Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Operating System Forensics

    • 1st Edition
    • Ric Messier
    • English
    Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.
  • Theoretical and Experimental Methods for Defending Against DDoS Attacks

    • 1st Edition
    • Iraj Sadegh Amiri + 1 more
    • English
    Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim’s IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.
  • The Invisible Librarian

    A Librarian's Guide to Increasing Visibility and Impact
    • 1st Edition
    • Aoife Lawton
    • English
    The Invisible Librarian: A Librarian's Guide to Increasing Visibility and Impact provides insights into what many librarians are feeling, including questions such as "do they feel invisible?" and "How many times have they heard somebody say ‘but everything is on the Internet’?" If you are a librarian struggling to find the best strategy for the future of the profession in a rapidly changing information environment, this book is for you. People don’t realize that librarians make information available and not just by search engine. This book will make people think differently about librarians, making a case for their value and impact that is compelling, convincing, and credible. Given their versatility and knowledge, now is the time for librarians to become champions of the information age as they improve the visibility and impact of libraries to readers, to stakeholders, and in society. By the end of the book, librarians will have a Visibility Improvement Plan to guarantee future success.
  • Project Management for Information Professionals

    • 1st Edition
    • Margot Note
    • English
    Aimed at practitioners, this handbook imparts guidance on project management techniques in the cultural heritage sector. Information professionals often direct complex endeavors with limited project management training or resources. Project Management for Information Professionals demystifies the tools and processes essential to successful project management and advises on how to manage the interpersonal dynamics and organizational culture that influence the effectiveness of these methods. With this book, readers will gain the knowledge to initiate, plan, execute, monitor, and close projects.
  • Traffic Anomaly Detection

    • 1st Edition
    • Antonio Cuadra-Sánchez + 1 more
    • English
    Traffic Anomaly Detection presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic. As traffic varies throughout the day, it is essential to consider the concrete traffic period in which the anomaly occurs. This book presents the algorithms proposed specifically for this analysis and an empirical comparative analysis of those methods and settle a new information theory based technique, named "typical day analysis".
  • Thor's OS Xodus

    Why And How I Left Windows For OS X
    • 1st Edition
    • Timothy "Thor" Mullen
    • English
    Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with minimal downtime. The text is the most complete roadmap for entities that want to move away from Microsoft and decouple their dependency on Microsoft products. It is a perfect choice for enterprise computing, providing the ease and simplicity of a UI that can also be incredibly customized via configuration files because of its BSD core. The text, authored by Thor Mullen, the founder of the "Hammer of God" security co-op group and Principal Security Architect for a worldwide, multi-billion dollar commerce platform, provides the perfect combination of Windows and Unix.
  • Threat Assessment and Risk Analysis

    An Applied Approach
    • 1st Edition
    • Gregory Allen + 1 more
    • English
    Threat Assessment and Risk Analysis: An Applied Approach details the entire risk analysis process in accessible language, providing the tools and insight needed to effectively analyze risk and secure facilities in a broad range of industries and organizations. The book explores physical vulnerabilities in such systems as transportation, distribution, and communications, and demonstrates how to measure the key risks and their consequences, providing cost-effective and achievable methods for evaluating the appropriate security risk mitigation countermeasures. Users will find a book that outlines the processes for identifying and assessing the most essential threats and risks an organization faces, along with information on how to address only those that justify security expenditures. Balancing the proper security measures versus the actual risks an organization faces is essential when it comes to protecting physical assets. However, determining which security controls are appropriate is often a subjective and complex matter. The book explores this process in an objective and achievable manner, and is a valuable resource for security and risk management executives, directors, and students.
  • Workplace Safety

    Establishing an Effective Violence Prevention Program
    • 1st Edition
    • Randall W. Ferris + 1 more
    • English
    Workplace Safety: Establishing an Effective Violence Prevention Program includes a powerful model on how to overcome organizational rationalization, objection, and denial when confronted with proposing a workplace violence protection program. The book offers real-life cases studies on how violence was successfully avoided using the book’s program, and also shows how to recognize and report precursor behaviors that precede violence. In addition, the book demonstrates proven methods for properly, and effectively, responding to violence should it occur, and tactfully managing the aftermath.
  • Widening Higher Education Participation

    A Global Perspective
    • 1st Edition
    • Mahsood Shah + 2 more
    • English
    Governments have introduced policies to widen the participation of disadvantaged students in higher education. Widening participation policies are also introduced to ensure that higher education contributes to social and economic outcomes. This book includes important insights from 23 leading scholars across 11 countries on a wide range of topics that focus on government policies, institutional structures and the social and economic impacts of widening participation. While widening participation policies and outcomes in developed countries are more widely documented, the policies, achievements, and challenges in other countries such as Brazil, China, Indonesia, South Africa and Palestine are not so widely disseminated. Therefore, the ‘untold stories’ of policies and outcomes of widening participation are a key part of this book. The chapters are organised according to three overarching themes, which include national and transnational studies of the history of widening participation and current policies; inclusive learning and academic outcomes; and socioeconomic structures, concepts and theories.
  • Firearm and Toolmark Examination and Identification

    • 1st Edition
    • Max M. Houck
    • English
    The Advanced Forensic Science Series grew out of the recommendations from the 2009 NAS Report: "Strengthening Forensic Science: A Path Forward." This volume, Firearm and Toolmark Examination and Identification, will serve as a graduate-level text for those studying and teaching firearm and toolmark examination and identification. It will also prove an excellent reference for forensic practitioner’s libraries or use in their casework. Coverage includes a wide variety of tools and toolmarks, analysis of gunshots, ammunition, gunshot wounds and professional issues they may encounter.