Skip to main content

Books in Social sciences and humanities

    • WISC-IV Clinical Use and Interpretation

      • 1st Edition
      • November 23, 2004
      • Aurelio Prifitera + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 3 8 8 7 3 0 6
      • eBook
        9 7 8 0 0 8 0 5 2 1 7 3 2
      WISC-IV Clinical Use and Interpretation provides comprehensive information on using and interpreting the WISC-IV for clinical assessment and diagnosis. With chapters authored by recognized experts in intelligence research, test development, and assessment, this will be a valuable resource to anyone using the WISC-IV in practice. This information is available nowhere else and is a unique opportunity to understand the WISC-IV from the perspective of those who know it best. Most relevant to practitioners is the applied focus and interpretation of the WISC-IV in psychological and psychoeducational assessment.Divided into two sections, Section I discusses general advances in the assessment of children's intelligence, and how the WISC-IV differs from the WISC-III. Also discussed are the clinical considerations of this test, including the meaning of the FSIQ and four Index scores and how the WISC-IV relates to other assessment measures, including the WISC-IV Integrated. Section II discusses the use of WISC-IV with exceptional children, including those with learning disabilities, giftedness, mental retardation, hearing impairment, ADHD, neuropsychological injury, and/or cultural and ethnic differences.
    • Programmer's Ultimate Security DeskRef

      • 1st Edition
      • November 20, 2004
      • James C Foster
      • English
      • Paperback
        9 7 8 1 9 3 2 2 6 6 7 2 6
      • eBook
        9 7 8 0 0 8 0 4 8 0 4 5 9
      The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use.While there are many books starting to address the broad subject of security best practices within the software development lifecycle, none has yet to address the overarching technical problems of incorrect function usage. Most books fail to draw the line from covering best practices security principles to actual code implementation. This book bridges that gap and covers the most popular programming languages such as Java, Perl, C++, C#, and Visual Basic.
    • Inside the SPAM Cartel

      • 1st Edition
      • November 13, 2004
      • Spammer-X Spammer-X
      • English
      • Paperback
        9 7 8 1 9 3 2 2 6 6 8 6 3
      • eBook
        9 7 8 0 0 8 0 4 7 8 5 0 0
      Authored by a former spammer, Inside the SPAM Cartel is a methodical, technically explicit expose of the inner workings of the SPAM economy. Readers will be shocked by the sophistication and sheer size of this underworld. From the author: "You may hate spam and think all spammers are evil, but listen to my story and see why I do this and more importantly, HOW." For most people, the term "SPAM" conjures up the image of hundreds of annoying, and at times offensive, e-mails flooding their inbox every week. But for a few, SPAM is a way of life that delivers an adrenaline rush fueled by cash, danger, retribution, porn and the avoidance of local, federal, and international law enforcement agencies. Inside the SPAM Cartel offer readers a never-before seen view inside this dark sub-economy. You'll meet the characters that control the flow of money as well as the hackers and programmers committed to keeping the enterprise up and running. You may disagree with their objectives, but you can't help but to marvel at their ingenuity and resourcefulness in defeating spam filters, avoiding being identified, and staying one step ahead of the law.
    • Game Console Hacking

      • 1st Edition
      • November 12, 2004
      • Joe Grand + 1 more
      • English
      • Paperback
        9 7 8 1 9 3 1 8 3 6 3 1 9
      • eBook
        9 7 8 0 0 8 0 5 3 2 3 1 8
      The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed "retro gaming" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of "Hardware Hacking: Have Fun While Voiding Your Warranty", provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do. By definition, video console game players like to have fun. Most of them are addicted to the adrenaline rush associated with "winning", and even more so when the "winning" involves beating the system by discovering the multitude of "cheats" built into most video games. Now, they can have the ultimate adrenaline rush---actually messing around with the soul of the machine and configuring it to behave exactly as the command. This book builds on the motto of "Have Fun While Voiding Your Warranty" and will appeal to the community of hardware geeks who associate unscrewing the back of their video console with para-jumping into the perfect storm.
    • On the Psychobiology of Personality

