Book picks similar to
Bob Lewis' Survival Is Guide by Bob Lewis
fix
information-technology
leadership
technology
The Art and Science of Java
Eric S. Roberts - 2007
By following the recommendations of the Association of Computing Machinery's Java Task Force, this first edition text adopts a modern objects-first approach that introduces readers to useful hierarchies from the very beginning.KEY TOPICS: Introduction; Programming by Example; Expressions; Statement Forms; Methods; Objects and Classes; Objects and Memory; Strings and Characters; Object-Oriented Graphics; Event-Driven Programs; Arrays and ArrayLists; Searching and Sorting; Collection Classes; Looking Ahead.MARKET: A modern objects-first approach to the Java programming language that introduces readers to useful class hierarchies from the very beginning.
The Art of War Plus the Art of Management: Strategy for Leadership
Sun Tzu - 2005
Volume 1 (this book) is a reprint of the original 1910 edition (published by Luzac & Co., London) of Sun Tzu on the Art of War: The Oldest Military Treatise in the World by Lionel Giles. The Chinese text, Giles' English translation, as well as his extensive notes are all faithfully reproduced. A Wade-Giles to Pinyin conversion table has been added to make the original classic more useful for the modern student. Volume 2, available separately, includes each chapter in Chinese traditional characters, the pinyin transcription, as well as the English translation.
The LogStash Book
James Turnbull - 2013
We're going to do that by introducing you to Example.com, where you're going to start a new job as one of its SysAdmins. The first project you'll be in charge of is developing its new log management solution. We'll teach you how to:* Install and deploy LogStash.* Ship events from a LogStash Shipper to a central LogStash server.* Filter incoming events using a variety of techniques.* Output those events to a selection of useful destinations.* Use LogStash's Web interface and alternative interfaces like Kibana.* Scale out your LogStash implementation as your environment grows.* Quickly and easily extend LogStash to deliver additional functionality you might need.By the end of the book you should have a functional and effective log management solution that you can deploy into your own environment.
High Challenge, Low Threat: How the Best Leaders Find the Balance
Mary Myatt - 2016
It is the quality of these, whatever the size of the organisation, which make the difference between organisations which thrive, and those which stagnate.This is not to argue for soft, easy and comfortable options. Instead it considers how top leaders manage to walk the line between the impossible and the possible, between the undoable and the doable, and to create conditions for productive work which transcend the difficulties which come towards us every day. Instead of dodging them, they embrace them. And by navigating high challenge, low threat, they show how others how to do the same.
Worm: The First Digital World War
Mark Bowden - 2011
Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.
Robot-Proof: Higher Education in the Age of Artificial Intelligence
Joseph E. Aoun - 2017
Robots can climb stairs, open doors, win Jeopardy, analyze stocks, work in factories, find parking spaces, advise oncologists. In the past, automation was considered a threat to low-skilled labor. Now, many high-skilled functions, including interpreting medical images, doing legal research, and analyzing data, are within the skill sets of machines. How can higher education prepare students for their professional lives when professions themselves are disappearing? In Robot-Proof, Northeastern University president Joseph Aoun proposes a way to educate the next generation of college students to invent, to create, and to discover--to fill needs in society that even the most sophisticated artificial intelligence agent cannot.A "robot-proof" education, Aoun argues, is not concerned solely with topping up students' minds with high-octane facts. Rather, it calibrates them with a creative mindset and the mental elasticity to invent, discover, or create something valuable to society--a scientific proof, a hip-hop recording, a web comic, a cure for cancer. Aoun lays out the framework for a new discipline, humanics, which builds on our innate strengths and prepares students to compete in a labor market in which smart machines work alongside human professionals. The new literacies of Aoun's humanics are data literacy, technological literacy, and human literacy. Students will need data literacy to manage the flow of big data, and technological literacy to know how their machines work, but human literacy--the humanities, communication, and design--to function as a human being. Life-long learning opportunities will support their ability to adapt to change.The only certainty about the future is change. Higher education based on the new literacies of humanics can equip students for living and working through change.
The Assistant Principal 50: Critical Questions for Meaningful Leadership and Professional Growth
Baruti K. Kafele - 2020
Whatever your status--the sole AP in your school, one of two or more APs in your school, a career AP, an AP aspiring to the principalship--yours is one of the most misunderstood and underutilized positions in education. Positioned between teachers and the principal, you are an instructional leader. However, you are not the leader of the school. Therefore, you must carefully navigate your way to ensure that you thrive in your role without "stepping on the toes" of your principal.In The Assistant Principal 50, award-winning, four-time principal Baruti Kafele presents reflective questions that encompass the breadth and depth of the assistant principalship--from finding your leadership "lane" to thriving and being an asset to your principal. Kafele infuses the book (which also includes guidance and insights for principals and aspiring assistant principals) from beginning to end with personal anecdotes and accounts of both failures and successes from his years as an assistant principal. He arms you with tools and insights that will drive you to view the assistant principalship as critical to the climate and culture of your school as well as to student achievement.You, assistant principal, play a critical role in your school's success. The questions that Kafele asks you to consider will aid you as you hone your leadership skills toward becoming an effective leader in your school.
