Skip to main content

Books in Social sciences and humanities

    • Freedom of Information

      • 1st Edition
      • October 31, 2004
      • Liz Taylor
      • English
      • Paperback
        9 7 8 1 8 4 3 3 4 1 0 3 1
      • eBook
        9 7 8 1 7 8 0 6 3 0 6 9 4
      As from 1 January 2005, Freedom of Information (FOI) legislation will come fully into force throughout the UK and could potentially change the way in which the public sector manages information. This report provides practical advice on how to achieve compliance with the Acts; the report helps to ensure successful management of the key risks that the Acts may pose to organisations across the UK. The report also introduces some of the change management issues that will need to be addressed within organisations to facilitate the transition to a more open culture of FOI.
    • Biotechnology Annual Review

      • 1st Edition
      • Volume 10
      • October 30, 2004
      • M. Raafat El-Gewely
      • English
      • Hardback
        9 7 8 0 4 4 4 5 1 7 4 9 4
      • eBook
        9 7 8 0 0 8 0 9 3 0 8 8 6
    • Pricing and Hedging Interest and Credit Risk Sensitive Instruments

      • 1st Edition
      • October 29, 2004
      • Frank Skinner
      • English
      • eBook
        9 7 8 0 0 8 0 4 7 3 9 5 6
      This book is tightly focused on the pricing and hedging of fixed income securities and their derivatives. It is targeted at those who are interested in trading these instruments in an investment bank, but is also useful for those responsible for monitoring compliance of the traders such as regulators, back office staff, middle and senior lever managers. To broaden its appeal, this book lowers the barriers to learning by keeping math to a minimum and by illustrating concepts through detailed numerical examples using Excel workbooks/spreadshee... on a CD with the book. On the accompanying CD with the book, three interest rate models are illustrated: Ho and Lee, constant volatility and Black Derman and Toy, along with two evolutionary models, Vasicek and CIR and two credit risk models, Jarrow and Turnbull and Duffie and Singleton. These are implemented via spreadsheets on the CD.
    • International Funds

      • 1st Edition
      • October 29, 2004
      • Catherine Turner
      • English
      • Paperback
        9 7 8 0 0 8 0 9 7 3 0 3 6
      • Hardback
        9 7 8 0 7 5 0 6 5 8 9 9 7
      • eBook
        9 7 8 0 0 8 0 4 9 1 5 8 5
      International Funds will provide readers with:*A greater understanding of the benefits and limitations of funds to both retail and institutional investors*An easy-to-read, yet technically comprehensive, insight into fund structures *An overview of the variety of legal structures, regulatory categories and investment profiles available*A detailed understanding of the practical aspects of fund valuation and administration, and the role of the various practitioners*A view of the future of the international funds industry in the light of changing markets, regulation and investor appetite
    • Dr. Tom Shinder's Configuring ISA Server 2004

      • 1st Edition
      • October 15, 2004
      • Debra Littlejohn Shinder + 1 more
      • English
      • Paperback
        9 7 8 1 9 3 1 8 3 6 1 9 7
      • eBook
        9 7 8 0 0 8 0 4 7 7 4 0 4
      Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft.Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. This book will be featured prominently on the ISAserver.org home page as well as referenced on Microsoft TechNet and ISA Server Web pages. Tom and Deb's unparalleled technical expertise combined with prime on-line marketing opportunities will make this the #1 book again in the ISA Server market.
    • Black Hat Physical Device Security: Exploiting Hardware and Software

      • 1st Edition
      • October 15, 2004
      • Drew Miller
      • English
      • Hardback
        9 7 8 1 9 3 2 2 6 6 8 1 8
      • eBook
        9 7 8 0 0 8 0 4 8 8 4 0 0
      Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In Black Hat Physical Device Security: Exploiting Hardware and Software, the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more. The Black Hat Briefings held every year in Las Vegas, Washington DC, Amsterdam, and Singapore continually expose the greatest threats to cyber security and provide IT mind leaders with ground breaking defensive techniques. There are no books that show security and networking professionals how to protect physical security devices. This unique book provides step-by-step instructions for assessing the vulnerability of a security device such as a retina scanner, seeing how it might be compromised, and taking protective measures. The book covers the actual device as well as the software that runs it. By way of example, a thumbprint scanner that allows the thumbprint to remain on the glass from the last person could be bypassed by pressing a "gummy bear" piece of candy against the glass so that the scan works against the last thumbprint that was used on the device. This is a simple example of an attack against a physical authentication system.
    • Side Effects of Drugs Annual

