Book picks similar to
Information Technology Project Management: Providing Measurable Organizational Value [With CDROM] by Jack T. Marchewka
project-management
technology
tech-industry-books
knowledge-management
Emergence: The Connected Lives of Ants, Brains, Cities, and Software
Steven Johnson - 2001
Explaining why the whole is sometimes smarter than the sum of its parts, Johnson presents surprising examples of feedback, self-organization, and adaptive learning. How does a lively neighborhood evolve out of a disconnected group of shopkeepers, bartenders, and real estate developers? How does a media event take on a life of its own? How will new software programs create an intelligent World Wide Web? In the coming years, the power of self-organization -- coupled with the connective technology of the Internet -- will usher in a revolution every bit as significant as the introduction of electricity. Provocative and engaging, Emergence puts you on the front lines of this exciting upheaval in science and thought.
The Fifth Discipline: The Art & Practice of The Learning Organization
Peter M. Senge - 1990
As Senge makes clear, in the long run the only sustainable competitive advantage is your organization’s ability to learn faster than the competition. The leadership stories in the book demonstrate the many ways that the core ideas in The Fifth Discipline, many of which seemed radical when first published in 1990, have become deeply integrated into people’s ways of seeing the world and their managerial practices. In The Fifth Discipline, Senge describes how companies can rid themselves of the learning “disabilities” that threaten their productivity and success by adopting the strategies of learning organizations—ones in which new and expansive patterns of thinking are nurtured, collective aspiration is set free, and people are continually learning how to create results they truly desire. The updated and revised Currency edition of this business classic contains over one hundred pages of new material based on interviews with dozens of practitioners at companies like BP, Unilever, Intel, Ford, HP, Saudi Aramco, and organizations like Roca, Oxfam, and The World Bank. It features a new Foreword about the success Peter Senge has achieved with learning organizations since the book’s inception, as well as new chapters on Impetus (getting started), Strategies, Leaders’ New Work, Systems Citizens, and Frontiers for the Future. Mastering the disciplines Senge outlines in the book will:• Reignite the spark of genuine learning driven by people focused on what truly matters to them• Bridge teamwork into macro-creativity• Free you of confining assumptions and mindsets• Teach you to see the forest and the trees• End the struggle between work and personal time
Team Topologies: Organizing Business and Technology Teams for Fast Flow
Matthew Skelton - 2019
But how do you build the best team organization for your specific goals, culture, and needs? Team Topologies is a practical, step-by-step, adaptive model for organizational design and team interaction based on four fundamental team types and three team interaction patterns. It is a model that treats teams as the fundamental means of delivery, where team structures and communication pathways are able to evolve with technological and organizational maturity.In Team Topologies, IT consultants Matthew Skelton and Manuel Pais share secrets of successful team patterns and interactions to help readers choose and evolve the right team patterns for their organization, making sure to keep the software healthy and optimize value streams.Team Topologies is a major step forward in organizational design for software, presenting a well-defined way for teams to interact and interrelate that helps make the resulting software architecture clearer and more sustainable, turning inter-team problems into valuable signals for the self-steering organization.
