Skip to main content

Books in Social sciences and humanities

  • Value Creation from E-Business Models

    • 1st Edition
    • Wendy Currie
    • English
    Value Creation from E-Business Models provides a thorough analysis of what constitutes an e-business model. Unlike many e-business books available, this text draws together theoretical and empirical contributions from leading academic scholars in the field of management information systems. Divided into four parts, E-Business Models and Taxonomies; E-Business Markets; E-Business Customer Performance Measurement; and E-Business Vendor Applications and Services, this book is the critical dissection of E-Business that today's academic community needs.
  • Trojans, Worms, and Spyware

    A Computer Security Professional's Guide to Malicious Code
    • 1st Edition
    • Michael Erbschloe
    • English
    Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements. This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats – new and advanced variants of Trojans, as well as spyware (both hardware and software) and “bombs” – and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
  • The Institutional Economics of Market-Based Climate Policy

    • 1st Edition
    • Volume 7
    • E. Woerdman
    • English
    The objective of this book is to analyze the institutional barriers to implementing market-based climate policy, as well as to provide some opportunities to overcome them. The approach is that of institutional economics, with special emphasis on political transaction costs and path dependence.Instead of rejecting the neoclassical approach, this book uses it where fruitful and shows when and why it is necessary to employ a new or neo-institutionalist approach. The result is that equity is considered next to efficiency, that the evolution and possible lock-in of both formal and informal climate institutions are studied, and that attention is paid to the politics and law of economic instruments for climate policy, including some new empirical analyses.The research topics of this book include the set-up costs of a permit trading system, the risk that credit trading becomes locked-in, the potential legal problem of grandfathering in terms of actional subsidies under WTO law or state aid under EC law, and the changing attitudes of various European officials towards restricting the use of the Kyoto Mechanisms.
  • Introduction to Psychoneuroimmunology

    • 1st Edition
    • Jorge H. Daruna
    • English
    Psychoneuroimmunolog... investigates the relationships between behavior, psychosocial factors, the nervous, endocrine, and immune systems, and disease. Each system affects the others, enhancing and/or inhibiting processes elsewhere in the body. Research in this field has grown tremendously in recent years as science better understands the checks and balances of these interdisciplinary systems and processes. Introduction to Psychoneuroimmunolog... provides the first introductory text for this complex field.Beginning with a discussion of immune system basics, Introduction to Psychoneuroimmunolog... explores endocrine-immune modulation, neuro-immune modulation, the relationship between stress, contextual change, and disease, as well as infection, allergy, immune activity and psychopathology, and immune function enhancement. This text provides a sound introduction to the field and will serve as a valuable overview to what is otherwise a complex interdisciplinary subject at the junction of molecular biology, genetics, the neurosciences, immunology, cell biology, endocrinology, pharmacology, biochemistry, and the behavioral sciences.
  • Defense Transportation: Algorithms, Models and Applications for the 21st Century

    • 1st Edition
    • Robert T. Brigantic + 1 more
    • English
    Defense Transportation: Algorithms, Models and Applications for the 21st Century contains papers divided into three general sections according to the title of this text: algorithms, models, and applications. The first section on algorithms contains papers that are theoretical in nature or contain new techniques that relate to Defense Transportation System (DTS) processes. A sampling of the papers contained in this section deals with group theoretic "tabu" search techniques, shortest path sailing distance algorithms, and strategic airlift model validation methods. The second section contains papers on various transportation models used throughout the DoD and transportation industry, as well as some newly developed transportation modelling methods that may eventually find their way into larger scale transportation models. A review of the major strategic mobility models is also contained in this section. The third section contains papers on various transportation applications that have been used to support various DTS studies and analyses. This section also contains a diverse set of topics, with articles ranging from a paper on North Atlantic Treaty Organization (NATO) strategic lift requirements to an analysis paper on theater reception, staging, onward movement, and integration.
  • Handbook of Regional and Urban Economics

    Cities and Geography
    • 1st Edition
    • Volume 4
    • V. Henderson + 1 more
    • English
    The new Handbook of Regional and Urban Economics: Cities and Geography reviews, synthesizes and extends the key developments in urban and regional economics and their strong connection to other recent developments in modern economics. Of particular interest is the development of the new economic geography and its incorporation along with innovations in industrial organization, endogenous growth, network theory and applied econometrics into urban and regional economics. The chapters cover theoretical developments concerning the forces of agglomeration, the nature of neighborhoods and human capital externalities, the foundations of systems of cities, the development of local political institutions, regional agglomerations and regional growth. Such massive progress in understanding the theory behind urban and regional phenomenon is consistent with on-going progress in the field since the late 1960’s. What is unprecedented are the developments on the empirical side: the development of a wide body of knowledge concerning the nature of urban externalities, city size distributions, urban sprawl, urban and regional trade, and regional convergence, as well as a body of knowledge on specific regions of the world—Europe, Asia and North America, both current and historical. The Handbook is a key reference piece for anyone wishing to understand the developments in the field.
  • Nessus Network Auditing

    Jay Beale Open Source Security Series
    • 1st Edition
    • Jay Beale + 3 more
    • English
    This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network.
  • Zero-Day Exploit

    Countdown to Darkness
    • 1st Edition
    • Rob Shein + 1 more
    • Marcus Sachs
    • English
    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them.
  • Cyber Adversary Characterization

    Auditing the Hacker Mind
    • 1st Edition
    • Marcus Sachs + 3 more
    • English
    The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy’s mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.
  • International Review of Research in Mental Retardation

    Personality and Motivational Systems in Mental Retardation
    • 1st Edition
    • Volume 28
    • English
    Motivation is the energizing force that drives much of our attention, conscious effort, and achievement in life. Yet this important driving force may be absent, low, or problematic in persons with mental retardation. This special thematic volume in the International Review of Research in Mental Retardation focuses on motivation within this special population. The book explores several theoretical models of motivation, as well as discussing issues of goal orientation, self-regulated academic learning, the setting and monitoring of realistic goals, and social competence for people with mental retardation. Additional chapters discuss the measurement of subjective well-being and quality of life in this population, and strategies for empowering students with developmental difficulties as well as instructional practices and contexts that can enhance motivation, learning, and achievement.