Book picks similar to
CISO Desk Reference Guide Volume 2: A Practical Guide for CISOs by Bill Bonney
infosec
business
technical
0cybersecurity-canon
Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage
Gordon Corera - 2015
The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes.Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.
Knock 'Em Dead 2016: The Ultimate Job Search Guide
Martin Yate - 1958
Featuring his unique, time-tested methods for achieving professional success, this brand-new edition provides you with the tools you need to win your next job and successfully navigate the twists and turns of your entire career. With details on everything from connecting on LinkedIn to finding the right job to accepting an offer, Yate shows you where today's employment opportunities are and how you can develop the skills and values that employers are looking for. You'll also learn how to: Create resumes that get resultsMaximize social networks to quadruple interviewsTurn those job interviews into job offersNegotiate the best salary and benefits packageWith "Knock 'em Dead 2016," you will land your dream job and be better prepared to navigate the twists and turns of a long career.
Joel on Software
Joel Spolsky - 2004
For years, Joel Spolsky has done exactly this at www.joelonsoftware.com. Now, for the first time, you can own a collection of the most important essays from his site in one book, with exclusive commentary and new insights from joel.
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family
Theresa M. Payton - 2014
The devices we use to get just-in-time coupons, directions when we're lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole skillfully introduce readers to the many ways we are 'watched, ' and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security. Anyone who uses digital devices will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.
Empowered: Ordinary People, Extraordinary Products
Marty Cagan - 2020
But the real advantage these companies have is not so much who they hire, but rather how they enable their people to work together to solve hard problems and create extraordinary products.As legendary Silicon Valley coach--and coach to the founders of several of today's leading tech companies--Bill Campbell said, "Leadership is about recognizing that there's a greatness in everyone, and your job is to create an environment where that greatness can emerge."The goal of EMPOWERED is to provide you, as a leader of product management, product design, or engineering, with everything you'll need to create just such an environment.As partners at The Silicon Valley Product Group, Marty Cagan and Chris Jones have long worked to reveal the best practices of the most consistently innovative companies in the world. A natural companion to the bestseller INSPIRED, EMPOWERED tackles head-on the reason why most companies fail to truly leverage the potential of their people to innovate: product leadership.The book covers:what it means to be an empowered product team, and how this is different from the "feature teams" used by most companies to build technology products recruiting and coaching the members of product teams, first to competence, and then to reach their potential creating an inspiring product vision along with an insights-driven product strategy translating that strategy into action by empowering teams with specific objectives--problems to solve--rather than features to build redefining the relationship of the product teams to the rest of the company detailing the changes necessary to effectively and successfully transform your organization to truly empowered product teams EMPOWERED puts decades of lessons learned from the best leaders of the top technology companies in your hand as a guide. It shows you how to become the leader your team and company needs to not only survive but thrive.
Software Engineering at Google: Lessons Learned from Programming Over Time
Titus Winters - 2020
With this book, you'll get a candid and insightful look at how software is constructed and maintained by some of the world's leading practitioners.Titus Winters, Tom Manshreck, and Hyrum K. Wright, software engineers and a technical writer at Google, reframe how software engineering is practiced and taught: from an emphasis on programming to an emphasis on software engineering, which roughly translates to programming over time.You'll learn:Fundamental differences between software engineering and programmingHow an organization effectively manages a living codebase and efficiently responds to inevitable changeWhy culture (and recognizing it) is important, and how processes, practices, and tools come into play
The Essential Advantage: How to Win with a Capabilities-Driven Strategy
Paul Leinwand - 2010
In Essential Advantage, Booz & Company's Cesare Mainardi and Paul Leinwand maintain that success in any market accrues to firms with coherence: a tight match between their strategic direction and the capabilities that make them unique.Achieving this clarity takes a sharpness of focus that only exceptional companies have mastered. This book helps you identify your firm's blend of strategic direction and distinctive capabilities that give it the "right to win" in its chosen markets. Based on extensive research and filled with company examples—including Amazon.com, Johnson & Johnson, Tata Sons, and Procter & Gamble—Essential Advantage helps you construct a coherent company in which the pieces reinforce each other instead of working at cross-purposes.The authors reveal:· Why you should focus on a system of a few aligned capabilities· How to identify the "way to play" in your market· How to design a strategy for well-modulated growth· How to align a portfolio of businesses behind your capability system· How your strategy clarifies growth, costs, and people decisionsFew companies achieve a capability-driven "right to win" in their market. This book helps you position your firm to be among them.
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim - 2015
The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.
Clean Architecture
Robert C. Martin - 2017
"Uncle Bob" Martin shows how to bring greater professionalism and discipline to application architecture and design.As with his other books, Martin's Clean Architecture doesn't merely present multiple choices and options, and say "use your best judgment": it tells you what choices to make, and why those choices are critical to your success. Martin offers direct, no-nonsense answers to key architecture and design questions like:What are the best high level structures for different kinds of applications, including web, database, thick-client, console, and embedded apps?What are the core principles of software architecture?What is the role of the architect, and what is he/she really trying to achieve?What are the core principles of software design?How do designs and architectures go wrong, and what can you do about it?What are the disciplines and practices of professional architects and designers?Clean Architecture is essential reading for every software architect, systems analyst, system designer, and software manager — and for any programmer who aspires to these roles or is impacted by their work.
