Skip to main content

Books in Social sciences and humanities

  • Web Services

    Theory and Practice
    • 1st Edition
    • Anura Guruge
    • English
    This is a soup-to-nuts reference guide on all aspects of Web Services - where Web Services is a fast emerging set of Internet-specific middleware technology to further promote the growth of all aspects of e-business via standardization, collaboration and "franchising." This book is best characterized as an executive brief for IT and senior management rather than a nuts-and-bolts technical guide for portal implementers. Think of it as the "Cliffs Notes on Web Services." Given this audience, the book consistently focuses on business needs, value propositions, ROI, proven solutions and actual examples of current implementations. Each chapter also ends with a 10-item "Q&A" section that consolidates and summarizes the information discussed in the chapter. The book is illustrated with detailed technical diagrams, includes lots of arresting subtitles and contains many bullet lists and tables to facilitate (and encourage) productive skimming.Decision makers - the intended readership for this book - gain increasing comfort and confidence as they get into the book that they are getting to see all facets of the issues, on a consistent basis, and that they will not be blind-sided at meetings by people asking 'difficult' questions. At the end of each chapter, Guruge summarizes and reinforces key points, allowing the reader to skim through the topics for crucial information. The book also leverages living outside resources and ensures that the readership always has ready and consistent access to any and all terms, definitions and concepts they might not be familiar with.
  • Windows Server 2003 Security Infrastructures

    Core Security Features
    • 1st Edition
    • Jan De Clercq
    • English
    Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS.
  • Digital Dilemmas and Solutions

    • 1st Edition
    • Peter Limb
    • English
    Today, all librarians face daunting challenges posed by trends in technology, publishing, and education as the impact of a globalising information economy forces a rethink of both library strategic directions and everyday library operations. This book brings together the main issues and dilemmas facing libraries; the book clearly shows how to deal with them, and provides a best-practice guide to the solutions.
  • The Strategic Management of Technology

    A Guide for Library and Information Services
    • 1st Edition
    • David Baker
    • English
    Aimed at professionals within Library and Information Services (LIS), this book is about the management of technology in a strategic context. The book is written against a backdrop of the complete transformation of LIS over the last twenty years as a result of technology. The book aims to provide managers and students of LIS at all levels with the necessary principles, approaches and tools to respond effectively and efficiently to the constant development of new technologies, both in general and within the Library and Information Services profession in particular. It looks at the various aspects of strategy development and IT management, and reviews the key techniques for successful implementation of strategy and policy.
  • Wireless Operational Security

    • 1st Edition
    • John Rittinghouse PhD CISM + 1 more
    • English
    This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-orient... and comprehensive way. Wireless Operational Security bridges this gap.
  • Digital Evidence and Computer Crime

    • 2nd Edition
    • Eoghan Casey
    • English
    Digital Evidence and Computer Crime, Second Edition, is a hands-on resource that aims to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime. This textbook explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In addition to gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, students will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations. Readers will receive unlimited access to the author's accompanying website, which contains simulated cases that integrate many of the topics covered in the text. This text is required reading for anyone involved in computer investigations or computer administration, including computer forensic consultants, law enforcement, computer security professionals, government agencies (IRS, FBI, CIA, Dept. of Justice), fraud examiners, system administrators, and lawyers.
  • AIDS and Other Manifestations of HIV Infection

    • 4th Edition
    • Gary Wormser
    • English
    Extensively revised and updated, the new edition of AIDS and Other Manifestations of HIV Infection is an essential reference resource providing a comprehensive overview of the biological properties of this etiologic viral agent, its clinicopathological manifestations, the epidemiology of its infection, and present and future therapeutic options.
  • MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298)

    Study Guide and DVD Training System
    • 1st Edition
    • Syngress
    • English
    MCSE Designing Security for a Microsoft Windows Server 2003 Network (Exam 70-298) Study Guide and DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives you 100% coverage of the official Microsoft 70-298 exam objectives plus test preparation software for the edge you need to pass the exam on your first try:
  • Economic Capital Allocation with Basel II

    Cost, Benefit and Implementation Procedures
    • 1st Edition
    • Dimitris N. Chorafas
    • English
    This book is a complimentary follow-on book to Operational Risk Control with Basel II. While the previous book focuses on operational risk, Economic Capital Allocation provides an overview of credit risk within the context of the Basel II accords.The book provides:* comprehensive coverage of the evolution of the banking industry with Basel II in mind* extensive information on the capital requirements for bank liquidity and solvency * coverage of the new rules as laid down by the supervisory authorities of the Group of Ten industrialized nations* key information on the technical requirements for credit institutions such as: new credit rating scales, modeling of credit risk, control of operational risks, and, novel ways and means for the management of exposure to Credit Risk
  • Principles of Cash Flow Valuation

    An Integrated Market-Based Approach
    • 1st Edition
    • Joseph Tham + 1 more
    • English
    Principles of Cash Flow Valuation is the only book available that focuses exclusively on cash flow valuation. This text provides a comprehensive and practical, market-based framework for the valuation of finite cash flows derived from a set of integrated financial statements, namely, the income statement, balance sheet, and cash budget. The authors have distilled the essence of years of gathering academic wisdom in the study of cash flow analysis and the cost of capital. Their work should go a long way toward bridging the gap between the application of cost benefit analysis and the theory of capital budgeting.This book covers the basic concepts in market-based cash flow valuation. Topics include the tme value of money (TVM) and an introduction to cost of capital; basic review of financial statements and accounting concepts; construction of integrated pro-forma financial statements; derivation of free cash flows; use of the WACC in theory and in practice; estimating the WACC for non traded firms; calculating the terminal value beyond the planning period. It also revisits the theory for cost of capital and explains how cash flows are valued in reality. The ideas are illustrated using examples and a case study. The presentation is appropriate for a range of technical backgrounds.This text will be of interest to finance professionals as well as MBA and other graduate students in finance.