Book picks similar to
Navigating the Digital Age by Various


0cybersecurity-canon
cio
cyber-security-canon
risk

Rise of the Data Cloud


Frank Slootman - 2020
    

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

Over The Top: How The Internet Is (Slowly But Surely) Changing The Television Industry


Alan Wolk - 2015
    Given the intricacies of the industry, it's also going to be the most resistant to change. Alan Wolk, an industry veteran and longtime analyst and observer, lays out how the television industry is adapting to the digital era, explaining what's really happening in a tone that will appeal to laypeople and insiders alike. In the first section, Wolk takes us through how the industry works today, focusing on how the various players actually make money and who pays who for what. The next section deals with the changes that are taking place in the industry today–everything from time shifting to binge viewing to cord cutting–and how those changes are starting to create some seismic shifts. In the final section, Wolk reveals his predictions for the future and what the industry will look like in ten years time. Andrew Wallenstein, co-editor-in-chief of Variety says "Alan Wolk is one of the most insightful observers writing about the media business today. There's no better expert to help you navigate the confusing, complicated nexus of TV and the Internet." David Zaslav, President and CEO of Discovery Communications says "Alan Wolk has a deep understanding of the complex nature of television today… this is a fantastic primer of the business and one of the most educated perspectives on the future of our rapidly evolving industry."

Best Sellers from Reader's Digest Condensed Books: To Kill a Mockingbird / The Shoes of the Fisherman / Seven Days in May / To Catch an Angel


Harper Lee - 1963
    To Kill a MockingbirdThe Shoes of the FishermanSeven Days in MayTo Catch an Angel

Jane Austen's Complete Novels


Jane Austen
    Comprises the complete text of: "Sense and Sensibility", "Pride and Prejudice", "Mansfield Park", "Emma", "Northanger Abbey", "Persuasion", "Lady Susan", and "Love and Friendship". This is the only single-volume edition of Jane Austen's novels to contain not only the wickedly humorous "Lady Susan", but also the irrepressibly exuberant early work "Love and Friendship". This collection allows readers to explore the development of one of the English language's greatest writers, following her development from the farcical comedy of "Love and Friendship" and "Northanger Abbey", via her most popular work, "Pride and Prejudice", to the masterpiece "Emma", and the considered romance of "Persuasion". A unique collection of the finest and most perceptive love stories ever written.

Plants vs. Zombies: Grown Sweet Home #7


Paul Tobin - 2015
    Zomboss launches a strike at the heart of Neighborville . . . and also sparks a series of all-star plant-versus-zombie brawls! Brian Churilla (Hellbreak, Creepy Comics) draws this month's bonus stories! * Eisner Award winner Paul Tobin continues his hilarious PVZ run! * More than 500,000 PVZ collections sold!

The 2015 Halloween Horrors MEGAPACK ®


H.B. Fyfe - 2015
    (It was free on our web site on Free Ebook Tuesday on the Tuesday before Halloween). Here are:THE WHITE CAT OF DRUMGUNNIOL, by J. Sheridan Le FanuTHURNLEY ABBEY, by Perceval LandonSPIDER MANSION, by Fritz LeiberTHE GREEN THING, by Manly Banister (writing as Gregg Powers)THE ROMAN LADY, by H. B. Fyfe and John Gregory BetancourtIf you enjoy this ebook, don't forget to search your favorite ebook store for "Wildside Press Megapack" to see more of the 260+ volumes in this series, covering adventure, historical fiction, mysteries, westerns, ghost stories, science fiction -- and much, much more!

Nemesis


Anthony Riches - 2021
    Now he'll kill them all.Mickey Bale is an elite close protection officer. That's why the Met police has given him the toughest job of all: guarding the Minister of Defence at a moment when Chinese-British relations have hit a deadly boiling point.And when Mickey's life isn't on the line for his work, he's taking his chances waging war on a powerful London gang family. Their dealer supplied a lethal ecstasy pill to his sister, and Mickey is determined to take them down, one at a time.But will he get away with it – or will his colleagues in the force realise that the man on an underworld killing spree is one of their own?'Mickey Bale is a Jack Reacher for a harder, faster, more assured millennium. Nemesis is the kind of book for which the word 'compelling' was coined' Manda Scott'Meet Mickey Bale – London's John Wick. A rocket-propelled grenade of a book, shot through with gallows humour. Guy Ritchie meets Lee Child' Robyn Young

Levon Cade: The Complete Series


Chuck Dixon - 2019
    He just wants to live an anonymous life and be a good dad to his daughter. But when a local girl vanishes, he’s asked to return to the skills that made him a mythic figure in the shadowy world of counterterrorism.Follow Levon and his daughter while they go on the run from the feds and a growing army of enemies that Levon makes along the way.

The Bootstrap VA: The Go-Getter's Guide to Becoming a Virtual Assistant, Getting and Keeping Clients, and More!


Lisa Morosky - 2012
    It also includes interviews with successful virtual assistants, interviews with clients who utilize a virtual assistant, resources at the end of most chapters, a 30-day reading guide and action plan, and access to The Bootstrap VA Facebook Group where readers can bounce ideas off of each other, ask Lisa questions, and get the support needed no matter where they are in the process of becoming and working as a virtual assistant.If you want to get started as a virtual assistant, and you're a go-getter looking to bootstrap your way to success, this is an eBook you can't afford to miss.ABOUT THE AUTHORLisa Morosky is the author of "The Bootstrap VA: The Go-Getter's Guide to Becoming a Virtual Assistant, Getting and Keeping Clients, and More!" and is a premier virtual assistant in the blogging, Internet marketing, social media, and online business realms. As the founder of VAforBloggers.com, Lisa worked with dozens of clients from 2009-2011, received mentions by and recommendations from top experts, spoke at the BlogWorld conference in Las Vegas, and built a business from the ground up. In 2011, Lisa made the decision to cut back, reposition her services and her client base, and spend more time on personal projects. She moved her services to her new, centralized home at The Home Life {and Me}, lowered her rates (to pass on her new savings to her clients), and changed her title to "blog helper". In 2012, Lisa launched her virtual assistant coaching services.In addition to being a virtual assistant and a virtual assistant coach, Lisa is a Christ follower, a proud wife to her amazing husband, a homemaker, a real foodie, and a lover of all things simple and natural. You can find her blogging about creating a simple, natural, faith-inspired home life at http://www.thehomelifeand.me.

The Pecos Undertaker (Stark & Buchanan Book 1)


Mel Odom - 2020
    Blunt talks to Mr. Henson, Charlie’s mentor, like he knows him, but Charlie knows that can’t be. John Peter Henson is a good man who would only spend time with someone like Blunt the day he put him into the ground…Unwilling to give up Mr. Henson’s secret and tarnish his good name, Charlie tries to put the pieces together himself. Maggie Buchanan knows he’s hiding something and she’s on his trail as well. Together, they turn the tables on Blunt’s outlaws. Charlie ends up in possession of a treasure map to Mexican gold that may just get him killed.“The pace is fast, the action plentiful, the characters colorful and memorable, and the writing is top-notch.” – Wayne D. Dundee

OS X Lion: the Ars Review


John Siracusa - 2011
    

The Novels of P.G. Wodehouse


P.G. Wodehouse - 2009
    Austin's 1903Three Men and a Maid 1922Uneasy Money 1917The White Feather 1907A Wodehouse Miscellany, Articles & Stories 1916

Microsoft .NET - Architecting Applications for the Enterprise


Dino Esposito - 2014
    But the principles and practices of software architecting–what the authors call the “science of hard decisions”–have been evolving for cloud, mobile, and other shifts. Now fully revised and updated, this book shares the knowledge and real-world perspectives that enable you to design for success–and deliver more successful solutions. In this fully updated Second Edition, you will: Learn how only a deep understanding of domain can lead to appropriate architecture Examine domain-driven design in both theory and implementation Shift your approach to code first, model later–including multilayer architecture Capture the benefits of prioritizing software maintainability See how readability, testability, and extensibility lead to code quality Take a user experience (UX) first approach, rather than designing for data Review patterns for organizing business logic Use event sourcing and CQRS together to model complex business domains more effectively Delve inside the persistence layer, including patterns and implementation.

How to Measure Anything in Cybersecurity Risk


Douglas W. Hubbard - 2016
    In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely.Discover the shortcomings of cybersecurity's best practices Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing--as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.