Book picks similar to
CISO Desk Reference Guide Volume 2: A Practical Guide for CISOs by Bill Bonney
infosec
business
hackership
leadership-improvement
The New Kingmakers: How Developers Conquered the World
Stephen O’Grady - 2013
In a 1995 interview, the late Steve Jobs claimed that the secret to his and Apple’s success was talent. “We’ve gone to exceptional lengths to hire the best people,” he said, believing that the talented resource was twenty-five times more valuable than an average alternative. For Microsoft founder Bill Gates, the multiple was even higher:A great lathe operator commands several times the wage of an average lathe operator, but a great writer of software code is worth 10,000 times the price of an average software writer.While the actual number might be up for debate, the importance of technical talent is not. The most successful companies today are those that understand the strategic role that developers will play in their success or failure. Not just successful technology companies – virtually every company today needs a developer strategy. There’s a reason that ESPN and Sears have rolled out API programs, that companies are being bought not for their products but their people. The reason is that developers are the most valuable resource in business.How did we get here? How did developers become the most important constituency in business seemingly overnight? The New Kingmakers explores the rise of the developer class, its implications and provides suggestions for navigating the new developer-centric landscape.
Kellogg on Marketing
Alice M. Tybout - 2000
This is a must-have marketing reference.
The Windows Command Line Beginner's Guide (Computer Beginner's Guides)
Jonathan Moeller - 2011
The Windows Command Line Beginner's Guide gives users new to the Windows command line an overview of the Command Prompt, from simple tasks to network configuration.In the Guide, you'll learn how to:-Manage the Command Prompt.-Copy & paste from the Windows Command Prompt.-Create batch files.-Remotely manage Windows machines from the command line.-Manage disks, partitions, and volumes.-Set an IP address and configure other network settings.-Set and manage NTFS and file sharing permissions.-Customize and modify the Command Prompt.-Create and manage file shares.-Copy, move, and delete files and directories from the command line.-Manage PDF files and office documents from the command line.-And many other topics.
Sun Tzu & Machiavelli Leadership Secrets: How To Become A Superior Leader Utilizing The Principles Of The Art Of War And The Prince
Anthony D. Jensen - 2016
Although almost every leader has heard of these works, very few have read them in depth and applied the lessons they contain to their own life. This is a huge oversight. Both books contain wisdom and advice which is applicable to almost any situation a leader finds they are in. Both books have a reputation for being dense and difficult to understand. This is due to the fact that both were written in other languages and for other time periods. It can be difficult to know exactly what Sun Tzu and Machiavelli intended to convey with their words - and even less how to take action on the ideas. This has all changed.For the first time ever, the ideas of The Prince and The Art of War have been combined, updated and presented in a way which is easy to understand in our modern era. Previously hard to interpret concepts have been clarified and shown to be as useful in our own era as they were in the one for which they were originally written. By reading and taking action on this book entitled Sun Tzu & Machiavelli Leadership Secrets by author Anthony D. Jensen, you give yourself the chance to become the most effective leader you can be. You will learn how to use timeless principles of leadership, psychology and power to achieve everything you set out to do. Both your private and professional lives will benefit immensely from understanding and applying the leadership secrets of Sun Tzu and Machiavelli.
Fundamentals of Software Architecture: An Engineering Approach
Mark Richards - 2020
Until now. This practical guide provides the first comprehensive overview of software architecture's many aspects. You'll examine architectural characteristics, architectural patterns, component determination, diagramming and presenting architecture, evolutionary architecture, and many other topics.Authors Neal Ford and Mark Richards help you learn through examples in a variety of popular programming languages, such as Java, C#, JavaScript, and others. You'll focus on architecture principles with examples that apply across all technology stacks.
