Skip to main content

Books in Social sciences and humanities

2511-2520 of 14733 results in All results

Visual Masking

  • 1st Edition
  • November 13, 2013
  • Talis Bachmann + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 2 5 0 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 3 8 3 - 1
Visual masking is a technique used in cognitive research to understand pre-conscious processes (priming, for example), consciousness, visual limits, and perception issues associated with psychopathology. This book is a short format review of research using visual masking: how it has been used, and what these experiments have discovered.Topics covered include concepts, varieties, and theories of masking; masking and microgenetic mechanisms and stagesof visual processing; psychopharmacological and genetic factors in masking, and more.

Investigating Internet Crimes

  • 1st Edition
  • November 12, 2013
  • Todd G. Shipley + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 7 8 1 7 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 7 9 2 9 - 8
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim. Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.

Introduction to Information Security

  • 1st Edition
  • November 12, 2013
  • Timothy Shimeall + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 6 9 - 9
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 9 7 2 - 9
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information.Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel.

Introduction to Information Security

  • 1st Edition
  • November 12, 2013
  • Timothy Shimeall + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 6 9 - 9
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 9 7 2 - 9
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information.Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel.

Microbiology of Waterborne Diseases

  • 2nd Edition
  • November 8, 2013
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 4 1 5 8 4 6 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 5 9 7 6 - 1
The second edition of Microbiology of Waterborne Diseases describes the diseases associated with water, their causative agents and the ways in which they gain access to water systems. The book is divided into sections covering bacteria, protozoa, and viruses. Other sections detail methods for detecting and identifying waterborne microorganisms, and the ways in which they are removed from water, including chlorine, ozone, and ultraviolet disinfection. The second edition of this handbook has been updated with information on biofilms and antimicrobial resistance. The impact of global warming and climate change phenomena on waterborne illnesses are also discussed. This book serves as an indispensable reference for public health microbiologists, water utility scientists, research water pollution microbiologists environmental health officers, consultants in communicable disease control and microbial water pollution students.

Computer Incident Response and Forensics Team Management

  • 1st Edition
  • November 8, 2013
  • Leighton Johnson
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 9 6 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 4 7 2 5 - 9
Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.

The Changing Roles of Company Budgets

  • 1st Edition
  • November 5, 2013
  • Stephen Lyne + 1 more
  • English
The survey in this CIMA research report explored claims in recent literature that managers are now generally dissatisfied with budgeting processes and ought to be considering methods that move beyond budgeting.Tests were undertaken to discover:- What attitudes financial and non-financial managers in the survey companies had towards budgeting and whether these differed between the two groups- What changes had taken place in budgetary practice and how finance and non-finance managers perceived these changes- Which underlying factors were most likely to cause negative attitudes towards the consequences of budgeting amongst respondentsThis book gives a comprehensive analysis of the current use and changing use of budgets in medium-large organisations.By combining the use of questionnaires, interviews and company visits with statistical analysis techniques, the research is able to provide key insights into finance and non-finance manager attitudes towards budgets.The book is highly relevant to practitioners and students as it highlights the actual practice and use of budgets in medium-large companies, rather than presenting theoretical concepts and academic hypotheses.

Trading and Money Management in a Student-Managed Portfolio

  • 1st Edition
  • November 1, 2013
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 1 1 9 3 - 9
Trading and Money Management in a Student-Managed Portfolio is a hands-on textbook for student-managed investment funds (SMIFs). The book presents the applied material that textbooks on portfolios and investments always overlook. Its focus on "how-to" questions summarizes the disciplines and skills necessary for trading. Covering equities, hedge funds and derivatives, and fixed income, it captures the breadth and detail necessary for developing and executing trading strategies. Developed specifically for SMIF courses, the book features calculations, examples, and software that help you move from talking about markets to taking positions in them.

Trading and Money Management in a Student-Managed Portfolio

  • 1st Edition
  • November 1, 2013
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 1 1 9 3 - 9
Trading and Money Management in a Student-Managed Portfolio is a hands-on textbook for student-managed investment funds (SMIFs). The book presents the applied material that textbooks on portfolios and investments always overlook. Its focus on "how-to" questions summarizes the disciplines and skills necessary for trading. Covering equities, hedge funds and derivatives, and fixed income, it captures the breadth and detail necessary for developing and executing trading strategies. Developed specifically for SMIF courses, the book features calculations, examples, and software that help you move from talking about markets to taking positions in them.