Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Cyber Security Awareness for Lawyers

    • 1st Edition
    • Henry Dalziel + 1 more
    • English
    Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do--especially as Lawyers--to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.
  • Cyber Security Awareness for Corporate Directors and Board Members

    • 1st Edition
    • Henry Dalziel + 1 more
    • English
    Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate liability, and protect reputation. The book details the severity of the treat to companies, and what to do as corporate directors and board members to build a defense against potential breaches.
  • Security Controls Evaluation, Testing, and Assessment Handbook

    • 1st Edition
    • Leighton Johnson
    • English
    Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.
  • Becoming a Lean Library

    Lessons from the World of Technology Start-ups
    • 1st Edition
    • Jeremy Nelson
    • English
    Becoming a Lean Library: Lessons from the World of Technology Start-ups provides a guide to the process and approach necessary to manage product development. Using techniques and philosophies pioneered by Toyota's lean manufacturing success, Becoming a Lean Library provides library leadership advice and tips on making the library more nimble, lean, and responsive to technological change. Early chapters introduce the reader to the idea of lean start-ups in libraries, followed by chapters covering library systems, lessons from lean manufacturing, and the build-measure-learn model. Remaining chapters discuss technology change and DevOps as a lean strategy, while also giving the reader the opportunity to earn a professional online "badge" on the subject material of the book.
  • FORWARD to Professorship in STEM

    Inclusive Faculty Development Strategies That Work
    • 1st Edition
    • Rachelle S. Heller + 2 more
    • English
    FORWARD to Professorship in STEM: Inclusive Faculty Development Strategies That Work provides best practices on how to design and implement inclusive workshops aimed at supporting faculty and staff in their career development. The book addresses fundamental skills and strategies to excel in academia, with a focus on assisting women and other underrepresented groups to succeed in obtaining tenure-track faculty positions, and in acquiring tenure. Contributors from wide geographical, disciplinary, and career backgrounds offer their insights on challenges in academia, lessons learned, successes, and outcomes, with chapters devoted to tenure and beyond, collaborations and funding, impact on, and of, the deaf culture, and engaging differences.
  • Digital Forensics

    Threatscape and Best Practices
    • 1st Edition
    • John Sammons
    • English
    Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can be done to manage and prepare for it. Digital Forensics: Threatscape and Best Practices delivers you with incisive analysis and best practices from a panel of expert authors, led by John Sammons, bestselling author of The Basics of Digital Forensics.
  • Breaking into Information Security

    Crafting a Custom Career Path to Get the Job You Really Want
    • 1st Edition
    • Josh More + 2 more
    • English
    Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren’t always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.
  • Automating Open Source Intelligence

    Algorithms for OSINT
    • 1st Edition
    • Robert Layton + 1 more
    • English
    Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. The book is beneficial to both practitioners and academic researchers, with discussions of the latest advances in applications, a coherent set of methods and processes for automating OSINT, and interdisciplinary perspectives on the key problems identified within each discipline. Drawing upon years of practical experience and using numerous examples, editors Robert Layton, Paul Watters, and a distinguished list of contributors discuss Evidence Accumulation Strategies for OSINT, Named Entity Resolution in Social Media, Analyzing Social Media Campaigns for Group Size Estimation, Surveys and qualitative techniques in OSINT, and Geospatial reasoning of open data.
  • Emerging Technologies for Librarians

    A Practical Approach to Innovation
    • 1st Edition
    • Sharon Q Yang + 1 more
    • English
    Emerging Technologies for Librarians: A Practical Approach to Innovation focuses on the practical applications of emerging technologies in libraries, defining the technologies in the context of their use in real situations. Each chapter includes an overview of the use of emerging technologies in a particular work area that is followed by a list of relevant applications. Chapters cover work areas such as advertising, distance learning, metadata. and digital libraries, and also focus on applications, including mobile computing and web conferencing, followed by a conclusion. This book serves as a guide for those interested in learning about, and implementing, the available technologies that enhance library services, and also lists and discusses the types of emerging technologies that are available for a specific area of work.
  • Job Hazard Analysis

    A Guide for Voluntary Compliance and Beyond
    • 2nd Edition
    • James Roughton + 1 more
    • English
    Job Hazard Analysis: A Guide for Voluntary Compliance and Beyond, Second Edition, provides a complete reference for performing JHA and setting up a JHA program. The book identifies the basic job steps and tasks, their associated hazards and risks, and safe operating procedures and hazard controls based on this analysis. Authors James Roughton and Nathan Crutchfield argue that the JHA should be the centerpiece of any risk control and occupational safety and health program. However, the traditional JHA has potential problems in gathering and analysis of task data and, with its focus on the sequence of steps, can miss the behavioral effects and the systems interactions between tools, equipment, materials, work environment, management and the individual worker. The concepts are presented for the JHA, incorporating elements from Behavior-Based Safety and Six Sigma. Readers are taken through the whole process of developing tools for identifying workplace hazards, developing systems that support hazard recognition, developing an effective JHA, and managing a JHA based program that can be easily incorporated into occupational safety and health management systems, thus allowing businesses to move from mere compliance to a pro-active safety management. The book is supported by numerous examples of JHAs, end of chapter review questions, sample checklists, action plans, and forms.