Ethics in Information Technology


George W. Reynolds - 2002
    This book offers an excellent foundation in ethical decision-making for current and future business managers and IT professionals.

Marketing To The Social Web: How Digital Customer Communities Build Your Business


Larry Weber - 2007
    CEOs should heed this transformation and learn from Weber's insights how to navigate this new landscape to fully maximize their business opportunities." -Mark Fuller, Chairman, Monitor Group "Consumers are using technology to grab power from companies, the media, and the government. Marketing to the Social Web succinctly outlines how institutions can survive and win in this chaotic new world, and lays out the revised rules of engagement-ignore them at your peril." -George F. Colony, CEO, Forrester Research, Inc. "Larry has brought pragmatic and useful recommendations to help brand builders manage the complexity of social interaction in a digital age. I was pleased to read a book that actually suggests how to do something with social networks, instead of just ponder them." -David Kenny, Chairman and Chief Executive Officer, Digitas Inc. "Where's the allure of social 2.0? Brands can talk . . . customers talk louder! Digital influence has arrived." -Jeff Taylor, CEO, Eons and Founder of Monster.com "Larry Weber provides a simple and effective roadmap of the new customer information highway. Marketing to the Social Web is a valuable tool that will give everyone the confidence and know-how to compete in this fast-growing marketplace of ideas." -Steve Harris, Vice President, Global Communications, General Motors Corporation "As all lines and boundaries are washed away by the Web, Weber describes how to become part of the sea versus the sand." -Nicholas Negroponte, Chairman, One Laptop per Child

Security+ Guide to Network Security Fundamentals


Mark Ciampa - 2004
    The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

Programming in Objective-C


Stephen G. Kochan - 1999
    The book makes no assumption about prior experience with object-oriented programming languages or with the C language (upon which Objective-C is based). And because of this, both novice and experienced programmers alike can use this book to quickly and effectively learn the fundamentals of Objective-C. Readers can also learn the concepts of object-oriented programming without having to first learn all of the intricacies of the underlying procedural language (C). This approach, combined with many small program examples and exercises at the end of each chapter, makes it ideally suited for either classroom use or self-study. Growth is expected in this language. At the January 2003 MacWorld, it was announced that there are 5 million Mac OS X users and each of their boxes ships with Objective-C built in.

The Decline and Fall of IBM: End of an American Icon?


Robert Cringely - 2014
    Big Blue, as the company is known, tends to rely for its success on magical thinking but that magic ran out a long time ago. The company got in trouble back in the 1990s and had to hire for the first time an outside CEO, Lou Gerstner, to save the day. Gerstner pushed IBM into services with spectacular results but this hurt the company, too. As services have became commoditized IBM could only compete by offshoring the work and quality suffered. The other negative impact of Gerstner was his compensation which was for the first time in IBM history very high. Only the Watson family had become rich running IBM with later CEOs like John Opel and John Akers living comfortable lives with lots of perks, but they never got BIG RICH. That changed with Gerstner. Sam Palmisano an IBM lifer followed Gerstner as CEO and followed, too, the Gerstner playbook. Palmisano retired three years ago with a retirement package worth $241 million, replaced by IBM's first woman CEO, Ginni Rometty, who certainly expects a comparable golden parachute. In order to achieve these numbers, though, IBM has essentially sacrificed both its customers and employees. In order to have ever growing earnings per share the company has cut labor to the bone, off-shored everything it can, dropped quality, deliberately underbid contracts to win them then not performed. IBM's acquisition policy is one of buying companies to get their sales then cutting costs to the bone and under-delivering. This and share buybacks have kept earnings growing until this house of cards recently began to fall. Ginni Rometty, who will end up taking the fall for Palmisano's flawed strategy, has stated a very specific earnings goal for 2015 that she will destroy the company to achieve if she must. This book how IBM fell from grace, where it is headed, and what specifically can be done to save the company before it is too late.

