Writing to Win: The Legal Writer


Steven D. Stark - 1999
    Legal education, which focuses on judicial opinions, not instruments of persuasion, is partly to blame. Yet forceful writing is one of the most potent weapons of legal advocacy. In Writing to Win, Steve Stark, a former teacher of writing at Harvard Law, who has taught thousands of aspiring and practicing lawyers, has written the only book on the market that applies the universal principles of vigorous prose to the job of making a case--and winning it.Writing to Win focuses on the writing of lawyers, not judges, and includes dozens of examples of effective (and ineffective) real-life writing--as well as models drawn from advertising, journalism, and fiction. It deals with the problems lawyers face in writing, from organization to strengthening and editing prose; teaches ways of improving arguments; addresses litigation and technical writing in all its forms; and covers the writing attorneys must perform in their practice, from memos and letters to briefs and contracts. Each chapter opens with a succinct set of rules for easy reference.No other legal writing book on the market is as practical, as focused on results, as well written as Writing to Win.

The Leader Assistant: Four Pillars of a Confident, Game-Changing Assistant


Jeremy Burrows - 2020
    Whether it's a job change, shifting deadlines, a micromanaging executive, a toxic co-worker, a high-pressure project, or an intense negotiation with a vendor, the administrative profession is not for the faint of heart.If you're looking to maintain the status quo and be "just an assistant," this book is not for you. But, if you want the confidence and ability to conquer the challenges that most try to avoid, then you're in the right place.The Leader Assistant outlines four pillars—embody the characteristics, employ the tactics, engage in relationships, and exercise self-care—that will help you rediscover your passion for the profession and become a confident, future-proof, game-changing Leader Assistant. If you neglect even one pillar, you'll head for burnout, stagnation, and anonymity. You are meant for so much more. Are you ready to be the Leader Assistant the world needs?

CISSP Study Guide


Eric Conrad - 2010
    The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.

Managing the Testing Process: Practical Tools and Techniques for Managing Hardware and Software Testing


Rex Black - 1999
    The preeminent expert in his field, Mr.Black draws upon years of experience as president of both theInternational and American Software Testing Qualifications boardsto offer this extensive resource of all the standards, methods, andtools you'll need.The book covers core testing concepts and thoroughly examinesthe best test management practices and tools of leading hardwareand software vendors. Step-by-step guidelines and real-worldscenarios help you follow all necessary processes and avoidmistakes.Producing high-quality computer hardware and software requirescareful, professional testing; Managing the Testing Process, Third Edition explains how to achieve that by following adisciplined set of carefully managed and monitored practices andprocessesThe book covers all standards, methods, and tools you need forprojects large and smallPresents the business case for testing products and reviews theauthor's latest test assessmentsTopics include agile testing methods, risk-based testing, IEEEstandards, ISTQB certification, distributed and outsourced testing, and moreOver 100 pages of new material and case studies have been addedto this new editionIf you're responsible for managing testing in the real world, Managing the Testing Process, Third Edition is the valuablereference and guide you need.

Johnny Cash: A Life from Beginning to End (Biographies of Musicians)


Hourly History - 2022
    

slide:ology: The Art and Science of Creating Great Presentations


Nancy Duarte - 2008
    Presentation software is one of the few tools that requires professionals to think visually on an almost daily basis. But unlike verbal skills, effective visual expression is not easy, natural, or actively taught in schools or business training programs. slide:ology fills that void.Written by Nancy Duarte, President and CEO of Duarte Design, the firm that created the presentation for Al Gore's Oscar-winning film, An Inconvenient Truth, this book is full of practical approaches to visual story development that can be applied by anyone. The book combines conceptual thinking and inspirational design, with insightful case studies from the world's leading brands. With slide:ology you'll learn to:Connect with specific audiencesTurn ideas into informative graphicsUse sketching and diagramming techniques effectivelyCreate graphics that enable audiences to process information easilyDevelop truly influential presentationsUtilize presentation technology to your advantageMillions of presentations and billions of slides have been produced -- and most of them miss the mark. slide:ology will challenge your traditional approach to creating slides by teaching you how to be a visual thinker. And it will help your career by creating momentum for your cause.--back cover

The Will to Lead, the Skill to Teach: Transforming Schools at Every Level


Anthony Muhammad - 2011
    The authors acknowledge both the structural and sociological issues that contribute to low-performing schools and offer multiple tools and strategies to assess and improve classroom management, increase literacy, establish academic vocabulary, and contribute to a healthier school culture.

