friendly features of the present work include avoidance of cumbersome abbreviations, avoidance of entries in foreign alphabets, and a broad coverage of all chemical disciplines including mineralogy. Biological, medical, geological, physical and mathematical terms are only considered where they appear of interest to mainstream chemists.This book does not provide definitions of terms (unless required in the etymological context) nor guidance as to the timeliness of different nomenclature systems. The typical user will from the outset be well aware of the exact meaning of the terms he or she focuses on and only require the etymological background to be used. Examples of sources which have been drawn upon in the preparation of this book, apart from the extremely useful Internet resource Google, are listed, but an exhausting enumeration would be tiresome and impractical..
  • Enemy at the Water Cooler

    True Stories of Insider Threats and Enterprise Security Management Countermeasures
    • 1st Edition
    • Brian T Contos
    • English
    The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level. Today’s headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16-year-old hacker. We are talking about insiders like you and me, trusted employees with access to information - consultants, contractors, partners, visitors, vendors, and cleaning crews. Anyone in an organization’s building or networks that possesses some level of trust.
  • Philosophy of Anthropology and Sociology

    A Volume in the Handbook of the Philosophy of Science Series
    • 1st Edition
    • English
    This volume concerns philosophical issues that arise from the practice of anthropology and sociology. The essays cover a wide range of issues, including traditional questions in the philosophy of social science as well as those specific to these disciplines. Authors attend to the historical development of the current debates and set the stage for future work.
  • Network Security Assessment: From Vulnerability to Patch

    • 1st Edition
    • Steve Manzuik + 2 more
    • English
    This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detailed timelines of exploit development, vendors’ time to patch, and corporate path installations. Next, the differences between security assessment s and penetration tests will be clearly explained along with best practices for conducting both. Next, several case studies from different industries will illustrate the effectiveness of varying vulnerability assessment methodologies. The next several chapters will define the steps of a vulnerability assessment including: defining objectives, identifying and classifying assets, defining rules of engagement, scanning hosts, and identifying operating systems and applications. The next several chapters provide detailed instructions and examples for differentiating vulnerabilities from configuration problems, validating vulnerabilities through penetration testing. The last section of the book provides best practices for vulnerability management and remediation.