HTML5 for Masterminds: How to take advantage of HTML5 to create amazing websites and revolutionary applications


Juan Diego Gauchat
    

Advanced PHP Programming


George Schlossnagle - 2004
    The rapid maturation of PHP has created a skeptical population of users from more traditional enterprise languages who question the readiness and ability of PHP to scale, as well as a large population of PHP developers without formal computer science backgrounds who have learned through the hands-on experimentation while developing small and midsize applications in PHP. While there are many books on learning PHP and developing small applications with it, there is a serious lack of information on scaling PHP for large-scale, business-critical systems. Schlossnagle's Advanced PHP Programming fills that void, demonstrating that PHP is ready for enterprise Web applications by showing the reader how to develop PHP-based applications for maximum performance, stability, and extensibility.

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

Crushing YouTube: How to Start a YouTube Channel, Launch Your YouTube Business and Make Money


Joseph Hogue - 2019
     If you're serious about starting a YouTube business and want to make money on YouTube, I can show you the way. I've doubled my monthly income by creating a YouTube channel. Thousands of people watch each video and I've built a community that supports and motivates me every day...and that's all in less than two years! Is it Too Late to Start a YouTube Business? I"ve been developing online businesses since 2012 but was late to the game on YouTube. By the time I started my YouTube channel, people were already saying, "YouTube is dead!"; People were saying you couldn"t grow on YouTube anymore and that small channels couldn't win in the YouTube algorithm. I'm living proof you CAN start a YouTube business and be successful. I average $3,500 a month on ads alone (June 2019) and another three- to four-thousand on sponsorships, affiliates and my own products. In fact, I believe we’re just coming into the Age of YouTube with the rollout of 5G and every business owner needs a video presence. A YouTube How-To from Someone that's Been There I've seen the frustration for small YouTubers, trying to compete and get views against the million-subscriber monsters. I know what it’s like to start a channel from nothing. I’ll not only show you how to set up your channel to look professional, I’ll reveal the secrets even some of the biggest YouTube creators don’t know. In this book, you'll learn: How to get YouTube video ideas and hack the most popular videos for viral success (Pg 49) Five steps to building a YouTube channel brand that creates an army of supporters (Pg 69) The easy way to record videos, even if you don't like to be on camera (Pg 85) Five income streams that guarantee you WILL make money on YouTube (Pg 135) Since starting my YouTube channel, I've consulted and helped other video influencers grow their channels for millions of views. I’ve helped them find sponsorships and make enough money to quit their day job to make YouTube a full-time business. I can do the same for you with this book. I can show you the way but YOU have to get started. Scroll back up and click Buy Now to create your YouTube business and start making money on YouTube.

Bash Command Line Pro Tips


Jason Cannon - 2014
     As someone that has used the Bash shell almost daily for over 15 years, I've accumulated several command line "tricks" that have saved me time and frustration. Bash Command Line Pro Tips is a collection of 10 techniques that you can put to use right away to increase your efficiency at the command line. Here is what you will learn by reading Bash Command Line Pro Tips: Tip 1: Tab Completion Tip 2: Change to the Previous Directory Tip 3: Reuse the Last Item from the Previous Command Line Tip 4: Rerun a Command That Starts with a given String Tip 5: Command Substitution Tip 6: Use a for Loop at the Command Line Tip 7: Rerun the Previous Command with Root Privileges Tip 8: Rerun the Previous Command While Substituting a String Tip 9: Reuse a Word on the Same Command Line Tip 10: Fix Typos and Shorten Lengthy Commands with Aliases Scroll up, click the "Buy Now With 1-Click" button to start leaning these powerful Linux Command Line Tips.