UML 2 and the Unified Process: Practical Object-Oriented Analysis and Design
Jim Arlow - 2001
Even for people not working with the Unified Process, the book is still of great use. UML 2 and the Unified Process, Second Edition is a must-read for every UML 2 beginner and a helpful guide and reference for the experienced practitioner."--Roland Leibundgut, Technical Director, Zuehlke Engineering Ltd."This book is a good starting point for organizations and individuals who are adopting UP and need to understand how to provide visualization of the different aspects needed to satisfy it. "--Eric Naiburg, Market Manager, Desktop Products, IBM Rational SoftwareThis thoroughly revised edition provides an indispensable and practical guide to the complex process of object-oriented analysis and design using UML 2. It describes how the process of OO analysis and design fits into the software development lifecycle as defined by the Unified Process (UP). UML 2 and the Unified Process contains a wealth of practical, powerful, and useful techniques that you can apply immediately. As you progress through the text, you will learn OO analysis and design techniques, UML syntax and semantics, and the relevant aspects of the UP. The book provides you with an accurate and succinct summary of both UML and UP from the point of view of the OO analyst and designer.This book providesChapter roadmaps, detailed diagrams, and margin notes allowing you to focus on your needs Outline summaries for each chapter, making it ideal for revision, and a comprehensive index that can be used as a reference New to this edition:Completely revised and updated for UML 2 syntax Easy to understand explanations of the new UML 2 semantics More real-world examples A new section on the Object Constraint Language (OCL) Introductory material on the OMG's Model Driven Architecture (MDA) The accompanying website providesA complete example of a simple e-commerce system Open source tools for requirements engineering and use case modeling Industrial-strength UML course materials based on the book
The Perfect Weapon: How the Cyber Arms Race Set the World Afire
David E. Sanger - 2018
The Perfect Weapon is the riveting story of how, in less than a decade, cyberwarfare displaced terrorism and nuclear attacks as the greatest threat to American national security. Cheap to acquire, difficult to defend against, and designed to shield their user's identities so as to complicate retaliation, these weapons are capable of an unprecedented range of offensive tactics; they can take us just short of war, allowing for everything from disruption to theft to the cause of widespread damage of essential infrastructure systems. And the vulnerability of those systems has created a related but equally urgent conflict: American companies like Apple and Cisco must claim allegiance to no government in the name of selling secure products around the globe yet the US intelligence agencies want the help of such companies in defending against future cyberattacks. Reported and written with unprecedented access by New York Times chief Washington correspondent and bestselling author David Sanger, The Perfect Weapon takes readers inside war rooms and boardrooms, into the secret cyberdens of American and Chinese military, to give the deep-background story of the increasingly pitched battle between nations, their governments, their cyberwarriors, and their corporations.
Shape Up: Stop Running in Circles and Ship Work that Matters
Ryan Singer - 2019
"This book is a guide to how we do product development at Basecamp. It’s also a toolbox full of techniques that you can apply in your own way to your own process.Whether you’re a founder, CTO, product manager, designer, or developer, you’re probably here because of some common challenges that all software companies have to face."
Concept-Based Curriculum and Instruction for the Thinking Classroom
H. Lynn Erickson - 2006
Synthesizing Lynn Erickson's past 15 years of field work with teachers, curriculum developers, teacher educators, and instructional leaders, this resource offers a complete guide for designing curriculum and instruction to foster the continuous growth and development of students' critical, abstract, and creative learning skills. Educators will learn how to:Bring coherence and clarity to high-quality curriculum design and instructional planning Teach the way that students' minds learn best Encourage students' creative and abstract thinking, regardless of level or subject area Gain the support of principals and district administrators
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Richard Bejtlich - 2013
The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.
Think Like a Programmer: An Introduction to Creative Problem Solving
V. Anton Spraul - 2012
In this one-of-a-kind text, author V. Anton Spraul breaks down the ways that programmers solve problems and teaches you what other introductory books often ignore: how to Think Like a Programmer. Each chapter tackles a single programming concept, like classes, pointers, and recursion, and open-ended exercises throughout challenge you to apply your knowledge. You'll also learn how to:Split problems into discrete components to make them easier to solve Make the most of code reuse with functions, classes, and libraries Pick the perfect data structure for a particular job Master more advanced programming tools like recursion and dynamic memory Organize your thoughts and develop strategies to tackle particular types of problems Although the book's examples are written in C++, the creative problem-solving concepts they illustrate go beyond any particular language; in fact, they often reach outside the realm of computer science. As the most skillful programmers know, writing great code is a creative art—and the first step in creating your masterpiece is learning to Think Like a Programmer.
PHP for the World Wide Web (Visual QuickStart Guide)
Larry Ullman - 2001
It covers topics such as Zend Engine, XML support, SQLite, and others.
