Skip to main content

Books in Social sciences and humanities

    • Psychopathology and the Family

      • 1st Edition
      • October 11, 2005
      • Jennifer Hudson + 1 more
      • English
      • Hardback
        9 7 8 0 0 8 0 4 4 4 4 9 9
      • Paperback
        9 7 8 1 4 8 3 2 9 9 6 2 4
      • eBook
        9 7 8 0 0 8 0 5 3 0 1 3 0
      Understanding the factors that place an individual at greater risk of developing psychopathology has important implications for both treatment and prevention of psychological disorders. Of critical relevance in this regard is the exploration of the potential influence of the family. Parenting and the family environment are considered to significantly contribute to a child's early development and adjustment. It follows then that parental behavior may also be of importance in the development, maintenance and or the prevention of psychopathology. Over the past 50 years there has been a considerable amount of research as well as controversy surrounding the link between parenting and psychopathology. The purpose of this book is to provide researchers and clinicians with state-of-the art research findings, presented by experts in the field, on the role of the family in the development and maintenance of psychopathology. This edited book is divided into 3 sections. The first addresses broader issues of theory and methodology and the second provides separate chapters relating to the role of the family in the development and maintenance of specific psychopathologies. A final section discusses the involvement of the family in treatment and prevention.
    • Configuring Check Point NGX VPN-1/Firewall-1

      • 1st Edition
      • October 11, 2005
      • Barry J Stiefel + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 3 1 3
      • eBook
        9 7 8 0 0 8 0 4 8 8 5 6 1
      Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection & Tunnel Management, Multiple Entry Points, Route Injection Mechanism, Wire Mode, and SecurePlatform Pro. Many of the new features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available *and* secure. Demand for this book will be strong because Check Point is requiring all of its 3rd party developers to certify their products for this release.
    • Handbook of Biosurveillance

      • 1st Edition
      • October 7, 2005
      • Michael M. Wagner + 2 more
      • English
      • Hardback
        9 7 8 0 1 2 3 6 9 3 7 8 5
      • Paperback
        9 7 8 1 4 9 3 3 0 0 6 8 6
      • eBook
        9 7 8 0 0 8 0 4 5 9 9 9 8
      Provides a coherent and comprehensive account of the theory and practice of real-time human disease outbreak detection, explicitly recognizing the revolution in practices of infection control and public health surveillance.
    • Contemporary Security Management

      • 2nd Edition
      • October 4, 2005
      • John Fay
      • English
      • Hardback
        9 7 8 0 7 5 0 6 7 9 2 8 2
      • eBook
        9 7 8 0 0 8 0 4 7 6 8 2 7
      Contemporary Security Management, Second Edition, is the most comprehensive and up-to-date security management book available. The book is designed to provide the hard facts on modern practices to efficiently and effectively run a security department. It covers such vital topics as leadership in management, employee relations, risk management and mitigation, terrorism, information security, access control, investigations, substance abuse, workplace violence, and emergency management. New topics covered include terrorism and the post 9/11 government mandate to perform standard vulnerability assessments for various industries. All the chapters have been updated and include the latest trends, technologies, and best practice procedures. Case studies throughout the text provide real-world examples and solutions to management issues. Samples of security plans and procedures, checklists, diagrams and illustrations aid in explaining a wide range of critical concepts. The book serves as an indispensable working tool for students in security management courses, security managers, and other security professionals at all levels of experience.
    • Skype Me! From Single User to Small Enterprise and Beyond

      • 1st Edition
      • October 1, 2005
      • Markus Daehne
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 3 2 0
      • eBook
        9 7 8 0 0 8 0 4 8 9 7 1 1
      This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin making voice over IP calls immediately. Part II deals with the more advanced features of Skype. Here the reader learns how to use Skype on new “Skype Ready” cell phones, use Skype for more advanced, business-oriented tasks such as scheduling and file transfers, as well as using SkypeOut. Part III discusses how to integrate Skype with third party networking, communication, and security devices such as routers, firewalls, and mail servers, as well as using the brand new Skype for Business. Part IV covers the Skype Application Programming Interface, Plug-ins, Add-ons, and third party tools. Here the reader learns to develop and customize their own applications using the new, powerful, Skype API.
    • Accounting, the Social and the Political

