Skip to main content

Books in Social sciences and humanities

    • Shooting Incident Reconstruction

      • 1st Edition
      • December 20, 2005
      • Lucien C. Haag
      • English
      • eBook
        9 7 8 0 0 8 0 4 8 0 8 9 3
      Shooting Incident Reconstruction is based on the authors' numerous years of conducting courses and seminars on the subject of shooting incident reconstruction. It seeks to thoroughly address matters from simple to complex in order to provide the reader with an explanation of the factors surrounding ballistics, trajectory, and shooting scenes. The ultimate objectives of this unique book are to assist investigators, crime scene analysts, pathologists, ballistics experts, and lawyers to understand the terminology, science, and factors involved in reconstructing shooting incident events to solve forensic cases. The book covers a full range of related topics, including the range from which a firearm was discharged; the sequence of shots in a multiple discharge shooting incident; the position of a firearm at the moment of discharge; the position of a victim at the moment of impact; the probable flight path of a projectile; the manner by which a firearm was discharged, and much more. It contains over 100 diagrams and photographs, many in full-color, that support and illustrate key concepts.
    • Handbook of the Biology of Aging

      • 6th Edition
      • December 20, 2005
      • Edward J. Masoro + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 9 1 4 0 0
      The Handbook of the Biology of Aging, Sixth Edition, provides a comprehensive overview of the latest research findings in the biology of aging. Intended as a summary for researchers, it is also adopted as a high level textbook for graduate and upper level undergraduate courses. The Sixth Edition is 20% larger than the Fifth Edition, with 21 chapters summarizing the latest findings in research on the biology of aging. The content of the work is virtually 100% new. Though a selected few topics are similar to the Fifth Edition, these chapters are authored by new contributors with new information. The majority of the chapters are completely new in both content and authorship. The Sixth Edition places greater emphasis and coverage on competing and complementary theories of aging, broadening the discussion of conceptual issues. Greater coverage of techniques used to study biological issues of aging include computer modeling, gene profiling, and demographic analyses. Coverage of research on Drosophilia is expanded from one chapter to four. New chapters on mammalian models discuss aging in relation to skeletal muscles, body fat and carbohydrate metabolism, growth hormone, and the human female reproductive system. Additional new chapters summarize exciting research on stem cells and cancer, dietary restriction, and whether age related diseases are an integral part of aging. The Handbook of the Biology of Aging, Sixth Edition is part of the Handbooks on Aging series, including Handbook of the Psychology of Aging and Handbook of Aging and the Social Sciences, also in their 6th editions.
    • Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

      • 1st Edition
      • December 15, 2005
      • Eric Cole + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 4 8 1
      • eBook
        9 7 8 0 0 8 0 4 8 9 0 5 6
      The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified “Insider Threats” as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely to pose a threat. Next, the reader will learn about the variety of tools and attacks used by insiders to commit their crimes including: encryption, steganography, and social engineering. The book will then specifically address the dangers faced by corporations and government agencies. Finally, the reader will learn how to design effective security systems to prevent insider attacks and how to investigate insider security breeches that do occur. Throughout the book, the authors will use their backgrounds in the CIA to analyze several, high-profile cases involving insider threats.
    • How to Cheat at Designing Security for a Windows Server 2003 Network

      • 1st Edition
      • December 15, 2005
      • Chris Peiris + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 2 4 3 0
      • eBook
        9 7 8 0 0 8 0 4 8 8 9 6 7
      Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization’s security needs.
    • How to Cheat at Managing Windows Server Update Services

      • 1st Edition
      • Volume 1
      • December 12, 2005
      • B. Barber
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 2 7 6
      • eBook
        9 7 8 0 0 8 0 4 8 8 9 8 1
      Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft’s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
    • Perfect Password

      • 1st Edition
      • December 11, 2005
      • Mark Burnett
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 4 1 2
      • eBook
        9 7 8 0 0 8 0 4 8 9 5 1 3
      User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember.
    • Handbook of Economic Growth