Mastering Excel Macros: Introduction (Book 1)


Mark Moore - 2014
    Everybody wants to learn them. You're not a programmer though. How is a non technical user going to learn how to program? You do want to use macros to make your work easier but are you really going to sit down with a huge programming textbook and work your way through every. single. boring. page? Like most people, you'll start with great enthusiasm and vigor but after a few chapters, the novelty wears off. It gets boring. I'm going to try and change that and make learning macro programming entertaining and accessible to non-techies. First of all, programming Excel macros is a huge topic. Let's eat the elephant one bite at a time. Instead of sitting down with a dry, heavy text, you will read very focused, to the point topics. You can then immediately use what you learned in the real world. This is the first lesson in the series. You will learn what macros are, how to access them, a tiny bit of programming theory (just so you have a clue as to what's going on) and how to record macros. As with all my other lessons, this one has a follow along workbook that you can use to work through the exercises. The images in the lessons are based on Excel 2013 for Windows.

Treat Your Own Rotator Cuff


Jim Johnson - 2007
    The rotator cuff, a group of four, flat tendons that connect to the critical muscles that stabilize your shoulder, can cause a lot more problems than you might think. Consider a few of these statistics from the published literature: .It's simply just a matter of time until the majority of shoulders get a rotator cuff tear. According to Magnetic Resonance Imaging (MRI) scans, approximately 4% of people under forty years of age have a torn rotator cuff. After age sixty, however, 54% of people have one (Sher 1995). .Once the rotator cuff gets torn, it doesn't look good either. One study followed a group of patients with tears in their rotator cuffs and found that 80% of the them went on to either enlarge or turn into full thickness tears-in less than a two-year period (Yamanaka 1994). As you can tell, rotator cuff problems aren't just for elite athletes. Seriously consider investing just a few minutes a week doing the simple exercises in this book if you: .have been diagnosed with either a partial or full thickness rotator cuff tear (yes, many studies show that even full thickness tears can be helped with exercise!) .experience shoulder pain .do upper body weight lifting .have a job or play a sport where you do a lot of work with your arms above shoulder level .have been diagnosed with "impingement syndrome" .want a healthy and properly functioning rotator cuff So whether you already suffer from a rotator cuff problem, or simply want to prevent one, Treat Your Own Rotator Cuff will guide you step-by-step through an evidence-based program that can iron-plate your shoulders in just minutes a week. Jim Johnson, P.T., is a physical therapist who has spent over fifteen years treating both inpatients and outpatients with a wide range of pain and mobility problems. He has written many books based completely on published research and controlled trials including The Multifidus Back Pain Solution, Treat Your Own Knees, The No-Beach, No-Zone, No-Nonsense Weight Loss Plan: A Pocket Guide to What Works, and The Sixty-Second Motivator. His books have been translated into other languages and thousands of copies have been sold worldwide. Besides working full-time as a clinician in a large teaching hospital and writing books, Jim Johnson is a certified Clinical Instructor by the American Physical Therapy Association and enjoys teaching physical therapy students from all over the United States.

Training Guide: Programming in HTML5 with JavaScript and CSS3


Glenn Johnson - 2013
    Build hands-on expertise through a series of lessons, exercises, and suggested practices—and help maximize your performance on the job.Provides in-depth, hands-on training you take at your own pace Focuses on job-role-specific expertise for using HTML5, JavaScript, and CSS3 to begin building modern web and Windows 8 apps Features pragmatic lessons, exercises, and practices Creates a foundation of skills which, along with on-the-job experience, can be measured by Microsoft Certification exams such as 70-480 Coverage includes: creating HTML5 documents; implementing styles with CSS3; JavaScript in depth; using Microsoft developer tools; AJAX; multimedia support; drawing with Canvas and SVG; drag and drop functionality; location-aware apps; web storage; offline apps; writing your first simple Windows 8 apps; and other key topics

Windows Presentation Foundation Unleashed


Adam Nathan - 2006
    Windows Presentation Foundation (WPF) is a key component of the .NET Framework 3.0, giving you the power to create richer and more compelling applications than you dreamed possible. