Book picks similar to
Structured Analytic Techniques For Intelligence Analysis by Richards J. Heuer Jr.
intelligence
business
reference
intelligence-analysis
Death March
Edward Yourdon - 1997
This work covers the project lifecycle, addressing every key issue participants face: politics, people, process, project management, and tools.
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
Don Murdoch - 2014
The BTHb includes essential information in a condensed handbook format. Main topics include the incident response process, how attackers work, common tools for incident response, a methodology for network analysis, common indicators of compromise, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, packet headers, and numerous other quick reference topics. The book is designed specifically to share "real life experience," so it is peppered with practical techniques from the authors' extensive career in handling incidents. Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server - this book should help you handle the case and teach you some new techniques along the way.
The Dragonfly Effect: Quick, Effective, and Powerful Ways to Use Social Media to Drive Social Change
Jennifer Aaker - 2010
But no book addresses how to harness the incredible power of social media to make a difference. "The Dragonfly Effect" shows you how to tap social media and consumer psychological insights to achieve a single, concrete goal. Named for the only insect that is able to move in any direction when its four wings are working in concert, this bookReveals the four "wings" of the Dragonfly Effect-and how they work together to produce colossal resultsFeatures original case studies of global organizations like the Gap, Starbucks, Kiva, Nike, eBay, Facebook; and start-ups like Groupon and COOKPAD, showing how they achieve social good and customer loyaltyLeverage the power of design thinking and psychological research with practical strategiesReveals how everyday people achieve unprecedented results-whether finding an almost impossible bone marrow match for a friend, raising millions for cancer research, or electing the current president of the United States"The Dragonfly Effect" shows that you don't need money or power to inspire seismic change.
Radical Candor: Be a Kickass Boss Without Losing Your Humanity
Kim Malone Scott - 2017
While this advice may work for everyday life, it is, as Kim Scott has seen, a disaster when adopted by managers.Scott earned her stripes as a highly successful manager at Google and then decamped to Apple, where she developed a class on optimal management. She has earned growing fame in recent years with her vital new approach to effective management, the “radical candor” method.Radical candor is the sweet spot between managers who are obnoxiously aggressive on one side and ruinously empathetic on the other. It’s about providing guidance, which involves a mix of praise as well as criticism—delivered to produce better results and help employees achieve.Great bosses have strong relationships with their employees, and Scott has identified three simple principles for building better relationships with your employees: make it personal, get (sh)it done, and understand why it matters.Radical Candor offers a guide to those bewildered or exhausted by management, written for bosses and those who manage bosses. Taken from years of the author’s experience, and distilled clearly giving actionable lessons to the reader; it shows managers how to be successful while retaining their humanity, finding meaning in their job, and creating an environment where people both love their work and their colleagues.
Artificial Intelligence: A Modern Approach
Stuart Russell - 1994
The long-anticipated revision of this best-selling text offers the most comprehensive, up-to-date introduction to the theory and practice of artificial intelligence. *NEW-Nontechnical learning material-Accompanies each part of the book. *NEW-The Internet as a sample application for intelligent systems-Added in several places including logical agents, planning, and natural language. *NEW-Increased coverage of material - Includes expanded coverage of: default reasoning and truth maintenance systems, including multi-agent/distributed AI and game theory; probabilistic approaches to learning including EM; more detailed descriptions of probabilistic inference algorithms. *NEW-Updated and expanded exercises-75% of the exercises are revised, with 100 new exercises. *NEW-On-line Java software. *Makes it easy for students to do projects on the web using intelligent agents. *A unified, agent-based approach to AI-Organizes the material around the task of building intelligent agents. *Comprehensive, up-to-date coverage-Includes a unified view of the field organized around the rational decision making pa
The Logic of Failure: Recognizing and Avoiding Error in Complex Situations
Dietrich Dörner - 1996
Working with imaginative and often hilarious computer simulations, he analyzes the roots of catastrophe, showing city planners in the very act of creating gridlock and disaster, or public health authorities setting the scene for starvation. The Logic of Failure is a compass for intelligent planning and decision-making that can sharpen the skills of managers, policymakers and everyone involved in the daily challenge of getting from point A to point B.
Why Smart People Can Be So Stupid
Robert J. Sternberg - 2002
The behavior of smart individuals—from presidents to prosecutors to professors—is at times so amazingly stupid as to seem inexplicable. Why do otherwise intelligent people think and behave in ways so stupid that they sometimes destroy their livelihoods or even their lives?This book is the first devoted to investigating what the most current psychological research can tell us about stupidity in everyday life. The contributors to the volume, renowned scholars in various areas of human intelligence, present fascinating examples of people messing up their lives, and they offer insights into the reasons for such behavior. From a variety of perspectives, the contributors discuss:• The nature and theory of stupidity• How stupidity contributes to stupid behavior• Whether stupidity is measurableWhile many millions of dollars are spent each year on intelligence research and testing to determine who has the ability to succeed, next to nothing is spent to determine who will make use of their intelligence and not squander it by behaving stupidly. Why Smart People Can Be So Stupid focuses on the neglected side of this discussion, reviewing the full range of theory and research on stupid behavior and analyzing what it tells us about how people can avoid stupidity and its devastating consequences.
