Skip to main content

Books in Social sciences and humanities

    • Stealing the Network: How to Own an Identity

      • 1st Edition
      • July 1, 2005
      • Ryan Russell + 5 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 0 6 1
      • eBook
        9 7 8 0 0 8 0 5 1 7 7 4 2
      The first two books in this series “Stealing the Network: How to Own the Box” and “Stealing the Network: How to Own a Continent” have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.
    • Knowledge-Based Working

      • 1st Edition
      • June 30, 2005
      • Steve Ellis
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 1 2 0 8
      • Hardback
        9 7 8 1 8 4 3 3 4 1 2 1 5
      • eBook
        9 7 8 1 7 8 0 6 3 1 9 4 3
      Covers the priorities and challenges facing organisations who are increasingly focused on ‘knowledge work’; it is written from a human relations – rather than a technological - perspective. It uses real cases, backed up by evidence and analysis from a detailed study into strategic knowledge based working (KBW). The content of the book draws on two chief sources: the author’s own expertise in KBW developed over five years of blue chip KBW consultancy, and the results of a previously unpublished five year study. The book offers clear, step-by-step guidance to executives who need to understand, deploy and implement KBW.
    • Competition and Variation in Natural Languages

      • 1st Edition
      • June 30, 2005
      • Mengistu Amberber + 1 more
      • English
      • Hardback
        9 7 8 0 0 8 0 4 4 6 5 1 6
      • Paperback
        9 7 8 0 0 8 0 9 7 3 2 8 9
      • eBook
        9 7 8 0 0 8 0 4 5 9 7 7 6
      This volume combines different perspectives on case-marking: (1) typological and descriptive approaches of various types and instances of case-marking in the languages of the world as well as comparison with languages that express similar types of relations without morphological case-marking; (2) formal analyses in different theoretical frameworks of the syntactic, semantic, and morphological properties of case-marking; (3) a historical approach of case-marking; (4) a psycholinguistic approach of case-marking. Although there are a number of publications on case related issues, there is no volume such as the present one, which exclusively looks at case marking, competition and variation from a cross-linguistic perspective and within the context of different contemporary theoretical approaches to the study of language. In addition to chapters with broad conceptual orientation, the volume offers detailed empirical studies of case in a number of diverse languages including: Amharic, Basque, Dutch, Hindi, Japanese, Kuuk Thaayorre, Malagasy and Yurakaré.The volume will be of interest to researchers and advanced students in the cognitive sciences, general linguistics, typology, historical linguistics, formal linguistics, and psycholinguistics. The book will interest scholars working within the context of formal syntactic and semantic theories as it provides insight into the properties of case from a cross-linguistic perspective. The book also will be of interest to cognitive scientists interested in the relationship between meaning and grammar, in particular, and the human mind's capacity in the mapping of meaning onto grammar, in general.
    • RFID Security

      • 1st Edition
      • June 23, 2005
      • Frank Thornton + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 4 7 4
      • eBook
        9 7 8 0 0 8 0 4 8 9 6 5 0
      RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a hacker to lower the pricing on any product products). How to protect the supply chain (malicous/mischievou... hackers can delete/alter/modify all identifying information for an entire shipment of products). How to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits).The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, colour, date of purchase, etc. .
    • Advances in Child Development and Behavior

      • 1st Edition
      • Volume 33
      • June 23, 2005
      • English
      • Hardback
        9 7 8 0 1 2 0 0 9 7 3 3 3
      • Paperback
        9 7 8 0 1 2 3 9 9 5 1 5 5
      • eBook
        9 7 8 0 0 8 0 4 5 9 3 0 1
      The Advances in Child Behavior and Development series has a well-deserved reputation for publishing seminal articles that move established programs of developmental scholarship forward in creative new directions. Consistent with this reputation, the articles in Volume 33 of the series offer ground-breaking work on topics as diverse as children's problem-solving strategies, intentionality, mathematical reasoning, and socialization within and beyond school settings. Although the substantive topics differ, what unites the contributions are their uniformly high level of scholarship, creativity, theoretical sophistication, and attention to developmental processes. The volume is thus valuable not only to scholars with interests in the specialized topics covered in the articles, but also to anyone interested in learning about developmental mechanisms, and thus to anyone interested in promoting developmental outcomes in both cognitive and social domains. Lynn S. Liben, Distinguished Professor of Psychology, Pennsylvania State University, USAAdvances in Child Development and Behavior is designed to provide scholarly technical articles and speculation. In these critical reviews, recent advances in the field are summarized and integrated, complexities are exposed, and fresh viewpoints are offered. Contributors are encouraged to criticize, integrate, and stimulate, but always within a framework of high scholarship. These reviews should be useful not only to the expert in the area but also to the general reader.
    • IM Instant Messaging Security

      • 1st Edition
      • June 15, 2005
      • John Rittinghouse PhD CISM + 1 more
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 3 8 5
      • eBook
        9 7 8 0 0 8 0 4 6 0 7 2 7
      There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today’s corporate environment.
    • Shipping Economics