      • 1st Edition
      • Volume 1B
      • December 9, 2005
      • Philippe Aghion + 1 more
      • English
      • Hardback
        9 7 8 0 4 4 4 5 2 0 4 3 2
      • eBook
        9 7 8 0 0 8 0 4 6 1 1 4 4
      The Handbooks in Economics series continues to provide the various branches of economics with handbooks which are definitive reference sources, suitable for use by professional researchers, advanced graduate students, or by those seeking a teaching supplement. The Handbook of Economic Growth, edited by Philippe Aghion and Steven Durlauf, with an introduction by Robert Solow, features in-depth, authoritative survey articles by the leading economists working on growth theory. Volume 1a, the first in this two volume set, covers theories of economic growth, the empirics of economic growth, and growth policies and mechanisms. Volume 1b, the second in this two volume set, covers technology, trade and geography, and growth and socio-economic development.
    • Handbook of Economic Growth

      • 1st Edition
      • Volume 1A
      • December 9, 2005
      • Philippe Aghion + 1 more
      • English
      • Hardback
        9 7 8 0 4 4 4 5 2 0 4 1 8
      • eBook
        9 7 8 0 0 8 0 4 6 1 1 3 7
      The Handbooks in Economics series continues to provide the various branches of economics with handbooks which are definitive reference sources, suitable for use by professional researchers, advanced graduate students, or by those seeking a teaching supplement.The Handbook of Economic Growth, edited by Philippe Aghion and Steven Durlauf, with an introduction by Robert Solow, features in-depth, authoritative survey articles by the leading economists working on growth theory.Volume 1A, the first in this two volume set, covers theories of economic growth, the empirics of economic growth, and growth policies and mechanisms.Volume 1B, the second in this two volume set, covers technology, trade and geography, and growth and socio-economic development.
    • Handbook of the Psychology of Aging

      • 6th Edition
      • December 9, 2005
      • James E. Birren + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 1 0 1 2 6 5 6
      • eBook
        9 7 8 0 0 8 0 4 5 6 0 7 2
      • eBook
        9 7 8 0 0 8 0 9 1 6 9 0 3
      Handbook of the Psychology of Aging, 6e provides a comprehensive summary and evaluation of recent research on the psychological aspects of aging. The 22 chapters are organized into four divisions: Concepts, Theories, and Methods in the Psychology of Aging; Biological and Social Influences on Aging; Behavioral Processes and Aging; and Complex Behavioral Concepts and Processes in Aging. The 6th edition of the Handbook is considerably changed from the previous edition. Half of the chapters are on new topics and the remaining half are on returning subjects that are entirely new presentations by different authors of new material. Some of the exciting new topics include Contributions of Cognitive Neuroscience to Understanding Behavior and Aging, Everyday Problem Solving and Decision Making, Autobiographical Memory, and Religion and Health Late in Life.The Handbook will be of use to researchers and professional practitioners working with the aged. It is also suitable for use as a textbook for graduate and advanced undergraduate courses on the psychology of aging.The Handbook of the Psycology of Aging, Sixth Edition is part of the Handbooks on Aging series, including Handbook of the Biology of Aging and Handbook of Aging and the Social Sciences, also in their 6th editions.
    • Handbooks in Operations Research and Management Science

      • 1st Edition
      • Volume 12
      • December 8, 2005
      • K. Aardal + 2 more
      • English
      • Hardback
        9 7 8 0 4 4 4 5 1 5 0 7 0
      • eBook
        9 7 8 0 0 8 0 4 5 9 2 1 9
      The chapters of this Handbook volume cover nine main topics that are representative of recenttheoretical and algorithmic developments in the field. In addition to the nine papers that present the state of the art, there is an article on the early history of the field. The handbook will be a useful reference to experts in the field as well as students and others who want to learn about discrete optimization.