Skip to main content

Books in Social sciences and humanities

  • Effective Interviewing and Interrogation Techniques

    • 2nd Edition
    • Nathan J. Gordon + 1 more
    • English
    Effective Interviewing and Interrogation Techniques, Second Edition, is completely revised and updated so as to cover all the information a student needs to know to obtain answers from a witness, a victim, or a suspect and how to interpret these answers with the utmost accuracy. Building on the previous edition’s ground-breaking search for truth in criminal and non-criminal investigations, this book contains five new chapters which include coverage of false confessions, interviewing the mentally challenged, and the ethics of interrogation in a post 9/11 world. This new edition includes highly illustrated chapters with topics ranging from the psycho-physiological basis of the forensic assessment to preparation for the interview/interrogat... question formulation; projective analysis of unwitting verbal clues; interviewing children and the mentally challenged; and pre-employment interviewing. Also included are several model worksheets and documents, case studies, and complete instructions for using the authors’ Integrated Interrogation Technique, a 10-point, highly successful approach to obtaining confessions that can stand up in court. The book concludes with an insightful look at the future of truth verification. This book will be of benefit to attorneys, coroners, detectives, educators, forensic psychophysiologists (lie detection), human resource professionals, intelligence professionals, and investigators as well as journalists/authors, jurists, medical professionals, psychological professionals, researchers, and students.
  • Writing Security Tools and Exploits

    • 1st Edition
    • James C Foster
    • English
    Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
  • The Science of Hysteresis

    Volume 1 of 3-volume set
    • 1st Edition
    • Bozzano G Luisa
    • English
  • Handbook of the Biology of Aging

    • 6th Edition
    • Edward J. Masoro + 1 more
    • English
    The Handbook of the Biology of Aging, Sixth Edition, provides a comprehensive overview of the latest research findings in the biology of aging. Intended as a summary for researchers, it is also adopted as a high level textbook for graduate and upper level undergraduate courses. The Sixth Edition is 20% larger than the Fifth Edition, with 21 chapters summarizing the latest findings in research on the biology of aging. The content of the work is virtually 100% new. Though a selected few topics are similar to the Fifth Edition, these chapters are authored by new contributors with new information. The majority of the chapters are completely new in both content and authorship. The Sixth Edition places greater emphasis and coverage on competing and complementary theories of aging, broadening the discussion of conceptual issues. Greater coverage of techniques used to study biological issues of aging include computer modeling, gene profiling, and demographic analyses. Coverage of research on Drosophilia is expanded from one chapter to four. New chapters on mammalian models discuss aging in relation to skeletal muscles, body fat and carbohydrate metabolism, growth hormone, and the human female reproductive system. Additional new chapters summarize exciting research on stem cells and cancer, dietary restriction, and whether age related diseases are an integral part of aging. The Handbook of the Biology of Aging, Sixth Edition is part of the Handbooks on Aging series, including Handbook of the Psychology of Aging and Handbook of Aging and the Social Sciences, also in their 6th editions.
  • Leadership

    Project and Human Capital Management
    • 1st Edition
    • John McManus
    • English
    Success in project management requires the project manager to operate at many levels and deal with a myriad of internal and external stakeholders. Leadership in the project management requires the vision, ability and courage to guide individuals and teams to rewarding experiences. Project Managers often expect to achieve a great deal, but need to realise they can achieve little without the efforts of others. This book focuses on the complexity and issues of leadership in project management. The book provides: * assist project managers in their understanding of what leadership is and how leadership influences the outcome of project success * demonstrate how empowerment can be used to achieve results and positive project outcomes * demonstrate how to engage and influence others to achieve project goals * define the theoretical and practical boundaries of decision making within the context of multiple stakeholder projects * provide an insight into what it takes to build high performance project teams * provide a communication taxonomy for managing multiple stakeholders and demonstrates how conflict should be managed
  • Demography: Analysis and Synthesis, Four Volume Set

    A Treatise in Population
    • 1st Edition
    • Graziella Caselli + 2 more
    • English
    This four-volume collection of over 140 original chapters covers virtually everything of interest to demographers, sociologists, and others. Over 100 authors present population subjects in ways that provoke thinking and lead to the creation of new perspectives, not just facts and equations to be memorized. The articles follow a theory-methods-appli... approach and so offer a kind of "one-stop shop" that is well suited for students and professors who need non-technical summaries, such as political scientists, public affairs specialists, and others. Unlike shorter handbooks, Demography: Analysis and Synthesis offers a long overdue, thorough treatment of the field.Choosing the analytical method that fits the data and the situation requires insights that the authors and editors of Demography: Analysis and Synthesis have explored and developed. This extended examination of demographic tools not only seeks to explain the analytical tools themselves, but also the relationships between general population dynamics and their natural, economic, social, political, and cultural environments. Limiting themselves to human populations only, the authors and editors cover subjects that range from the core building blocks of population change--fertility, mortality, and migration--to the consequences of demographic changes in the biological and health fields, population theories and doctrines, observation systems, and the teaching of demography. The international perspectives brought to these subjects is vital for those who want an unbiased, rounded overview of these complex, multifaceted subjects. Topics to be covered:* Population Dynamics and the Relationship Between Population Growth and Structure* The Determinants of Fertility* The Determinants of Mortality* The Determinants of Migration* Historical and Geographical Determinants of Population* The Effects of Population on Health, Economics, Culture, and the Environment* Population Policies* Data Collection Methods and Teaching about Population Studies
  • Shooting Incident Reconstruction

    • 1st Edition
    • Lucien C. Haag
    • English
    Shooting Incident Reconstruction is based on the authors' numerous years of conducting courses and seminars on the subject of shooting incident reconstruction. It seeks to thoroughly address matters from simple to complex in order to provide the reader with an explanation of the factors surrounding ballistics, trajectory, and shooting scenes. The ultimate objectives of this unique book are to assist investigators, crime scene analysts, pathologists, ballistics experts, and lawyers to understand the terminology, science, and factors involved in reconstructing shooting incident events to solve forensic cases. The book covers a full range of related topics, including the range from which a firearm was discharged; the sequence of shots in a multiple discharge shooting incident; the position of a firearm at the moment of discharge; the position of a victim at the moment of impact; the probable flight path of a projectile; the manner by which a firearm was discharged, and much more. It contains over 100 diagrams and photographs, many in full-color, that support and illustrate key concepts.
  • How to Cheat at Designing Security for a Windows Server 2003 Network

    • 1st Edition
    • Chris Peiris + 1 more
    • English
    Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization’s security needs.
  • Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

    • 1st Edition
    • Eric Cole + 1 more
    • English
    The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified “Insider Threats” as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely to pose a threat. Next, the reader will learn about the variety of tools and attacks used by insiders to commit their crimes including: encryption, steganography, and social engineering. The book will then specifically address the dangers faced by corporations and government agencies. Finally, the reader will learn how to design effective security systems to prevent insider attacks and how to investigate insider security breeches that do occur. Throughout the book, the authors will use their backgrounds in the CIA to analyze several, high-profile cases involving insider threats.
  • How to Cheat at Managing Windows Server Update Services

    • 1st Edition
    • Volume 1
    • B. Barber
    • English
    Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft’s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.