      • 1st Edition
      • Volume 12
      • June 15, 2005
      • Kevin Cullinane
      • English
      • Hardback
        9 7 8 0 7 6 2 3 1 1 7 7 4
      • Paperback
        9 7 8 1 4 9 3 3 0 3 3 1 1
      • eBook
        9 7 8 0 0 8 0 4 5 6 8 0 5
      Shipping is by far the most significant mode of transportation for the carriage of freight. In terms of volume alone, no other mode comes close. Its dominance is even more overwhelming when distances are accounted for. This book is concerned with the economics of this pivotal mode of transportation. It reveals that the influences on the development and current state of shipping economics research are extremely eclectic. The various chapters in the book represent areas that are of central concern to ongoing research in the field. As such, the book is useful to students, researchers, industrialists, policy makers and consultants. The authors of the contributed chapters are some of the leading names in the world of shipping economics, addressing a number of diverse areas: The econometric modeling of shipping markets; Shipping finance (a critical issue in such a capital intensive industry); Fiscal policy (and its impact on an international industry with great asset mobility) and Safety and security (aspects that have risen to prominence with increasing concerns over the environment and international terrorism). Ultimately, while shipping as a business depends upon trade, it is absolutely certain that the business of trade depends upon shipping. The final two chapters, therefore, incorporate aspects of network economics, welfare economics and international trade theory to analyze where and how shipping sits within the wider perspective of industrial supply chains.Professor Kevin Cullinane, BA BSc MSc PhD FCILT CNIProfessor Kevin Cullinane is Chair in Marine Transport and Management at the University of Newcastle in the U.K. He was previously Professor and Head of the Department of Shipping and Transport Logistics at the Hong Kong Polytechnic University, Head of the Centre for International Shipping and Transport at Plymouth University, Senior Partner in his own transport consultancy company and Research Fellow at the University of Oxford Transport Studies Unit. He is a Fellow of the Chartered Institute of Logistics and Transport and has been a transport adviser to the governments of Hong Kong, Egypt, Chile and the U.K. He holds visiting Professorships at a number of institutions and an Honorary Professorship at the University of Hong Kong.
    • BioIndustry Ethics

      • 1st Edition
      • June 10, 2005
      • David L. Finegold + 7 more
      • English
      • Paperback
        9 7 8 0 1 2 3 6 9 3 7 0 9
      • eBook
        9 7 8 0 0 8 0 4 9 2 5 1 3
      This book is the first systematic, detailed treatment of the approaches to ethical issues taken by biotech and pharmaceutical companies. The application of genetic/genomic technologies raises a whole spectrum of ethical questions affecting global health that must be addressed. Topics covered in this comprehensive survey include considerations for bioprospecting in transgenics, genomics, drug discovery, and nutrigenomics, as well as how to improve stakeholder relations, design ethical clinical trials, avoid conflicts of interest, and establish ethics advisory boards. The expert authors represent multiple disciplines including law, medicine, bioinformatics, pharmaceutics, business, and ethics.
    • Global Competition in Transportation Markets

      • 1st Edition
      • Volume 13
      • June 10, 2005
      • Adib Kanafani + 1 more
      • English
      • Hardback
        9 7 8 0 7 6 2 3 1 2 0 4 7
      • eBook
        9 7 8 0 0 8 0 4 6 0 4 4 4
      This book represents the proceedings of a conference held at KobeUniversity, that brought together some of the world's leading researchers in the field oftransportation planning and policy.It contains a compendium of papers representing state-of-the-art researchon topics of competition and regulation and system structure in air and maritimetransportati... This book is a valuable resource for researchers and others who can use it as a starting point for advancing the state of knowledge in important topics of transportation systems management. It can also serve as a textbook for an advanced graduate course in transportation, economics, or public policy as applied to maritime transportation and air transportation. As such it is the first text of its kind.
    • Traffic and Transport Psychology

      • 1st Edition
      • June 9, 2005
      • Geoffrey Underwood
      • English
      • Paperback
        9 7 8 0 4 4 4 5 4 4 7 2 8
      • Hardback
        9 7 8 0 0 8 0 4 4 3 7 9 9
      • eBook
        9 7 8 0 0 8 0 5 5 0 7 9 4
      Just as our transport systems become more and more important to our economic and social well-being, so they become more and more crowded and more at risk from congestion, disruption, and collapse. Technology and engineering can provide part of the solution, but the complete solution will need to take account of the behaviour of the users of the transport networks. The role of psychologists in this is to understand how people make decisions about the alternative modes of transport and about the alternative routes to their destinations, to understand how novice and other vulnerable users can develop safe and effective behaviours, how competent users can operate within the transport system optimally and within their perceptual and cognitive limitations. The contributions to this volume address these issues of how the use of our transport systems can be improved by taking into account knowledge of the behaviour of the people who use the systems. Topics discussed include driver training and licensing, driver impairment, road user attitudes and behaviour, enforcement and behaviour change, driver support systems, and the psychology of mobility and transport mode choice.This work will be of value not only to psychologists but to all transport professionals interested in the application of psychology to traffic.