      • 1st Edition
      • Volume 27
      • October 9, 2004
      • English
      • Paperback
        9 7 8 0 4 4 4 5 4 2 8 2 3
      • eBook
        9 7 8 0 0 8 0 4 7 4 3 7 3
      The Side Effects of Drugs Annual was first published in 1977. It has been published continuously since then, as a yearly update to the encyclopaedic volume Meyler's Side Effects of Drugs. Each new Annual provides clinicians and medical investigators with a reliable and critical yearly survey of new data and trends in the area of Adverse Drug Reactions and Interactions. An international team of specialists have contributed to the Annuals by selecting from each year's publications all that is truly new and informative, by critically interpreting it, and by pointing out whatever is misleading. The use of the book is enhanced by separate indexes, allowing the reader to enter the text via the drug name, adverse effect, or drug interaction. Special features of the Annuals are the Side Effects of Drugs Essay, usually written by a guest author, and the special reviews: short articles, within the different chapters, that give extra attention to topics of current interest. The Essay in Annual 27 is entitled 'The General Practice Research Database' (by Dr. H. Jick) and there is a Historical Essay entitled 'Louis Lewin - Meyler's Predecessor' (by Dr. J.K. Aronson). The special reviews in this volume include, among others: The effects of NSAIDs on blood pressure Risks of inhaled corticosteroids in children Leukotriene receptor antagonists and Churg-Strauss syndrome Amiodarone and thyroid disease Surveillance of adverse events following immunization Smallpox vaccination Safety aspects of folic acid Inhibitors of topoisomerase I and topoisomerase II Liver damage from kava kava
    • Investigating Child Exploitation and Pornography

      • 1st Edition
      • October 7, 2004
      • Monique M. Ferraro + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 1 6 3 1 0 5 5
      • Paperback
        9 7 8 0 1 2 3 9 5 4 7 9 4
      • eBook
        9 7 8 0 0 8 0 4 7 8 7 6 0
      Investigating Child Exploitation and Pornography provides the historical, legal, technical, and social background for the laws prohibiting child exploitation, in particular, child pornography. It offers a history of child exploitation cases and studies, outlining the roles of technology in this type of crime and the evidence they can contain, and documenting new research performed by the authors. It details how successful undercover Internet operations are conducted, how the associated evidence is collected, and how to use the evidence to locate and apprehend the offender. The heart of this work is a legal section, detailing all of the legal issues that arise in Internet child exploitation cases. A forensic examination section presents evidentiary issues from a technical perspective and describes how to conduct a forensic examination of digital evidence gathered in the investigative and probative stages of a child exploitation case. The book will become an indispensable resource for those involved in the investigation, prosecution, and study of computer-assisted child sexual exploitation.
    • Private Security and the Law

      • 3rd Edition
      • October 1, 2004
      • Charles Nemeth
      • English
      • Hardback
        9 7 8 0 7 5 0 6 7 7 7 0 7
      • eBook
        9 7 8 0 0 8 0 5 2 5 0 9 9
      Private Security and the Law, Third Edition is a textbook analysis of significant practices in the security industry that relate to law, regulation, licensure and constitutional dilemmas according to case and statutory authority. It is a treatise on the state of the law that governs the security industry and its operatives. The book fills the void that an increasing number of institutions are seeking as they expand their security programs in response to the growing demand for security education. This book delivers up to date information on the legal requirements witnessed by most security firms. It also explores the liability problems common to security operations, including negligence and tortious liability, civil actions commonly litigated, and strategies to avoid troublesome causes of action that effect business efficiency. From another angle, the work examines the constitutional and due process dimensions of private security work and affords the reader a look at how case law applies certain remedies to wronged parties. Recent cases, and the trends sure to follow, are highlighted throughout the text. Finally, the text is filled with checklists, data and other useful information that aids the security practitioner in applying theory to practice. This book will appeal to students in security and criminal justice programs; private security consultants; corporate security managers; and lawyers.
    • Intellectual Property Licences and Technology Transfer

      • 1st Edition
      • September 30, 2004
      • Duncan Curley
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 0 9 0 4
      • Paperback
        9 7 8 1 8 4 3 3 4 0 8 9 8
      • eBook
        9 7 8 1 7 8 0 6 3 1 4 5 5
      This essential guide vital new changes by the European Commission to the law governing the enforceability of intellectual property licences in Europe. Agreements which contain the grant of a licence by one party to another of intellectual property rights are subject to European competition (anti-trust) laws. In particular, many agreements containing licences of patent rights and rights in confidential information and technical know-how are caught by Article 81(1) of the EC Treaty, which prohibits agreements between undertakings which prevent, restrict or distort competition in the Common Market. However, because licences of intellectual property rights usually facilitate the transfer of technology from one undertaking to another, and the licensor and licensee will often operate at different levels of the market, many licences of intellectual property rights may benefit from an automatic exemption under Article 81(3) of the EC Treaty. On 1 May 2004, this exemption is being radically overhauled, as part of the European Commission’s drive to modernise European competition law. This book examines the changes in that legislation.