Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Building an Intelligence-Led Security Program

    • 1st Edition
    • Allan Liska
    • English
    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents. The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way.
  • How to Define and Build an Effective Cyber Threat Intelligence Capability

    • 1st Edition
    • Henry Dalziel
    • Eric Olson + 1 more
    • English
    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.
  • A Machine-Learning Approach to Phishing Detection and Defense

    • 1st Edition
    • O.A. Akanbi + 2 more
    • English
    Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.
  • Bloodstain Patterns

    Identification, Interpretation and Application
    • 1st Edition
    • Anita Y. Wonder
    • English
    Bloodstain Patterns: Identification, Interpretation and Application combines material from Blood Dynamics (2001) and Bloodstain Pattern Evidence (2007) with updated case work and scientific advances from medical and hard sciences. The text expands coverage of such areas as arterial damage pattern identification, staging of crime scenes, legal applications and problems from both sides of the bench, and extending teaching and training to those outside criminal justice. With violent offenders more aware of crime scene investigation techniques and attempting to frame others, the text expands outdated basic training programs that are insufficient to identify attempts to confuse the investigation. This book clarifies previous understandings as well as bridges the gap toward future advance courses. Based on the work of Paul Leland Kirk, the book’s focus is on first line investigators’ accuracy in identifying specific bloodstain patterns, correctly interpreting and applying them to casework.
  • Information Security Analytics

    Finding Security Insights, Patterns, and Anomalies in Big Data
    • 1st Edition
    • Mark Talabis + 3 more
    • English
    Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization.
  • Intellectual Property and Assessing its Financial Value

    • 1st Edition
    • Benedikt Sas + 2 more
    • English
    This book covers the different aspects, such as patents, trademarks and copyright of Intellectual Property (IP) from a more practical business perspective. Intellectual Property and Assessing its’ Financial Value describes the differences between regions, mainly the differences between the US and EU. In addition, several tools are presented for assessing the value of new IP, which is of importance before engaging on a new project that could result in new IP or for licensing purposes. The first chapter introduces the different types of IP and illustrating the business importance of capturing and safeguarding IP, the second chapter discusses patents and other forms of IP with subsequent chapters exploring copyright and trademarks in more detail, and a concluding chapter on the future of systems that can assess new IP value.
  • Securing VoIP

    Keeping Your VoIP Network Safe
    • 1st Edition
    • Regis J. Jr (Bud) Bates
    • English
    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.
  • Designing and Building Security Operations Center

    • 1st Edition
    • David Nathans
    • English
    Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers’ information. Designing and Building a Security Operations Center will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. Written by a subject expert who has consulted on SOC implementation in both the public and private sector, Designing and Building a Security Operations Center is the go-to blueprint for cyber-defense.
  • Techno Forensics 2008

    • 1st Edition
    • Syngress
    • English
    * 14 Books Valued at over $800 for less than $300!* Titles you can't get anywhere else!* Search pages on an easy-to-read PDF format!Just released from the Techno Forensics 2008 Show in Maryland, this compilation of books includes some of the hottest titles surrounding the forensics field today. In this easy-to-use CD, you'll be able to search through and use thousands of pages in PDF format. From some of our most recent titles to two first edition titles you can't find anywhere else, this CD has it all! This offer is available for a limited time only, so be sure to order your copy today!Malware Forensics by James Aquilina & Cameron MalinPenetration Tester's Open Source Toolkit, Vol 2 by Aaron BaylesWindows Forensic Analysis DVD Toolkit by Harlan CarveyAlternate Data Storage Forensics by Tyler Cohen & Amber SchroaderGoogle Hacking for Penetration Testers by Johnny Long (only available on this cd)Google Hacking for Penetrations Testers, Vol 2 by Johnny LongNo Tech Hacking by Johnny LongPenetration Tester's Open Source Toolkit, Vol 2 by Chris Hurley Unix and Linux Forensic Analysis DVD Toolkit by Chris PogueCyber Crime Investigations by Anthony ReyesScene of the Cybercrime by Debra Littlejohn Shinder (only available on thiscd)Techno Security's Guide to E-Discovery by Jack WilesTechno Security's Guide to Managing Risks by Jack WilesTechno Security's Guide to Securing SCADA by Jack Wiles
  • MCSA Windows Server 2003 Upgrade to Server 2008, Technology Specialist Online Course: Exam 70-648

    Exam 70-648
    • 1st Edition
    • Robert Shimonski
    • English
    You will get a unique and intense test prep experience with this complete, self-paced. 100% online training course for 70-648. Written and designed by leading experts and Microsoft MVPs, this full training course delivers rich content, an interactive learning experience, and realistic practice questions.