Normal Accidents: Living with High-Risk Technologies


Charles Perrow - 1984
    Charles Perrow argues that the conventional engineering approach to ensuring safety--building in more warnings and safeguards--fails because systems complexity makes failures inevitable. He asserts that typical precautions, by adding to complexity, may help create new categories of accidents. (At Chernobyl, tests of a new safety system helped produce the meltdown and subsequent fire.) By recognizing two dimensions of risk--complex versus linear interactions, and tight versus loose coupling--this book provides a powerful framework for analyzing risks and the organizations that insist we run them.The first edition fulfilled one reviewer's prediction that it may mark the beginning of accident research. In the new afterword to this edition Perrow reviews the extensive work on the major accidents of the last fifteen years, including Bhopal, Chernobyl, and the Challenger disaster. The new postscript probes what the author considers to be the quintessential 'Normal Accident' of our time: the Y2K computer problem.

Megatrends Asia


John Naisbitt - 1996
    While the attention of the West has been fixed on the USSR and Eastern Europe, a quieter, cumulative revolution has been taking place in Asia which may have even more profound consequences for world history.

Programming Languages: Design and Implementation


Terrence W. Pratt - 1995
    The emphasis throughout is on fundamental concepts--readers learn important ideas, not minor language differences--but several languages are highlighted in sufficient detail to enable readers to write programs that demonstrate the relationship between a source program and its execution behavior--e.g., C, C++, JAVA, ML, LISP, Prolog, Smalltalk, Postscript, HTML, PERL, FORTRAN, Ada, COBOL, BASIC SNOBOL4, PL/I, Pascal. Begins with a background review of programming languages and the underlying hardware that will execute the given program; then covers the underlying grammatical model for programming languages and their compilers (elementary data types, data structures and encapsulation, inheritance, statements, procedure invocation, storage management, distributed processing, and network programming). Includes an advanced chapter on language semantics--program verification, denotational semantics, and the lambda calculus. For computer engineers and others interested in programming language designs.

Strengths Based Leadership: Great Leaders, Teams, and Why People Follow: A Landmark Study of Great Leaders, Teams, and the Reasons Why We Follow


Tom Rath - 2007
    In recent years, while continuing to learn more about strengths, Gallup scientists have also been ex....

Master Getting Things Done the David Allen Way with Evernote: Your 7-Day GTD Immediate Action Plan


Dominic Wolff - 2013
    Add to this the frustration of using incomplete systems that are supposed to help you, and the stress levels just shoot up. - Get rid of 'stuff', eliminate stress and simplify every area of your life. - Give you the satisfaction and freedom of feeling that you have every aspect of your life, both professional and personal, under control - Frees up your time and mental resources - Helps you to get everything on your to-do list done in an almost effortless wayAs you read these words, you realise that it makes so much sense to have a proven integrated system to make your work and personal life easier.Consider this to be your exclusive invitation to never feeling overwhelmed again. The system described in this book will enable you to have the peace of mind of being highly organized, even if you're not.

Change Your Brain, Change Your Life (Before 25): Change Your Developing Mind for Real World Success


Jesse Payne - 2014
    And now Dr. Jesse Payne, Director of Education at the Amen Clinics, is bringing the groundbreaking science of the Change Your Brain program to a whole new generation of readers. The brain is particularly malleable until the age of 25, which means that even more than your parents or your teachers, you have the power to change your brain. And the things you do today—from what you eat, to how you sleep, to what you do for fun—can change your brain in drastic ways. This book provides a powerful, prescriptive program for you to avoid the common dangers and pitfalls that can jeopardize your future and train your brain for a lifetime of success. Discover how to *Improve academic performance *�Nurture creativity *�Treat diagnoses like ADD, ADHD and depression *�Enhance relationship skills *�Increase organization *�Improve memory *�Boost mood *�And more! Featuring stories from real teens and young adults along with actual brain scans that show how effectively this program works, Change Your Brain, Change Your Life (Before 25) is perfect for teens and young adults, their parents and the professionals who work with them. Turn the page for a bright future and a successful tomorrow.

The Youtube Formula: How Anyone Can Unlock the Algorithm to Drive Views, Build an Audience, and Grow Revenue


Derral Eves - 2021
    In The YouTube Formula: How Anyone Can Unlock the Algorithm to Drive Views, Build an Audience, and Grow Revenue, the owner of the largest YouTube how-to channel provides the secrets to getting the results that every YouTube creator and strategist wants. Eves will reveal what readers can't get anywhere else: the inner workings of the YouTube algorithm that's responsible for determining success on the platform, and how creators can use it to their advantage.Full of actionable advice and concrete strategies, this book teaches readers how to:Launch a channel Create life-changing content Drive rapid view and subscriber growth Build a brand and increase engagement Improve searchability Monetize content and audience Replete with case studies and information from successful YouTube creators, The YouTube Formula is perfect for any creator, entrepreneur, social media strategist, and brand manager who hopes to see real commercial results from their work on the platform.

Applied Multivariate Statistical Analysis


Richard A. Johnson - 1982
    of Wisconsin-Madison) and Wichern (Texas A&M U.) present the newest edition of this college text on the statistical methods for describing and analyzing multivariate data, designed for students who have taken two or more statistics courses. The fifth edition includes the addition of seve

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics


John Sammons - 2011
    This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.

Ask More, Get More: How to Earn More, Save More, and Live More... Just by Asking


Michael Alden - 2014
    I’m an average guy who learned how to “ask more” to “get more” out of life. The strategies and techniques I outline in this book can help you get just about anything—a better job, a new house, or a great vacation—faster and more consistently if you’re willing to follow my advice.

Metaphors We Live By


George Lakoff - 1980
    Metaphor, the authors explain, is a fundamental mechanism of mind, one that allows us to use what we know about our physical and social experience to provide understanding of countless other subjects. Because such metaphors structure our most basic understandings of our experience, they are "metaphors we live by", metaphors that can shape our perceptions and actions without our ever noticing them.In this updated edition of Lakoff and Johnson's influential book, the authors supply an afterword surveying how their theory of metaphor has developed within the cognitive sciences to become central to the contemporary understanding of how we think and how we express our thoughts in language.

Quantum Computing Since Democritus


Scott Aaronson - 2013
    Full of insights, arguments and philosophical perspectives, the book covers an amazing array of topics. Beginning in antiquity with Democritus, it progresses through logic and set theory, computability and complexity theory, quantum computing, cryptography, the information content of quantum states and the interpretation of quantum mechanics. There are also extended discussions about time travel, Newcomb's Paradox, the anthropic principle and the views of Roger Penrose. Aaronson's informal style makes this fascinating book accessible to readers with scientific backgrounds, as well as students and researchers working in physics, computer science, mathematics and philosophy.

Hackers & Painters: Big Ideas from the Computer Age


Paul Graham - 2004
    Who are these people, what motivates them, and why should you care?Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls “an intellectual Wild West.”The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.

Child Development


Elizabeth B. Hurlock - 1972