Book picks similar to
Enterprise Security Architecture: A Business-Driven Approach by John Sherwood
security
enterprise-architecture
business
cyber-security
The Kimball Group Reader: Relentlessly Practical Tools for Data Warehousing and Business Intelligence
Ralph Kimball - 2010
Recognized and respected throughout the world as the most influential leaders in the data warehousing industry, Ralph Kimball and the Kimball Group have written articles covering more than 250 topics that define the field of data warehousing. For the first time, the Kimball Group's incomparable advice, design tips, and best practices have been gathered in this remarkable collection of articles, which spans a decade of data warehousing innovation.Each group of articles is introduced with original commentaries that explain their role in the overall lifecycle methodology developed by the Kimball Group. These practical, hands-on articles are fully updated to reflect current practices and terminology and cover the complete lifecycle--including project planning, requirements gathering, dimensional modeling, ETL, and business intelligence and analytics.This easily referenced collection is nothing less than vital if you are involved with data warehousing or business intelligence in any capacity.
Foundations of Software Testing ISTQB Certification
Rex Black - 2006
Completely updated to comprehensively reflect the most recent changes to the ISTQB Foundation Syllabus, the book adopts a practical, hands-on approach, covering the fundamental topics that every system and software tester should know. The authors are themselves developers of the ISTQB syllabus and are highly respected international authorities, teachers and authors within the field of software testing.
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Bruce Sterling - 1992
A journalist investigates the past, present, and future of computer crimes, as he attends a hacker convention, documents the extent of the computer crimes, and presents intriguing facts about hackers and their misdoings.
HBase: The Definitive Guide
Lars George - 2011
As the open source implementation of Google's BigTable architecture, HBase scales to billions of rows and millions of columns, while ensuring that write and read performance remain constant. Many IT executives are asking pointed questions about HBase. This book provides meaningful answers, whether you’re evaluating this non-relational database or planning to put it into practice right away.
Discover how tight integration with Hadoop makes scalability with HBase easier
Distribute large datasets across an inexpensive cluster of commodity servers
Access HBase with native Java clients, or with gateway servers providing REST, Avro, or Thrift APIs
Get details on HBase’s architecture, including the storage format, write-ahead log, background processes, and more
Integrate HBase with Hadoop's MapReduce framework for massively parallelized data processing jobs
Learn how to tune clusters, design schemas, copy tables, import bulk data, decommission nodes, and many other tasks
Tata
Morgen Witzel - 2010
1 Lakh/ below US$ 2500 car), is set to change our perception of India': on the threshold of becoming a truly global brand.*s oldest and most respected corporate brand. With a major international presence, in a variety of areas including steel, tea, chemicals, communications and software, Tata now stands 65th in the world brand valuation league. But what is the Tata brand all about? What are its values? How do people perceive it, in India and around the world? In this absorbing and informed book Morgen Witzel digs into the heart of the Tata enterprise, describes its origins, how Tata's reputation and image evolved, and how the group has worked to transform that image into a powerful and valuable brand. Tata: The Evolution of a Corporate Brand goes to the core of the Tata ethos to explore the unique relationship between the Tata group and the Indian people, a relationship that goes beyond the achievements of a successful business to its social contributions for its employees and the society at large. Finally it asks how that reputation will be perceived and understood as Tata moves into global markets. Whether you re an entrepreneur, a manager, a marketer, or an interested Tata loyalist this book will help you understand the durability of the brand and inspire you with the values it holds onto in the global economy.
Business Reimagined: Why Work Isn't Working and What You Can Do about It
Dave Coplin - 2013
The future of work must be based on being open, on focusing on results, not process and on empowerment, not hierarchy. Dave Coplin, Chief Envisioning Officer at Microsoft UK, has been immersed in the technologies that are making waves in the workplace. This is his call to reimagine business. #bizreimagined
Exploding Data: Reclaiming Our Cybersecurity in the Digital Age
Michael Chertoff - 2018
And yet, as daily events underscore, we are ever more vulnerable to cyber-attack.In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy--the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a path that balances the needs of government, business, and individuals alike.
MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment
Dan Holme - 2003
As you d expect, there s accurate, clearly written coverage of every exam objective (now including Service Pack 1): installation and configuration; user, group, and computer accounts; filesystems and backup/recovery; hardware, disk storage, and printers; Update Services and licensing; monitoring, and more. The content s been extensively revamped and more effectively focused on the exam s objectives. There s also a large Prepare for the Test section packed with questions, answers, testing skills, and suggested practices. You ll find more case studies, more troubleshooting scenarios, electronic practice testing in practically any form your heart desires, and (if you don t have Windows Server handy) a 120-day evaluation version. There s even a 15% discount coupon for your exam -- making this package an even more compelling proposition. Bill Camarda, from the June 2006 href="http://www.barnesandnoble.com/newslet... Only
The Hardware Hacker: Adventures in Making and Breaking Hardware
Andrew Huang - 2017
In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective.Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs.Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices between China and the United States, bunnie weaves engineering, law, and society into the tapestry of open hardware.With highly detailed passages on the ins and outs of manufacturing and a comprehensive take on the issues associated with open source hardware, The Hardware Hacker is an invaluable resource for aspiring hackers and makers.
Colonel Sanders and the American Dream
Josh Ozersky - 2012
But only one of them was ever a real person—Colonel Sanders of Kentucky Fried Chicken/KFC. From a 1930s roadside café in Corbin, Kentucky, Harland Sanders launched a fried chicken business that now circles the globe, serving “finger lickin’ good” chicken to more than twelve million people every day. But to get there, he had to give up control of his company and even his own image, becoming a mere symbol to people today who don’t know that Colonel Sanders was a very real human being. This book tells his story—the story of a dirt-poor striver with unlimited ambition who personified the American Dream.Acclaimed cultural historian Josh Ozersky defines the American Dream as being able to transcend your roots and create yourself as you see fit. Harland Sanders did exactly that. Forced at age ten to go to work to help support his widowed mother and sisters, he failed at job after job until he went into business for himself as a gas station/café/motel owner and finally achieved a comfortable, middle-class life. But then the interstate bypassed his business and, at sixty-five, Sanders went broke again. Packing his car with a pressure cooker and his secret blend of eleven herbs and spices, he began peddling the recipe for “Colonel Sanders’ Kentucky Fried Chicken” to small-town diners in exchange for a nickel for each chicken they sold. Ozersky traces the rise of Kentucky Fried Chicken from this unlikely beginning, telling the dramatic story of Sanders’ self-transformation into “The Colonel,” his truculent relationship with KFC management as their often-disregarded goodwill ambassador, and his equally turbulent afterlife as the world’s most recognizable commercial icon.
Hacking Linux Exposed: Linux Security Secrets & Solutions
Brian Hatch - 2001
Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of PSTN, ISDN, and PSDN over LinuxHarden VoIP, Bluetooth, RF, RFID, and IR devices on LinuxBlock Linux signal jamming, cloning, and eavesdropping attacksApply Trusted Computing and cryptography tools for your best defenseFix vulnerabilities in DNS, SMTP, and Web 2.0 servicesPrevent SPAM, Trojan, phishing, DoS, and DDoS exploitsFind and repair errors in C code with static analysis and Hoare Logic
Handbook of Applied Cryptography
Alfred J. Menezes - 1996
Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptographyIt is a valuable source of the latest techniques and algorithms for the serious practitionerIt provides an integrated treatment of the field, while still presenting each major topic as a self-contained unitIt provides a mathematical treatment to accompany practical discussionsIt contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussedNow in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.
Getting Started with Processing
Casey Reas - 2010
Programming courses usually start with theory, but this book lets you jump right into creative and fun projects. It's ideal for anyone who wants to learn basic programming, and serves as a simple introduction to graphics for people with some programming skills.Written by the founders of Processing, this book takes you through the learning process one step at a time to help you grasp core programming concepts. You'll learn how to sketch with code -- creating a program with one a line of code, observing the result, and then adding to it. Join the thousands of hobbyists, students, and professionals who have discovered this free and educational community platform.Quickly learn programming basics, from variables to objectsUnderstand the fundamentals of computer graphicsGet acquainted with the Processing software development environmentCreate interactive graphics with easy-to-follow projectsUse the Arduino open source prototyping platform to control your Processing graphics
Understanding Air France 447
Bill Palmer - 2013
Written by A330 Captain, Bill Palmer, this book opens to understanding the actions of the crew, how they failed to understand and control the problem, and how the airplane works and the part it played. All in easy to understand terms.Addressed are the many contributing aspects of weather, human factors, and airplane system operation and design that the crew could not recover from. How each contributed is covered in detail along with what has been done, and needs to be done in the future to prevent this from happening again.Also see the book's companion website: UnderstandingAF447.com for supplemental materials referred to in the book or to contact the author.