Skip to main content

Books in Social sciences

The Social Sciences collection forms a definitive resource for those entering, researching, or teaching in any of the many disciplines making up this interdisciplinary area of study. Written by experts and researchers from both Academic and Commercial domains, titles offer global scope and perspectives.

Key subject areas include: Library and Information Science; Transportation; Urban Studies; Geography, Planning, and Development; Security; Emergency Management.

  • Discovering the Total Cost of Security to the Enterprise

    Proven Practices
    • 1st Edition
    • Richard Lefler
    • English
    Discovering the Total Cost of Security to the Enterprise is a video presentation. Length: 29 minutes.In Discovering the Total Cost of Security to the Enterprise, presenter Richard Lefler discusses what security actually costs an organization in terms of operating, variable, and mandatory costs. Each of the three types of security costs are defined and expanded upon in this presentation. Lefler also explains how certain industry sectors have increasing variable and operating costs, along with the reasons behind these trends. The presentation also covers mandatory spend versus discretionary spend, chief security officer management (CSO) trends, and the critical next steps for CSOs.Discovering the Total Cost of Security to the Enterprise is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Hacking and Penetration Testing with Low Power Devices

    • 1st Edition
    • Philip Polstra
    • English
    Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!
  • Security Leader Insights for Risk Management

    Lessons and Strategies from Leading Security Professionals
    • 1st Edition
    • Richard Chase
    • English
    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Risk Management, a collection of timeless leadership best practices featuring insights from some of the nation’s most successful security practitioners, you can.This book can be used as a quick and effective resource to bring your security staff up to speed on security’s role in risk management. Instead of re-inventing the wheel when faced with a new challenge, these proven practices and principles will allow you to execute with confidence knowing that your peers have done so with success. Part one looks at the risk assessment and subtopics such as compliance, using risk assessments to increase security’s influence, and risk indicator dashboards. Part two discusses risk management topics such as board-level risk, global risk, risk appetite, and enterprise risk management (ERM).Security Leader Insights for Risk Management is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real-world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
  • Information Hiding in Speech Signals for Secure Communication

    • 1st Edition
    • Zhijun Wu
    • English
    In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more. This book shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN.
  • Proactive Marketing for the New and Experienced Library Director

    Going Beyond the Gate Count
    • 1st Edition
    • Melissa U.D. Goldsmith + 1 more
    • English
    Academic libraries have continually looked for technological solutions to low circulation statistics, under-usage by students and faculty, and what is perceived as a crisis in relevance, seeing themselves in competition with Google and Wikipedia. Academic libraries, however, are as relevant as they have been historically, as their primary functions within their university missions have not changed, but merely evolved. Going beyond the Gate Count argues that the problem is not relevance, but marketing and articulation. This book offers theoretical reasoning and practical advice to directors on how to better market the function of the library within and beyond the home institution. The aim of this text is to help directors, and ultimately, their librarians and staff get students and faculty back into the library, as a result of better articulation of the library’s importance. The first chapter explores the promotion of academic libraries and their function as educational systems. The next two chapters focus on the importance of the role social media and virtual presence in the academic library, and engaging and encouraging students to use the library through a variety of methods, such as visually oriented special collections. Remaining chapters discuss collaboration and collegiality, formalized reporting and marketing.
  • The Preservation and Protection of Library Collections

    A Practical Guide to Microbiological Controls
    • 1st Edition
    • Bogdan Zerek
    • English
    Preservation involves a complex of activities including climate, air-quality, and surface control, as well as microbiological control, which is a key part of preserving and protecting library collections. The Preservation and Protection of Library Collections examines microbiological control for preservation of library and archival collections. A supporting tool for conservators, this title should be integrated into conservation and preservation policy. The book comprises nine sections that cover three aspects: microbiology, surveying, and the response required. Chapters in this title cover the nature of the library collections, physical and chemicals factors and their impact on microbiological issues, as well as biological factors and methods of microbiological control of the air and objects. Later chapters examine methods of object disinfection, disaster response, methods of microbiological control and evaluation of collections, and includes a vocabulary guide, appendices, literature information and references.
  • Online Security for the Business Traveler

    • 1st Edition
    • Deborah Gonzalez
    • English
    Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today’s high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and Google Glass. Each of these devices offers new levels of productivity and efficiency, but they also become the weak link in the security chain: if a device is lost or stolen during travel, the resulting data breach can put the business in danger of physical, financial, and reputational loss. Online Security for the Business Traveler provides an overview of this often overlooked problem, explores cases highlighting specific security issues, and offers practical advice on what to do to ensure business security while traveling and engaging in online activity. It is an essential reference guide for any travelling business person or security professional.
  • Measuring and Managing Information Risk

    A FAIR Approach
    • 1st Edition
    • Jack Freund + 1 more
    • English
    Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk of any size or complexity. Intended for organizations that need to either build a risk management program from the ground up or strengthen an existing one, this book provides a unique and fresh perspective on how to do a basic quantitative risk analysis. Covering such key areas as risk theory, risk calculation, scenario modeling, and communicating risk within the organization, Measuring and Managing Information Risk helps managers make better business decisions by understanding their organizational risk.
  • Scholarly Information Discovery in the Networked Academic Learning Environment

    • 1st Edition
    • LiLi Li
    • English
    In the dynamic and interactive academic learning environment, students are required to have qualified information literacy competencies while critically reviewing print and electronic information. However, many undergraduates encounter difficulties in searching peer-reviewed information resources. Scholarly Information Discovery in the Networked Academic Learning Environment is a practical guide for students determined to improve their academic performance and career development in the digital age. Also written with academic instructors and librarians in mind who need to show their students how to access and search academic information resources and services, the book serves as a reference to promote information literacy instructions. This title consists of four parts, with chapters on the search for online and printed information via current academic information resources and services: part one examines understanding information and information literacy; part two looks at academic information delivery in the networked world; part three covers searching for information in the academic learning environment; and part four discusses searching and utilizing needed information in the future in order to be more successful beyond the academic world.
  • Six Key Communication Skills for Records and Information Managers

    • 1st Edition
    • Kenneth Laurence Neal
    • English
    Excellent business communication skills are especially important for information management professionals, particularly records managers, who have to communicate a complex idea: how an effective program can help the organization be better prepared for litigation, and do it in a way that is persuasive in order to win records program support and budget. <I>Six Key Communication Skills for Records and Information Managers</I> explores those skills that enable records and information to have a better chance of advancing their programs and their careers. Following an introduction from the author, this book will focus on six key communication skills: be brief, be clear, be receptive, be strategic, be credible and be persuasive. Honing these skills will enable readers to more effectively obtain support for strategic programs, communicate more effectively with senior management, IT personnel and staff, and master key forms of business communication including written, verbal and formal presentations. The final chapter will highlight one of the most practical applications of applying the skills for records and information managers: the business case. Based on real events, the business cases spotlighted involve executives who persuaded organizations to adopt new programs. These case histories bring to life many of the six keys to effective communication.