Access 2007: The Missing Manual
Matthew MacDonald - 2006
It runs on PCs rather than servers and is ideal for small- to mid-sized businesses and households. But Access is still intimidating to learn. It doesn't help that each new version crammed in yet another set of features; so many, in fact, that even the pros don't know where to find them all. Access 2007 breaks this pattern with some of the most dramatic changes users have seen since Office 95. Most obvious is the thoroughly redesigned user interface, with its tabbed toolbar (or "Ribbon") that makes features easy to locate and use. The features list also includes several long-awaited changes. One thing that hasn't improved is Microsoft's documentation. To learn the ins and outs of all the features in Access 2007, Microsoft merely offers online help.Access 2007: The Missing Manual was written from the ground up for this redesigned application. You will learn how to design complete databases, maintain them, search for valuable nuggets of information, and build attractive forms for quick-and-easy data entry. You'll even delve into the black art of Access programming (including macros and Visual Basic), and pick up valuable tricks and techniques to automate common tasks -- even if you've never touched a line of code before. You will also learn all about the new prebuilt databases you can customize to fit your needs, and how the new complex data feature will simplify your life. With plenty of downloadable examples, this objective and witty book will turn an Access neophyte into a true master.
Born Digital: Understanding the First Generation of Digital Natives
John Palfrey - 2008
Our economy, our politics, our culture, and even the structure of our family life will be forever transformed." "Based on extensive original research, including interviews with Digital Natives around the world, Born Digital explores a broad range of issues, from the highly philosophical to the purely practical: What does identity mean for young people who have dozens of online profiles and avatars? Should we worry about privacy issues - or is privacy even a relevant concern for Digital Natives? How does the concept of safety translate into an increasingly virtual world? Are online games addictive, and how do we need to worry about violent video games? What is the Internet's impact on creativity and learning? What lies ahead - socially, professionally, and psychologically - for this generation?" A smart, practical guide to a brave new world and its complex inhabitants, Born Digital will be essential reading for parents, teachers, and the myriad of confused adults who want to understand the digital present - and shape the digital future.
Special Education: Contemporary Perspectives for School Professionals
Marilyn Friend - 2004
Contemporary concepts and evidence-based practices prepare new teachers for their roles in the education and well-being of students with disabilities and other special needs. Marilyn Friend combines research-informed concepts and skills with practical information for educators working in this challenging age of high standards and accountability, curriculum access, inclusive practices, professional collaboration, and student diversity. The third edition integrates the requirements of the NCLB and IDEA legislation with evidence-based practices so that readers understand the expectations for educators and students, and learn how critical concepts translate into educational practices. Real People, Real Classrooms:"Chapter Opening Vignettes "describe the experiences of three different students of varying ages as they relate to the topics discussed in each chapter and are referenced at key points in the chapter."Firsthand Account"features real life stories from teachers, students, parents, and school professionals sharing their own experiences and perspectives relating to life and learning with special needs."""Speaking from Experience "features capture the insights and advice of experienced teachers on topics ranging from working effectively with colleagues to finding ways to juggle all the responsibilities of being a special educator to addressing a variety of professional challenges, including those related to student behavior and family concerns.Real Research:Instruction in Action highlight teaching application for intensive instruction delivered by special education teachers in various educational settings.Positive Behavioral Supports illustrates the many positive, proactive ways to address students' behavior/social issues as part of overall classroom teaching and learning.Cutting Edge InformationTechnology Notes features showcase fascinating instructional and assistive technology applications for teaching students with exceptional needs in special educational settings as well as links to information that can help beginning teachers plan their lessons, motivate their students, and keep abreast of their rapidly changing field.Professional Edge features describe conceptual materials and cutting edge information that connect theory to practice.
Guide to Computer Forensics and Investigations (Book & CD)
Bill Nelson - 2003
This resource guides readers through conducting a high-tech investigation, from acquiring digital evidence to reporting its findings. Updated coverage includes new software and technologies as well as up-to-date reference sections, and content includes how to set up a forensics lab, how to acquire the proper and necessary tools, and how to conduct the investigation and subsequent digital analysis. It is appropriate for students new to the field, or as a refresher and technology update for professionals in law enforcement, investigations, or computer security. The book features free downloads of the latest forensic software, so readers can become familiar with the tools of the trade.