Spec Ops: Case Studies in Special Operations Warfare: Theory and Practice
William H. McRaven - 1996
William H. McRaven helped to devise the strategy for how to bring down Osama bin Laden, and commanded the courageous U.S. military unit that carried it out on May 1, 2011, ending one of the greatest manhunts in history. In Spec Ops, a well-organized and deeply researched study, McRaven analyzes eight classic special operations. Six are from WWII: the German commando raid on the Belgian fort Eben Emael (1940); the Italian torpedo attack on the Alexandria harbor (1941); the British commando raid on Nazaire, France (1942); the German glider rescue of Benito Mussolini (1943); the British midget-submarine attack on the Tirpitz (1943); and the U.S. Ranger rescue mission at the Cabanatuan POW camp in the Philippines (1945). The two post-WWII examples are the U.S. Army raid on the Son Tay POW camp in North Vietnam (1970) and the Israeli rescue of the skyjacked hostages in Entebbe, Uganda (1976). McRaven—who commands a U.S. Navy SEAL team—pinpoints six essential principles of “spec ops” success: simplicity, security, repetition, surprise, speed and purpose. For each of the case studies, he provides political and military context, a meticulous reconstruction of the mission itself and an analysis of the operation in relation to his six principles. McRaven deems the Son Tay raid “the best modern example of a successful spec op [which] should be considered textbook material for future missions.” His own book is an instructive textbook that will be closely studied by students of the military arts. Maps, photos.
Unlocking Leadership Mindtraps: How to Thrive in Complexity
Jennifer Garvey Berger - 2019
Complexity can be a terrible and overwhelming force, or it can be a delightful source of new energy and possibility-it all depends on your ability to escape the mindtraps we fall into and create new habits for a new world.
Marketing: An Introduction
Gary M. Armstrong - 1984
Its coverage balances upon three essential pillars: (1) theory and concepts; (2) practices and applications; and (3) effective learning tools. A four-part organization details topics under the headings of: understanding marketing and the marketing management process, assessing opportunities in a dynamic marketing environment, developing marketing strategy and the marketing mix, and extending marketing. For individuals interested in taking an intriguing, discovery-filled journey to the business of marketing--in sales forces, retailing, advertising, research, or any other areas.
Computer Networks
Andrew S. Tanenbaum - 1981
In this revision, the author takes a structured approach to explaining how networks function.
The C Programming Language
Brian W. Kernighan - 1978
It is the definitive reference guide, now in a second edition. Although the first edition was written in 1978, it continues to be a worldwide best-seller. This second edition brings the classic original up to date to include the ANSI standard. From the Preface: We have tried to retain the brevity of the first edition. C is not a big language, and it is not well served by a big book. We have improved the exposition of critical features, such as pointers, that are central to C programming. We have refined the original examples, and have added new examples in several chapters. For instance, the treatment of complicated declarations is augmented by programs that convert declarations into words and vice versa. As before, all examples have been tested directly from the text, which is in machine-readable form. As we said in the first preface to the first edition, C "wears well as one's experience with it grows." With a decade more experience, we still feel that way. We hope that this book will help you to learn C and use it well.
Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet
Eoghan Casey - 1999
Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked, collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime. This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, readers will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations. Readers will receive access to the author's accompanying Web site which contains simulated cases that integrate many of the topics covered in the text. Frequently updated, these cases teaching individuals about: • Components of computer networks • Use of computer networks in an investigation • Abuse of computer networks • Privacy and security issues on computer networks • The law as it applies to computer networks• Provides a thorough explanation of how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence • Offers readers information about relevant legal issues • Features coverage of the abuse of computer networks and privacy and security issues on computer networks• Free unlimited access to author's Web site which includes numerous and frequently updated case examples
The Art of Non-Conformity: Set Your Own Rules, Live the Life You Want, and Change the World
Chris Guillebeau - 2010
You'll discover how to live on your own terms by exploring creative self-employment, radical goal-setting, contrarian travel, and embracing life as a constant adventure.Inspired and guided by Chris's own story and those of others who have pursued unconventional lives, you can devise your own plan for world domination-and make the world a better place at the same time.
Out of Our Minds: Learning to Be Creative
Ken Robinson - 2001
This is a book not to be missed. Read and rejoice.' KEN BLANCHARD'If ever there was a time when creativity was necessary for the survival and growth of any organization, it is now. This book, more than any other I know, provides important insights on how leaders can evoke and sustain those creative juices.' WARREN BENNIS