Adventures of an IT Leader
Robert D. Austin - 2009
A good IT manager must also be a strong business leader.This book invites you to accompany new CIO Jim Barton to better understand the role of IT in your organization. You'll see Jim struggle through a challenging first year, handling (and fumbling) situations that, although fictional, are based on true events.You can read this book from beginning to end, or treat is as a series of cases. You can also skip around to address your most pressing needs. For example, need to learn about crisis management and security? Read chapters 10-12. You can formulate your own responses to a CIO's obstacles by reading the authors' regular "Reflection" questions.You'll turn to this book many times as you face IT-related issues in your own career.
The Google Story: Inside the Hottest Business, Media and Technology Success of Our Time
David A. Vise - 2005
The Google Story takes you deep inside the company's wild ride from an idea that struggled for funding in 1998 to a firm that rakes in billions in profits, making Brin and Page the wealthiest young men in America. Based on scrupulous research and extraordinary access to Google, this fast-moving narrative reveals how an unorthodox management style and culture of innovation enabled a search engine to shake up Madison Avenue and Wall Street, scoop up YouTube, and battle Microsoft at every turn. Not afraid of controversy, Google is expanding in Communist China and quietly working on a searchable genetic database, initiatives that test the founders' guiding mantra: DON'T BE EVIL.
Bash Command Line Pro Tips
Jason Cannon - 2014
As someone that has used the Bash shell almost daily for over 15 years, I've accumulated several command line "tricks" that have saved me time and frustration. Bash Command Line Pro Tips is a collection of 10 techniques that you can put to use right away to increase your efficiency at the command line. Here is what you will learn by reading Bash Command Line Pro Tips: Tip 1: Tab Completion Tip 2: Change to the Previous Directory Tip 3: Reuse the Last Item from the Previous Command Line Tip 4: Rerun a Command That Starts with a given String Tip 5: Command Substitution Tip 6: Use a for Loop at the Command Line Tip 7: Rerun the Previous Command with Root Privileges Tip 8: Rerun the Previous Command While Substituting a String Tip 9: Reuse a Word on the Same Command Line Tip 10: Fix Typos and Shorten Lengthy Commands with Aliases Scroll up, click the "Buy Now With 1-Click" button to start leaning these powerful Linux Command Line Tips.
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins - 2012
Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologiessuch as social media and the huge proliferation of Internet-enabled deviceswhile minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context. Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies. The book contains eye-opening security insights that are easily understood, even by the curious layman. Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities. Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) The mandate of the information security function is being completely rewritten. Unfortunately most heads of security havent picked up on the change, impeding their companies agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come. Dr. Jeremy Bergsman, Practice Manager, CEB The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.
The Windows Command Line Beginner's Guide (Computer Beginner's Guides)
Jonathan Moeller - 2011
The Windows Command Line Beginner's Guide gives users new to the Windows command line an overview of the Command Prompt, from simple tasks to network configuration.In the Guide, you'll learn how to:-Manage the Command Prompt.-Copy & paste from the Windows Command Prompt.-Create batch files.-Remotely manage Windows machines from the command line.-Manage disks, partitions, and volumes.-Set an IP address and configure other network settings.-Set and manage NTFS and file sharing permissions.-Customize and modify the Command Prompt.-Create and manage file shares.-Copy, move, and delete files and directories from the command line.-Manage PDF files and office documents from the command line.-And many other topics.
Building a DevOps Culture
Mandi Walls - 2013
But, as Mandi Walls explains in this Velocity report, DevOps is really about changing company culture—replacing traditional development and operations silos with collaborative teams of people from both camps.
The DevOps movement has produced some efficient teams turning out better products faster. The tough part is initiating the change. This report outlines strategies for managers looking to go beyond tools to build a DevOps culture among their technical staff.
Topics include:
Documenting reasons for changing to DevOps before you commit
Defining meaningful and achievable goals
Finding a technical leader to be an evangelist, tools and process expert, and shepherd
Starting with a non-critical but substantial pilot project
Facilitating open communication among developers, QA engineers, marketers, and other professionals
Realigning your team’s responsibilities and incentives
Learning when to mediate disagreements and conflicts
Download this free report and learn how to the DevOps approach can help you create a supportive team environment built on communication, respect, and trust.
Mandi Walls is a Senior Consultant with Opscode.
Beyond The Phoenix Project: The Origins and Evolution Of DevOps (Official Transcript of The Audio Series)
Gene Kim - 2018
In this transcript of the audio series, Gene Kim and John Willis present a nine-part discussion that includes an oral history of the DevOps movement, as well as discussions around pivotal figures and philosophies that DevOps draws upon, from Goldratt to Deming; from Lean to Safety Culture to Learning Organizations.The book is a great way for listeners to take an even deeper dive into topics relevant to DevOps and leading technology organizations.
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Scott Rosenberg - 2007
Along the way, we encounter black holes, turtles, snakes, dragons, axe-sharpening, and yak-shaving—and take a guided tour through the theories and methods, both brilliant and misguided, that litter the history of software development, from the famous ‘mythical man-month’ to Extreme Programming. Not just for technophiles but for anyone captivated by the drama of invention, Dreaming in Code offers a window into both the information age and the workings of the human mind.