Skip to main content

Books in Social sciences and humanities

    • Microsoft Log Parser Toolkit

      • 1st Edition
      • February 10, 2005
      • Gabriele Giuseppini + 1 more
      • English
      • Paperback
        9 7 8 1 9 3 2 2 6 6 5 2 8
      • eBook
        9 7 8 0 0 8 0 4 8 9 3 9 1
      Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products. System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and hardware devices (firewalls, routers, etc.) that generate incredibly long and detailed log files of all activity on the particular application or device. This book will teach administrators how to use Microsoft's Log Parser to data mine all of the information available within these countless logs. The book teaches readers how all queries within Log Parser work (for example: a Log Parser query to an Exchange log may provide information on the origin of spam, viruses, etc.). Also, Log Parser is completely scriptable and customizable so the book will provide the reader with hundreds of original, working scripts that will automate these tasks and provide formatted charts and reports detailing the results of the queries.
    • Forensic DNA Typing

      • 2nd Edition
      • February 8, 2005
      • John M. Butler
      • English
      • Hardback
        9 7 8 0 1 2 1 4 7 9 5 2 7
      • eBook
        9 7 8 0 0 8 0 4 7 0 6 1 0
      Forensic DNA Typing, Second Edition, is the only book available that specifically covers detailed information on mitochondrial DNA and the Y chromosome. It examines the science of current forensic DNA typing methods by focusing on the biology, technology, and genetic interpretation of short tandem repeat (STR) markers, which encompass the most common forensic DNA analysis methods used today. The book covers topics from introductory level right up to cutting edge research. High-profile cases are addressed throughout the text, near the sections dealing with the science or issues behind these cases. Ten new chapters have been added to accommodate the explosion of new information since the turn of the century. These additional chapters cover statistical genetic analysis of DNA data, an emerging field of interest to DNA research. Several chapters on statistical analysis of short tandem repeat (STR) typing data have been contributed by Dr. George Carmody, a well-respected professor in forensic genetics. Specific examples make the concepts of population genetics more understandable. This book will be of interest to researchers and practitioners in forensic DNA analysis, forensic scientists, population geneticists, military and private and public forensic laboratories (for identifying individuals through remains), and students of forensic science.
    • A Behavioral Approach to Asset Pricing

      • 1st Edition
      • February 3, 2005
      • Hersh Shefrin
      • English
      • Hardback
        9 7 8 0 1 2 6 3 9 3 7 1 2
      • eBook
        9 7 8 0 0 8 0 4 7 6 0 3 2
      A Behavioral Approach to Asset Pricing Theory examines the reigning assumptions of asset pricing theory and reconstructs them to incorporate findings from behavioral finance. It constructs a solid, intact structure that challenges classic assumptions and at the same time provides a strong theory and efficient empirical tools. Building on the models developed by both traditional asset pricing theorists and behavioral asset pricing theorists, this book takes the discussion to the next step. The author provides a general behaviorally based intertemporal treatment of asset pricing theory that extends to the discussion of derivatives, fixed income securities, mean-variance efficient portfolios, and the market portfolio.The book develops a series of examples to illustrate the theoretical results. The CD-ROM contains most of the examples, worked out as Excel spreadsheets, so that a diligent reader can follow them through.Instructors might also want to use the examples to assign class exercises, asking students to modify the numbers and see what happens.
    • Private Real Estate Investment

      • 1st Edition
      • February 3, 2005
      • Roger J. Brown
      • English
      • Paperback
        9 7 8 0 1 2 3 9 1 1 1 7 9
      • eBook
        9 7 8 0 0 8 0 4 8 0 3 6 7
      Fiduciary responsibilities and related court-imposed liabilities have forced investors to assess market conditions beyond gut level, resulting in the development of sophisticated decision-making tools. Roger Brown's use of historical real estate data enables him to develop tools for gauging the impact of circumstances on relative risk. His application of higher level statistical modeling to various aspects of real estate makes this book an essential partner in real estate research. Offering tools to enhance decision-making for consumers and researchers in market economies of any country interested in land use and real estate investment, his book will improve real estate market efficiency. With property the world's biggest asset class, timely data on housing prices just got easier to find and use.
    • Classification in Theory and Practice

      • 1st Edition
      • January 31, 2005
      • Susan Batley
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 0 8 3 6
      • Hardback
        9 7 8 1 8 4 3 3 4 0 9 4 2
      • eBook
        9 7 8 1 7 8 0 6 3 0 7 4 8
      This book covers all of the major library classification schemes in use in Europe, UK and US; it includes practical exercises to demonstrate their application. Importantly, classifying electronic resources is also discussed. The aim of the book is to demystify a very complex subject, and to provide a sound theoretical underpinning, together with practical advice and development of practical skills. The book fills the gap between more complex theoretical texts and those books with a purely practical approach. Chapters concentrate purely on classification rather than cataloguing and indexing, ensuring a more in-depth coverage of the topic.
    • Information Literacy