How to Launch a Brand: Your Step-By-Step Guide to Crafting a Brand from Positioning to Naming and Brand Identity
Fabian Geyrhalter - 2020
Most entrepreneurs, even seasoned brand managers, launch first and then work on slowly transforming the new offering into a brand. A logical progression, I would agree. After all, how can you possibly launch as a brand if you don't have any customers or marketing outreach and--obviously, since you just launched a new offering--you have no legacy or advocates?The simple answer is by design. Design relates to the systematic process you have to adhere to, which is likely the primary reason you are holding this book in your hands. In addition though, design truly holds the key to the success of your new brand. It will set your offering apart to look, feel, and sound like a brand at the time of launch, as opposed to something that might or might not have the power to eventually turn into a brand. This book will teach you how to launch your brand by design.In this book I share expert insights based on two decades of professional experience transforming new product and service ventures from ideation phases to tangible brand realities. Each of the key phases of preparing for a brand launch are broken down into practical guidelines designed to help you make the right branding decisions along the way.
slide:ology: The Art and Science of Creating Great Presentations
Nancy Duarte - 2008
Presentation software is one of the few tools that requires professionals to think visually on an almost daily basis. But unlike verbal skills, effective visual expression is not easy, natural, or actively taught in schools or business training programs. slide:ology fills that void.Written by Nancy Duarte, President and CEO of Duarte Design, the firm that created the presentation for Al Gore's Oscar-winning film, An Inconvenient Truth, this book is full of practical approaches to visual story development that can be applied by anyone. The book combines conceptual thinking and inspirational design, with insightful case studies from the world's leading brands. With slide:ology you'll learn to:Connect with specific audiencesTurn ideas into informative graphicsUse sketching and diagramming techniques effectivelyCreate graphics that enable audiences to process information easilyDevelop truly influential presentationsUtilize presentation technology to your advantageMillions of presentations and billions of slides have been produced -- and most of them miss the mark. slide:ology will challenge your traditional approach to creating slides by teaching you how to be a visual thinker. And it will help your career by creating momentum for your cause.--back cover
Serious Cryptography: A Practical Introduction to Modern Encryption
Jean-Philippe Aumasson - 2017
You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.You’ll also learn: - Key concepts in cryptography, such as computational security, attacker models, and forward secrecy - The strengths and limitations of the TLS protocol behind HTTPS secure websites - Quantum computation and post-quantum cryptography - About various vulnerabilities by examining numerous code examples and use cases - How to choose the best algorithm or protocol and ask vendors the right questionsEach chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you’re a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.
Essential PHP Security
Chris Shiflett - 2005
It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.
Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power
David E. Sanger - 2012
. . THE CRITICAL MOMENTS IN THE COVERT WAR AGAINST IRAN, THE STRUGGLES TO DEAL WITH A RECALCITRANT PAKISTAN AND ITS FAST-GROWING NUCLEAR ARSENAL, THE TENSIONS WITH THE AMERICAN MILITARY OVER AFGANISTAN AND WITH ALLIES SWEPT UP IN THE CHAOS OF THE ARAB SPRING Three and a half years ago, David Sanger’s book The Inheritance: The World Obama Confronts and the Challenges to American Power described how a new American president came to office with the world on fire. Now, just as the 2012 presidential election battle begins, Sanger follows up with an eye-opening, news-packed account of how Obama has dealt with those challenges, relying on innovative weapons and reconfigured tools of American power to try to manage a series of new threats. Sanger describes how Obama’s early idealism about fighting “a war of necessity” in Afghanistan quickly turned to fatigue and frustration, how the early hopes that the Arab Spring would bring about a democratic awakening slipped away, and how an effort to re-establish American power in the Pacific set the stage for a new era of tensions with the world’s great rising power, China. As the world seeks to understand the contours of the Obama Doctrine, Confront and Conceal is a fascinating, unflinching account of these complex years, in which the president and his administration have found themselves struggling to stay ahead in a world where power is diffuse and America’s ability to exert control grows ever more elusive.
Podcast Launch - A Step by Step Podcasting Guide Including 15 Video Tutorials
John Lee Dumas - 2013
This book comes with 15 video tutorials where the author, John Lee Dumas, will walk you through the more technical aspects of podcasting. These tutorials will make your podcast experience enjoyable and stress free. Podcast Launch begins with identifying your podcast, followed by equipment needed, recording and editing, intros and outros, tagging your MP3, uploading to a media host, embedding your MP3 onto your website, submitting your podcast to iTunes, Stitcher Radio, and Blackberry, launching your podcast the right way, building your audience, and monetizing. The author, John Lee Dumas, is the Founder and Host of the top ranked business podcast, EntrepreneurOnFire. EntrepreneurOnFire generates over 150,000 unique downloads every single month in over 140 countries. EntrepreneurOnFire’s lineup consists of Seth Godin, Tim Ferriss, Barbara Corcoran, Gary Vaynerchuk, Chris Brogan, MJ DeMarco, and over 170 others.In Podcast Launch, John Lee Dumas shares how he turned an idea into a red-hot podcast that inspires thousands of people daily. It started with an AHA moment, and passion has guided him ever since. John shares the lessons he learned so you can take advantage of all his victories and learn from all of his failures. Your final result will be a podcast of your own, and it will be amazing.