CEH Certified Ethical Hacker Study Guide
Kimberly Graves - 2010
That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice. Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with review questions, bonus exams, and more study tools This is the ideal guide to prepare you for the new CEH certification exam. Reviews
Security in Computing
Charles P. Pfleeger - 1988
In this newFourth Edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends. The authors first introduce the core concepts and vocabulary of computer security, including cryptography. Next, they systematically identify and assess threats now facing programs, operating systems, databases, and networks. For each threat, they offer best-practice responses. Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues you face in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, and making the business case for security investments. Another new chapter addresses privacy--from data mining to identity theft, to RFID and e-voting. New coverage also includes Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation Web application threats and vulnerabilities Networks of compromised systems: bots, botnets, and drones Rootkits--including the notorious Sony XCP Wi-Fi network security challenges, standards, and techniques New malicious code attacks, including false interfaces and keystroke loggers Improving code quality: software engineering, testing, and liability approaches Biometric authentication: capabilities and limitations Using Advanced Encryption System (AES) more effectively Balancing efficiency and piracy control in music and other digital content Defending against new cryptanalytic attacks against RSA, DES, and SHA Responding to the emergence of organized attacker groups pursuing profit 0132390779B0721200 Every day, the news media giv
Automate the Boring Stuff with Python: Practical Programming for Total Beginners
Al Sweigart - 2014
But what if you could have your computer do them for you?In "Automate the Boring Stuff with Python," you'll learn how to use Python to write programs that do in minutes what would take you hours to do by hand no prior programming experience required. Once you've mastered the basics of programming, you'll create Python programs that effortlessly perform useful and impressive feats of automation to: Search for text in a file or across multiple filesCreate, update, move, and rename files and foldersSearch the Web and download online contentUpdate and format data in Excel spreadsheets of any sizeSplit, merge, watermark, and encrypt PDFsSend reminder emails and text notificationsFill out online formsStep-by-step instructions walk you through each program, and practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks.Don't spend your time doing work a well-trained monkey could do. Even if you've never written a line of code, you can make your computer do the grunt work. Learn how in "Automate the Boring Stuff with Python.""
Dont Make Me Think (Blinkist Summaries)
Blinkist
Witty, commonsensical, and eminently practical, it’s one of the best-loved and most recommended books on the subject.In this 3rd edition, Steve returns with fresh perspective to reexamine the principles that made Don’t Make Me Think a classic-–with updated examples and a new chapter on mobile usability. And it’s still short, profusely illustrated…and best of all–fun to read.If you’ve read it before, you’ll rediscover what made Don’t Make Me Think so essential to Web designers and developers around the world. If you’ve never read it, you’ll see why so many people have said it should be required reading for anyone working on Web sites.
How to Be Creative
Hugh MacLeod - 2009
The book will be divided into 30+ Pearls of Wisdom (based on the original manifesto and wildly successful Web phenomenon, "How to Be Creative"), and will be laced throughout with the author's witty, smart single-frame cartoons.
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
Paul Rosenzweig - 2013
Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more. Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig, these 18 engaging lectures will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we’re learning how to understand, manage, and reduce these dangers.In addition, Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.Disclaimer: The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government. Disclaimer: Please note that this recording may include references to supplemental texts or print references that are not essential to the program and not supplied with your purchase.©2013 The Teaching Company, LLC (P)2013 The Great Courses
The Protocols (TCP/IP Illustrated, Volume 1)
W. Richard Stevens - 1993
In eight chapters, it provides the most thorough coverage of TCP available. It also covers the newest TCP/IP features, including multicasting, path MTU discovery and long fat pipes. The author describes various protocols, including ARP, ICMP and UDP. He utilizes network diagnostic tools to actually show the protocols in action. He also explains how to avoid silly window syndrome (SWS) by using numerous helpful diagrams. This book gives you a broader understanding of concepts like connection establishment, timeout, retransmission and fragmentation. It is ideal for anyone wanting to gain a greater understanding of how the TCP/IP protocols work.
The Innovative Admin (All Things Admin)
Julie Perrine - 2012
In this informative and motivating book, you'll discover: What it means to be The Innovative Admin How you can unleash your mind to think innovatively Techniques you can use to bring out the administrative leader inside you Ways you can tap into your creativity and initiative to get ahead The Innovative Admin empowers you to become the best you can be by enhancing your capacity for innovation. Read it and grow your administrative career to exciting new levels. Innovation isn't just for technology - it's the key to your career future.
Career Killers/ Career Builders: The Book Every Millennial Should Read
John M. Crossman - 2017
This book has a wide audience, anyone from the ages 18-31, and the people that employ them. The book is not meant for just people in business, it is meant for any professional. What John has seen, on a national level, is a need for additional training resources for the millennial group on core aspects of being a professional. This book helps them lead a healthy and successful life. Author’s Bio: John M. Crossman is a nationally recognized writer and speaker to college students with regard to careers and success. In addition, he is a mentor and a passionate advocate for young professionals. John is President of Crossman & Company, a regional commercial real estate company based in Orlando. He is married and has two daughters.