      • 1st Edition
      • January 31, 2005
      • Susie Andretta
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 0 6 5 2
      • Hardback
        9 7 8 1 8 4 3 3 4 0 6 6 9
      • eBook
        9 7 8 1 7 8 0 6 3 0 7 5 5
      Taking an international approach, this book explores two main models of Information Literacy or IL: the SCONUL (Society of College, National and University Libraries) Seven Pillars of Information Skills and the IL competencies identified by the ALA (American Library Association). Practical examples for the development of IL skills identified by these models are illustrated using printed and web-based resources. The process of integrating IL provision within a programme of study is outlined to illustrate two strategies underpinning this integration at generic-skills level, the ‘plug & play’ approach, and at subject-specific level, the ‘research skills approach’. A range of diagnostic and assessment methods, to monitor the iterative process of IL skills development, are also presented within these frameworks.
    • Buffer Overflow Attacks

      • 1st Edition
      • January 29, 2005
      • Jason Deckard
      • English
      • Paperback
        9 7 8 1 9 3 2 2 6 6 6 7 2
      • eBook
        9 7 8 0 0 8 0 4 8 8 4 2 4
      The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim’s machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
    • Essentials of Medical Geology

      • 1st Edition
      • January 25, 2005
      • Olle Selinus
      • English
      • Hardback
        9 7 8 0 1 2 6 3 6 3 4 1 8
      • eBook
        9 7 8 0 0 8 0 4 5 4 1 9 1
      This authoritative reference volume emphasizes the importance and interrelationships of geological processes to the health and diseases of humans and animals. Its accessible format fosters better communication between the health and geoscience communities by elucidating the geologic origins and flow of toxic elements in the environment that lead to human exposure through the consumption of food and water. For example, problems of excess intake from drinking water have been encountered for several inorganic compounds, including fluoride in Africa and India; arsenic in certain areas of Argentina, Chile, and Taiwan; selenium in seleniferous areas in the U.S., Venezuela, and China; and nitrate in agricultural areas with heavy use of fertilizers. Environmental influences on vector borne diseases and stormflow water quality influences are also featured. Numerous examples of the environmental influences on human health from across the globe are also presented and discussed in this volume.
    • Elsevier's Dictionary of Herpetological and Related Terminology

      • 1st Edition
      • January 19, 2005
      • D.C. Wareham
      • English
      • Paperback
        9 7 8 0 4 4 4 5 4 7 5 9 0
      • Hardback
        9 7 8 0 4 4 4 5 1 8 6 3 7
      • eBook
        9 7 8 0 0 8 0 4 6 0 1 7 8
      The dictionary is a compilation of clear, concise and informative definitions of the characteristic vocabulary commonly encountered and used by herpetologists when discussing, reading, or writing about reptiles and amphibians. It is intended for all those who have an interest in these animals, from the amateur hobbyist who may find himself faced with what can be a rather intimidating scientific term or technical expression, to the trained zoologist who may sometimes have doubts over the exact meaning of a particular term. It will, it is hoped, not only be a useful source of reference to all who are either actively or passively involved in some aspects of herpetology whether they be keepers, curators, breeders, researchers, teachers or students, but an interesting read as well.
    • Interurban Road Charging for Trucks in Europe

      • 1st Edition
      • Volume 11
      • January 19, 2005
      • Jose Viegas
      • English
      • Hardback
        9 7 8 0 7 6 2 3 1 1 4 2 2
      • eBook
        9 7 8 0 0 8 0 4 5 6 6 6 9
      Charging for the use of transport infrastructure has very different traditions in the various modes, reflecting the different nature of their infrastructure (nodal vs. linear), but also different historical traditions of open access, system integration, etc.Since the early 90's various European Commission initiatives took on this issue, looking mainly at the road sector, where many countries had no (direct) access charges. Heavy goods vehicles were systematically identified as the primary targets for a renewed approach to this problem.What seemed an easy catch has proved to be much harder, with the various countries adopting almost exclusively national approaches, and the European institutions unable to drive the process.This book looks at the challenges posed by this objective, recognising that there are multiple objectives for application of road tolls and charges, and discussing the various possible solutions, in the technical, institutional and legal dimensions. The multiplicity of national situations in Europe is put in perspective, the impacts of various charging schemes on regional development and on the environment are estimated, and the recent policy process is analysed, allowing a global view of the remaining difficulties and to make recommendations about the next steps in the process.