      • 1st Edition
      • September 30, 2005
      • Norman B. Macintosh + 1 more
      • English
      • Hardback
        9 7 8 0 0 8 0 4 4 7 2 5 4
      • eBook
        9 7 8 0 0 8 0 5 4 5 0 4 2
      This book contains 35 carefully selected and abridged versions of scholarly financial and managerial research articles by world-class researchers ranging across a wide spectrum of the social, political and philosophical sides of financial and managerial accounting information and practices to focus on accounting's wider role and impact on organizations and society at large.While each article was substantially culled in order to highlight its central findings and its unique approach, care was exercised to maintain the integrity of the authors' work. The result is a collection of readily accessible research including: classics and seminal articles, a selection of more contemporary articles, and recent articles that go beyond the conventional. Thus, the book pushes the boundaries beyond that of conventional accounting thought and research.This anthology will be of interest especially to graduate students since it provides a broad sampling of influential research studies presented in a highly accessible format. It should also be of vital interest to sophisticated practitioners who are concerned about the current state of the accounting world in the wake of the recent cascade of so-called "accounting scandals". The hope also is to help bridge the gap between the practitioners' and the scholarly researchers' Worlds.
    • The Human Bone Manual

      • 1st Edition
      • September 29, 2005
      • Tim D. White + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 0 8 8 4 6 7 4
      • eBook
        9 7 8 0 0 8 0 4 8 8 9 9 8
      Building on the success of their previous book, White and Folkens' The Human Bone Manual is intended for use outside the laboratory and classroom, by professional forensic scientists, anthropologists and researchers. The compact volume includes all the key information needed for identification purposes, including hundreds of photographs designed to show a maximum amount of anatomical information.
    • Business Continuity and Disaster Recovery for InfoSec Managers

      • 1st Edition
      • September 20, 2005
      • John Rittinghouse PhD CISM + 1 more
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 3 9 2
      • eBook
        9 7 8 0 0 8 0 5 2 8 3 3 5
      Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.
    • Marketing Plans for Service Businesses

      • 2nd Edition
      • September 13, 2005
      • Malcolm McDonald + 1 more
      • English
      • Paperback
        9 7 8 0 7 5 0 6 6 7 4 6 3
      • eBook
        9 7 8 0 0 8 0 4 9 2 8 7 2
      Marketing Plans for Service Businesses is based on the successful Marketing Planning for Services, which has been completely overhauled, updated and revised to give a new and authoritative guide to the challenge of creating marketing plans that produce significantly improved bottom-line results. It is written in a pragmatic, action-orientated style and each chapter has examples of marketing planning in practice. The authors highlight key misunderstandings about marketing and the nature of services and relationship marketing.The marketer is taken step-by-step through the key phases of the marketing planning process and alerted to the barriers that can prevent a service organisation being successful in introducing marketing planning. Practical frameworks and techniques are suggested for undertaking the marketing planning process and implementing the principles covered. The world renowned authors also tackle key organisational aspects relating to marketing planning which can have a profound impact on its ultimate effectiveness. These include: marketing intelligence systems; market research; organisation development stages; marketing orientation. Marketing Planning for Services is for marketers in the service sector and students of marketing.With revised cases and new content covering gap analysis, market mapping, CRM and integrated marketing communications it will be an essential guide for professional marketers in the service sector a well as upper level students.
    • Advanced Derivatives Pricing and Risk Management

      • 1st Edition
      • September 8, 2005
      • Claudio Albanese + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 8 8 0 9 7
      Advanced Derivatives Pricing and Risk Management covers the most important and cutting-edge topics in financial derivatives pricing and risk management, striking a fine balance between theory and practice. The book contains a wide spectrum of problems, worked-out solutions, detailed methodologies, and applied mathematical techniques for which anyone planning to make a serious career in quantitative finance must master. In fact, core portions of the book’s material originated and evolved after years of classroom lectures and computer laboratory courses taught in a world-renowned professional Master’s program in mathematical finance. The book is designed for students in finance programs, particularly financial engineering.