Skip to main content

Books in Social sciences and humanities

    • High-Technology Crime Investigator's Handbook

      Establishing and Managing a High-Technology Crime Prevention Program
      • 2nd Edition
      • Gerald L. Kovacich + 1 more
      • English
      The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator.
    • How to Cheat at Managing Information Security

      • 1st Edition
      • Mark Osborne
      • English
      This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non – technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory. Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: • Design the organization chart of his new security organization • Design and implement policies and strategies • Navigate his way through jargon filled meetings • Understand the design flaws of his E-commerce and DMZ infrastructure
    • How to Cheat at Securing a Wireless Network

      • 1st Edition
      • Chris Hurley + 1 more
      • English
      Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless networkWith the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the network’s vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users.
    • Joe Grand's Best of Hardware, Wireless, and Game Console Hacking

      • 1st Edition
      • Joe Grand + 9 more
      • English
      The book introduces the principles of hardware design and describes the tools and techniques required to begin hacking. The DVD contains hack instructions for over 20 game consoles and hardware devices from Nintendo, Apple, Sony, Microsoft, Palm and more.The presentation of these 20 projects on DVD media provides users with benefits and options not available on the printed page. All images are hi-res color that can be enlarged or printed, the text is easily searched, and the user can copy the contents to their hard disk and add comments directly into the PDF files. The DVD media also lends itself well to group projects (it includes a 10 user license).The 160-page book includes chapters on hacking tools and electrical engineering basics, along with chapters on the background, design and functionality of each hardware device.
    • BigNum Math

      Implementing Cryptographic Multiple Precision Arithmetic
      • 1st Edition
      • Tom St Denis
      • English
      Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and single precision. The purpose of this text is to instruct the reader regarding how to implement efficient multiple precision algorithms.Bignum math is the backbone of modern computer security algorithms. It is the ability to work with hundred-digit numbers efficiently using techniques that are both elegant and occasionally bizarre. This book introduces the reader to the concept of bignum algorithms and proceeds to build an entire library of functionality from the ground up. Through the use of theory, pseudo-code and actual fielded C source code the book explains each and every algorithm that goes into a modern bignum library. Excellent for the student as a learning tool and practitioner as a reference alike BigNum Math is for anyone with a background in computer science who has taken introductory level mathematic courses. The text is for students learning mathematics and cryptography as well as the practioner who needs a reference for any of the algorithms documented within.
    • Dictionary of Information Security

      • 1st Edition
      • Robert Slade
      • English
      The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification candidates for security specializations like CISSP and Security+ will also find this a valuable resource.
    • LAXTON'S BUILDING PRICE BOOK 2007

      • 179th Edition
      • V B Johnson
      • English
      Now in its 179th edition, Laxton’s has become a firm favourite in the UK Building Industry. With more prices and more in-depth build-ups, Laxton’s offers more practical and complete information than any other price book availableThis new edition takes into account major price variations that stem frm raw material costs in the last few months. * Higher-fuel costs have impacted on prices across the board, in particular costs of non-ferrous metals in increased* Copper sheet and pipe show prince increases of well above 50% in the last year, while zinc, lead and aluminium prices have also risen significantly* There are savings in plaster and drainage goods, prices are downAll the prices in Laxton's are based on the new 3 year Construction Industry Joint council wage rate agreement that came into force at the end of June 2006
    • Securing HP NonStop Servers in an Open Systems World

      TCP/IP, OSS and SQL
      • 1st Edition
      • XYPRO Technology XYPRO Technology Corp
      • English
      Recent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments, myriad compliance regulations and the soaring costs of security breaches, it is economically essential for companies to become proactive in implementing effective system and data security measures. This volume is a comprehensive reference for understanding security risks, mitigations and best practices as they apply to the various components of these business-critical computing environments.HP NonStop Servers are used by Financial, Medical, Manufacturing enterprises where there can be no down time. Securing HP NonStop Servers in an Open Systems World: OSS, TCP/IP, and SQL takes a wide angle view of NonStop Server use. This book addresses protection of the Open Systems Services environment, network interfaces including TCP/IP and standard SQL databases. It lays out a roadmap of changes since our first book HP has made to Safeguard, elaborating on the advantages and disadvantages of implementing each new version. Even the security aspects of managing Operating System upgrades are given attention. Auditors, security policy makers, information security administrators and system managers will find the practical information they need for putting security principles into practice to meet industry standards as well as compliance regulations.
    • Handbook on Animal-Assisted Therapy

      Theoretical Foundations and Guidelines for Practice
      • 2nd Edition
      • Megan Mueller + 3 more
      • English
      The original edition was the first book to provide a comprehensive overview of the ways in which animals can assist therapists with treatment of specific populations, and/or in specific settings. The second edition continues in this vein, with 7 new chapters plus substantial revisions of continuing chapters as the research in this field has grown. New coverage includes: Animals as social supports, Use of AAT with Special Needs students, the role of animals in the family- insights for clinicians, and measuring the animal-person bond.
    • Risk and Management Accounting

      Best Practice Guidelines for Enterprise-Wide Internal Control Procedures
      • 1st Edition
      • Paul M. M Collier + 2 more
      • English
      This CIMA research report builds on a pilot study undertaken by the authors. A framework for risk management was developed as a result of the research. This research report describes the results of a major survey-based research study entitled ‘Risk and Management Accounting: The development of best practice guidelines for enterprise-wide internal control procedures to identify and manage risk; the contribution of and the consequences for management accountants’.