The One Minute Manager Meets the Monkey


Kenneth H. Blanchard - 1989
    With a vivid, humorous, and too familiar scenario they show a manager loaded down by all the monkeys that have jumped from their rightful owners onto his back. Then step by step they show how managers can free themselves from doing everyone else's job and ensure that every problem is handled by the proper staff person. By using Oncken's Four Rules of Monkey Management managers will learn to become effective supervisors of time, energy, and talent -- especially their own.If you have ever wondered why you are in the office on the weekends and your staff is on the golf course, The One Minute Manager Meets the Monkey is for you. It's priceless!

Designing Effective Instruction


Gary R. Morrison - 2000
    Maintaining a careful balance between theory and application, the Fourth Edition presents a practical, easy-to-follow approach to instructional design that can be applied to K-12 classrooms, higher education, distance education, and business programs. The authors incorporate behavioral and cognitive approaches into their model, so that readers can reap the benefits of both.

An Inconvenient Year


Yvonne Joye - 2012
    It is a story of coping with uncertainty, the reactions of others and living with them too. It documents the total shock and utter fear that a diagnosis brings and the hopelessness of surrendering to a treatment that brings its own baggage yet ultimately insures life. It talks about confronting hair loss along with discovering the more covert assault on all things feminine. Yet at the very root of the book, ahead of the fear and anger, there is humour and laughter. Though the story of cancer has been told before, it has not been told like this"

Strengths Finder 2.0


Tom Rath - 2007
    From the cradle to the cubicle, we devote more time to fixing our shortcomings than to developing our strengths.To help people uncover their talents, Gallup introduced StrengthsFinder in the 2001 management book Now, Discover Your Strengths. The book ignited a global conversation, while StrengthsFinder helped millions discover their top five talents.In StrengthsFinder 2.0, Gallup unveils the new and improved version of its popular online assessment. With hundreds of strategies for applying your strengths, StrengthsFinder 2.0 will change the way you look at yourself and the world forever.

This Is What a Librarian Looks Like: A Celebration of Libraries, Communities, and Access to Information


Kyle Cassidy - 2017
    Since then, Cassidy has made it his mission to remind us of how essential librarians and libraries are to our communities. His subjects are men and women of all ages, backgrounds, and personal style-from pink hair and leather jackets to button-downs and blazers. In short, not necessarily what one thinks a librarian looks like. The nearly 220 librarians photographed also share their personal thoughts on what it means to be a librarian. This is What A Librarian Looks Like also includes original essay by some of our most beloved writers, journalists, and commentators including Neil Gaiman, George R.R. Martin, Nancy Pearl, Cory Doctorow, Paula Poundstone, Amanda Palmer, Peter Sagal, Jeff VanderMeer, John Scalzi, Sara Farizan, Amy Dickinson, and others. Cassidy also profiles a handful of especially influential librarians and libraries.

Introduction to Public Health


Mary Jane Schneider - 1999
    Key Features: The Author Uses A Reader-Friendly, Narrative Style Making The Text Engaging And Accessible To A Broad Range Of Students. The Text Illustrates The Multidisciplinary Nature Of Public Health And The Complex Ethical And Political Issues Central To It. It Includes Discussions Of Epidemiological Investigation, Biomedical Research, Environmental Assessment, Analyses Of Individual And Group Behavior, Massive Data Collection Efforts, And Policy Developments. New To This Edition: New Discussions About U.S. Health Care Reform New Discussions Of The Globalization Of National Economies And Its Effect On The Health Of Populations Expanded Discussions On Health Disparities New Analysis Of What Went Wrong Just After Hurricane Katrina Updated Discussions Of Developments In Topics Such Are H1N1 Swine Flu, Hormone Replacement Therapy, FDA Regulation, HPV Vaccine Controversy Planning For Healthy People 2020 And Much More.

Presentation Zen: Simple Ideas on Presentation Design and Delivery


Garr Reynolds - 2007
    Presentation Zen challenges the conventional wisdom of making "slide presentations" in today’s world and encourages you to think differently and more creatively about the preparation, design, and delivery of your presentations. Garr shares lessons and perspectives that draw upon practical advice from the fields of communication and business. Combining solid principles of design with the tenets of Zen simplicity, this book will help you along the path to simpler, more effective presentations.--back cover

Managing Risk and Information Security: Protect to Enable


Malcolm Harkins - 2012
    Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel     “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB     “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.