Skip to main content

Books in Social sciences and humanities

    • Advances in Experimental Social Psychology

      • 1st Edition
      • Volume 37
      • March 22, 2005
      • Mark P. Zanna
      • English
      • Paperback
        9 7 8 0 1 2 3 9 9 2 9 8 7
      • Hardback
        9 7 8 0 1 2 0 1 5 2 3 7 7
      • eBook
        9 7 8 0 0 8 0 4 9 0 0 4 5
      Advances in Experimental Social Psychology continues to be one of the most sought after and most often cited series in this field. Containing contributions of major empirical and theoretical interest, this series represents the best and the brightest in new research, theory, and practice in social psychology.
    • Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

      • 1st Edition
      • March 15, 2005
      • Eric Cole + 3 more
      • English
      • Paperback
        9 7 8 1 9 3 1 8 3 6 4 1 8
      • eBook
        9 7 8 0 0 8 0 4 8 8 6 5 3
      Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.
    • Risk Management for Computer Security

      • 1st Edition
      • March 15, 2005
      • Andy Jones + 1 more
      • English
      • Paperback
        9 7 8 0 7 5 0 6 7 7 9 5 0
      • eBook
        9 7 8 0 0 8 0 4 9 1 5 5 4
      Risk Management for Computer Security provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. The book covers more than just the fundamental elements that make up a good risk program for computer security. It presents an integrated how-to approach to implementing a corporate program, complete with tested methods and processes, flowcharts, and checklists that can be used by the reader and immediately implemented into a computer and overall corporate security program. The challenges are many and this book will help professionals in meeting their challenges as we progress through the twenty-first century. This book is organized into five sections. Section I introduces the reader to the theories of risk management and describes the field's changing environment as well as the art of managing risks. Section II deals with threat assessment and its input to risk assessment; topics covered include the threat assessment method and an example of threat assessment. Section III focuses on operating system vulnerabilities and discusses application vulnerabilities; public domain vs. COTS; and connectivity and dependence. Section IV explains what risk assessment is and Section V explores qualitative vs. quantitative tools and types of risk assessment and concludes with an assessment of the future of risk management. Corporate security professionals around the world will find this book a highly valuable source of information.
    • Due Diligence and Corporate Governance

      • 1st Edition
      • March 7, 2005
      • Linda S Spedding
      • English
      • Paperback
        9 7 8 0 7 5 4 5 2 6 2 2 3
      • eBook
        9 7 8 0 0 8 0 5 0 4 7 8 0
      Due Diligence and Corporate Governance is a general guide to a subject of growing importance. This handbook shows you how due diligence is used to assess the risk of any transaction, customer or investor for all businesses regardless of size or location. With its diverse coverage and focus on the practical uses of due diligence, combined with explanations and illustrations of best practice by case studies, diagrams and checklists, this book is the essential guide for all those involved in corporate transactions and risk management. This handbook provides a broad introductory guide to due diligence. It examines due diligence in the context of risk management and corporate governance in a straightforward, comprehensive and practical manner. Case studies are used to illustrate business users, and checklists are included to monitor risk management. The book also offers insights into comparative corporate governance framework. This book will be a valuable resource for directors; finance professionals; company secretaries; risk officers; consultants; and compliance officers.
    • Empirical Methods for Evaluating Educational Interventions

      • 1st Edition
      • March 7, 2005
      • Gary D. Phye + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 9 9 5 9 8 8
      • Hardback
        9 7 8 0 1 2 5 5 4 2 5 7 9
      • eBook
        9 7 8 0 0 8 0 4 5 5 2 3 5
      New US government requirements state that federally funded grants and school programs must prove that they are based on scientifically proved improvements in teaching and learning. All new grants must show they are based on scientifically sound research to be funded, and budgets to schools must likewise show that they are based on scientifically sound research. However, the movement in education over the past several years has been toward qualitative rather than quantitative measures. The new legislation comes at a time when researchers are ill trained to measure results or even to frame questions in an empirical way, and when school administrators and teachers are no longer remember or were never trained to prove statistically that their programs are effective.Experiment... Methods for Evaluating Educational Interventions is a tutorial on what it means to frame a question in an empirical manner, how one needs to test that a method works, what statistics one uses to measure effectiveness, and how to document these findings in a way so as to be compliant with new empirically based requirements. The book is simplistic enough to be accessible to those teaching and administrative educational professionals long out of schooling, but comprehensive and sophisticated enough to be of use to researchers who know experimental design and statistics but don't know how to use what they know to write acceptable grant proposals or to get governmental funding for their programs.
    • Intrusion Prevention and Active Response

      • 1st Edition
      • March 4, 2005
      • Michael Rash + 2 more
      • English
      • Paperback
        9 7 8 1 9 3 2 2 6 6 4 7 4
      • eBook
        9 7 8 0 0 8 0 4 8 9 2 9 2
      Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims.
    • Law, Libraries and Technology

      • 1st Edition
      • February 28, 2005
      • Mark Van Hoorebeek
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 0 7 2 0
      • Paperback
        9 7 8 1 8 4 3 3 4 0 7 1 3
      • eBook
        9 7 8 1 7 8 0 6 3 0 7 6 2
      Libraries are continuing to evolve as a result of the dual pressures of technology and user access. The new digital media forms are enabling librarians to find new methods of information delivery. Libraries and librarians need to be aware of the legal ramifications of the new technologies that are available. This book provides an authoritative and practical guide to the subject. Despite the negative prognosis for libraries during the early 1990s in the face of digital technology, libraries have proved to be surprisingly resilient, and have begun the long process of incorporating digital technologies into their service. The legal ramifications, however, always need to be considered. This book does just that.
    • Globalisation, Information and Libraries

      • 1st Edition
      • February 28, 2005
      • Ruth Rikowski
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 0 9 2 8
      • Paperback
        9 7 8 1 8 4 3 3 4 0 8 4 3
      • eBook
        9 7 8 1 7 8 0 6 3 0 7 7 9
      This book provides an overview of the World Trade Organisation; in particular, it focuses on two of the agreements being developed at the WTO, which are due to be strengthened in 2005, and are likely to have significant implications for libraries and information: the General Agreement on Trade in Services (the GATS) and the Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS). The book argues that the library and information profession needs to be more aware of these agreements and the way in which they threaten some of the professional ethics and principles (such as the balance in copyright).
    • Aggressive Network Self-Defense

      • 1st Edition
      • February 12, 2005
      • Neil R. Wyler
      • English
      • Paperback
        9 7 8 1 9 3 1 8 3 6 2 0 3
      • eBook
        9 7 8 0 0 8 0 4 8 8 2 9 5
      Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker.
    • Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services

      • 1st Edition
      • February 12, 2005
      • Melissa Craft
      • English
      • Paperback
        9 7 8 1 9 3 2 2 6 6 5 0 4
      • eBook
        9 7 8 0 0 8 0 4 8 8 6 9 1
      Almost 100% of all Fortune 500 and Fortune 1000 companies use Citrix. Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services covers the new release to Citrix MetaFrame and how companies can deploy it in their disaster recovery plans. Server Based Computing has been established as a solid networking model for any size business. Why? Because it guarantees cost savings, fast deployment, scalability, performance, security and fast recoverability. Think "mainframe," but updated, pretty, shiny, and effective! Server based computing is the mainframe with a vengeance. Terminal Server and Citrix MetaFrame offer the advantages of the old mainframe coupled with the benefits, gadgets, and appeal of the personal computer.