Skip to main content

Books in Social sciences and humanities

  • The Psychology of Media and Politics

    • 1st Edition
    • George Comstock + 1 more
    • English
    Research indicates that people discount their own opinions and experiences in favor of those of "experts" as espoused in the media. The framing of news coverage thus has a profound impact on public opinion, and political decision making as a response to public outcry. However, the choice of how to frame the news is typically made to solicit viewership and high ratings rather than to convey accurate and meaningful information. The Psychology of Media and Politics discusses why people discount their own opinions, how the media shapes the news, when this drives political decision making, and what the effect is on the future of society. Issues addressed include: How powerful are the media in shaping political beliefs/judgment? How has this power changed in recent years? How does media influence voting behavior? To what extent do media opinions affect political decision making?
  • Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

    • 1st Edition
    • James C Foster
    • English
    The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding – The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets – The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same – communication over TCP and UDP, sockets are implemented differently in nearly ever language. 3. Shellcode – Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access. 4. Porting – Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not “recreate the wheel.”5. Coding Tools – The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.
  • Software Piracy Exposed

    • 1st Edition
    • Ron Honick
    • English
    This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out.
  • Cisco PIX Firewalls

    Configure / Manage / Troubleshoot
    • 1st Edition
    • Umer Khan
    • English
    Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX Firewall configuration. With the market for PIX Firewalls maintaining double digit growth and several major enhancements to both the PIX Firewall and VPN Client product lines, this book will have enormous appeal with the audience already familiar with his first book.
  • Innovation Happens Elsewhere

    Open Source as Business Strategy
    • 1st Edition
    • Ron Goldman + 2 more
    • English
    It's a plain fact: regardless of how smart, creative, and innovative your organization is, there are more smart, creative, and innovative people outside your organization than inside. Open source offers the possibility of bringing more innovation into your business by building a creative community that reaches beyond the barriers of the business. The key is developing a web-driven community where new types of collaboration and creativity can flourish. Since 1998 Ron Goldman and Richard Gabriel have been helping groups at Sun Microsystems understand open source and advising them on how to build successful communities around open source projects. In this book the authors present lessons learned from their own experiences with open source, as well as those from other well-known projects such as Linux, Apache, and Mozilla.
  • Forensic Pathology

    Principles and Practice
    • 1st Edition
    • David Dolinak + 2 more
    • English
    Forensic Pathology is a comprehensive reference that uses a case-oriented format to address, explain and guide the reader through the varied topics encountered by forensic pathologists. Developed in response to a severe void in the literature, the book addresses topics ranging from medicolegal investigation of death to death scene investigation, forensic autopsy, and artifacts of resuscitation as well as complications of medical therapy, forensic osteology, forensic odontology, forensic photography, and death certification. The book includes various types of cases, including sudden natural death, asphyxia, motor vehicle collisions, death in custody, child abuse and elder abuse, acute psychiatric and emotional deaths, and pregnancy. It contains sample descriptions of pathological lesions which serve to aid pathologists in reporting their findings to law enforcement agencies, attorneys, and others involved in investigations of sudden death. The concepts outlined in the text are beautifully illustrated by large, colorful photographs. There are also "Do and Don’t" sections at the end of each chapter that provide guidance for handling the types of cases examined. This work will benefit not only experienced forensic pathologists, but also hospital pathologists who occasionally performs medicolegal autopsies; doctors in training; medical examiners; law enforcement personnel; crime scene investigators; attorneys; and fellows and students of the medical sciences.
  • CCTV

    Networking and Digital Technology
    • 2nd Edition
    • Vlado Damjanovski
    • English
    Closed circuit television (CCTV) is experiencing a leap in technology using digital techniques, networking and the Internet. The new edition of this high-level professional reference retains the particulars that made the first edition a success, including the details of CCD cameras, lenses, coaxial cables, fiber-optics, and system design, but it is expanded to cover all video compression techniques used in the ever increasing assortment of digital video recorders (DVRs) available on the market today. This new edition of the book CCTV demystifies DVR technology. It also serves to clarify the technology of data networking. The theoretical section explains the various compression techniques. Networking is also a new and unknown area for many CCTV installers and this is explained in a brand new section.
  • Enabling End-Users

    Information Skills Training
    • 1st Edition
    • Ann Poyner
    • English
    This introductory book suggests ways of approaching some of the problems library and information professionals face as they prepare to offer end user education or training through personal tuition. Advice is given about how to take stock of existing library and information services in relation to their place and value within organisations. It examines issues about who needs end user education and training, what they might need and how it can be delivered. Guidance on planning and running individual, group and workshop training is provided.
  • Advances in Experimental Social Psychology

    • 1st Edition
    • Volume 37
    • Mark P. Zanna
    • English
    Advances in Experimental Social Psychology continues to be one of the most sought after and most often cited series in this field. Containing contributions of major empirical and theoretical interest, this series represents the best and the brightest in new research, theory, and practice in social psychology.
  • Risk Management for Computer Security

    Protecting Your Network and Information Assets
    • 1st Edition
    • Andy Jones + 1 more
    • English
    Risk Management for Computer Security provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. The book covers more than just the fundamental elements that make up a good risk program for computer security. It presents an integrated how-to approach to implementing a corporate program, complete with tested methods and processes, flowcharts, and checklists that can be used by the reader and immediately implemented into a computer and overall corporate security program. The challenges are many and this book will help professionals in meeting their challenges as we progress through the twenty-first century. This book is organized into five sections. Section I introduces the reader to the theories of risk management and describes the field's changing environment as well as the art of managing risks. Section II deals with threat assessment and its input to risk assessment; topics covered include the threat assessment method and an example of threat assessment. Section III focuses on operating system vulnerabilities and discusses application vulnerabilities; public domain vs. COTS; and connectivity and dependence. Section IV explains what risk assessment is and Section V explores qualitative vs. quantitative tools and types of risk assessment and concludes with an assessment of the future of risk management. Corporate security professionals around the world will find this book a highly valuable source of information.