      • 1st Edition
      • November 12, 2004
      • Robert M Stelmack
      • English
      • Hardback
        9 7 8 0 0 8 0 4 4 2 0 9 9
      • eBook
        9 7 8 0 0 8 0 5 3 7 9 8 6
      Zuckerman received his Ph.D. in psychology from New York University, Graduate School of Arts and Science in 1954 with a specialization in clinical psychology. After graduation, he worked for three years as a clinical psychologist in state hospitals in Norwich, Connecticut and Indianapolis, Indiana. While in the latter position the Institute for Psychiatric Research was opened in the same medical center where he was working as a clinical psychologist. He obtained a position there with a joint appointment in the department of psychiatry. This was his first interdisciplinary experience with other researchers in psychiatry, biochemistry, psychopharmacology, and psychology.His first research areas were personality assessment and the relation between parental attitudes and psychopathology. During this time, he developed the first real trait-state test for affects, starting with the Affect Adjective Check List for anxiety and then broadening it to a three-factor trait-state test including anxiety, depression, and hostility (Multiple Affect Adjective Check List). Later, positive affect scales were added.Toward the end of his years at the institute, the first reports of the effects of sensory deprivation appeared and he began his own experiments in this field. These experiments, supported by grants from NIMH, occupied him for the next 10 years during his time at Brooklyn College, Adelphi University, and the research labs at Albert Einstein Medical Center in Philadelphia. This last job was his second interdisciplinary experience working in close collaboration with Harold Persky who added measures of hormonal changes to the sensory deprivation experiments. He collaborated with Persky in studies of hormonal changes during experimentally (hypnotically) induced emotions.During his time at Einstein, he established relationships with other principal investigators in the area of sensory deprivation and they collaborated on the book Sensory Deprivation: 15 years of research edited by John Zubek (1969). His chapter on theoretical constructs contained the idea of using individual differences in optimal levels of stimulation and arousal as an explanation for some of the variations in response to sensory deprivation. The first sensation seeking scale (SSS) had been developed in the early 1960's based on these constructs.At the time of his move to the University of Delaware in 1969, he turned his full attention to the SSS as the operational measure of the optimal level constructs. This was the time of the drug and sexual revolutions on and off campuses and research relating experience in these areas to the basic trait paid off and is continuing to this day in many laboratories. Two books have been written on this topic: Sensation Seeking: Beyond the Optimal Level of Arousal, 1979; Behavioral Expressions and Biosocial Bases of Sensation Seeking, 1994. Research on sensation seeking in America and countries around the world continues at an unabated level of journal articles, several hundred appearing since the 1994 book on the subject.The theoretical model of sensation seeking changed as a consequence of research on the biological correlates of sensation seeking which included biochemical as well as psychophysiological variables. Genetic studies also indicated that sensation seeking was a major trait with a strong genetic/ biological basis. Zuckerman and his colleagues conducted research on the psychophysiological correlates of sensation seeking. One of these areas, augmenting/reducing of the cortical evoked potential, has provided a well replicated model of brain functioning in high and low sensation seekers, and Siegel has extended this into a model for sensation seeking in cats and rats. This animal model provides a link between sensation seeking and behavioral, genetic, physiological, and biochemical bases for the trait in other species. Investigators at other universities, Bardo at the University of Kentucky and LeMoal and Simon at the University of Bordeaux, have used the sensation seeking model to investigate the psychobiological basis of novelty seeking in rats.Zuckerman's interest in the biological basis of the trait of sensation seeking broadened into a more general interest in the biological bases of personality, culminating in his book: Psychobiology of Personality, 1991 and many book chapters and articles on the subject. His perspective in the area was broadened by sabbaticals spent with leaders in the field in England: Hans Eysenck, Jeffrey Gray, and Robert Plomin.More recent research attempted to place sensation seeking within the context of new structural models for personality traits. Factor analytic studies showed that a combined factor of impulsivity and sensation seeking formed one of five, robust and replicable factors of personality. Research on this new measure of the basic trait is ongoing.
    • Treatment Planning for Person-Centered Care

      • 1st Edition
      • November 10, 2004
      • Neal Adams + 1 more
      • English
      • Paperback
        9 7 8 1 4 8 3 2 9 9 7 3 0
      • eBook
        9 7 8 0 0 8 0 5 2 1 5 7 2
      Requirements for treatment planning in the mental health and addictions fields are long standing and embedded in the treatment system. However, most clinicians find it a challenge to develop an effective, person-centered treatment plan. Such a plan is required for reimbursement, regulatory, accreditation and managed care purposes. Without a thoughtful assessment and well-written plan, programs and private clinicians are subject to financial penalties, poor licensing/accreditat... reviews, less than stellar audits, etc. In addition, research is beginning to demonstrate that a well-developed person-centered care plan can lead to better outcomes for persons served.
    • Strategies for Growth in SMEs

      • 1st Edition
      • November 9, 2004
      • Margi Levy + 1 more
      • English
      • Paperback
        9 7 8 0 7 5 0 6 6 3 5 1 9
      • eBook
        9 7 8 0 0 8 0 4 8 1 1 6 6
      Strategies for Growth in SMEs explores for the first time the role of information and information systems (IS) concepts in small and medium-sized enterprises (SMEs). Most IS research focuses on large firms, yet the majority of firms in most economies are SMEs. The book considers the applicability of IS theory and practice to SMEs and develops new theories that are relevant to these firms.Composed of 6 sections, it covers, amongst other things; the nature of SMEs, the background to IS, and SMEs' use of IS, issues of IS strategy and planning in SMEs, the way that firms can transform through use of IS, evaluation, IS flexibility, business process re-engineering, resource-based strategy and knowledge management, the appropriateness of existing theories and the development of new models to address SME-specific issues. The final section of the book reviews the learning in the previous chapters and poses future agendas for research.Written by two of the leading figures in the field, this book will be essential reading for researchers in IS and SMEs, students on entrepreneurship or IS courses, and others that focus on SMEs.
    • Physical Security for IT

      • 1st Edition
      • November 8, 2004
      • Michael Erbschloe
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 2 7 9
      • eBook
        9 7 8 0 0 8 0 4 9 5 9 0 3
      The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets.
    • Windows to Linux Migration Toolkit

      • 1st Edition
      • November 5, 2004
      • David Allen
      • English
      • eBook
        9 7 8 0 0 8 0 4 8 1 7 6 0
      This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals who wish to maximize the value of their Windows to Linux migration services will find this book valuable. The book will help them fine-tune their migration services to make them more efficient, thorough, feature-enhanced, and cost-effective by utilizing migration scripts and best practices gleaned from the author's many years of real-world migrations in large and small companies.
    • Electronic Resources in the Virtual Learning Environment

      • 1st Edition
      • October 31, 2004
      • Jane Secker
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 0 5 9 1
      • Hardback
        9 7 8 1 8 4 3 3 4 0 6 0 7
      • eBook
        9 7 8 1 7 8 0 6 3 0 7 0 0
      This book covers the key current topic of electronic library resources and learning in the digital age. The book begins by outlining the changing ‘information environment’ in which librarians now work. It then goes on to discuss: the development of e-learning as a concept and the impact this is having on the further and higher education sector; the changing role of the librarian in supporting online learning; the technical problems associated with connecting up library systems; the copyright and licensing of electronic resources in a digital environment; and, finally the book offers tips for librarians when becoming involved in such initiatives.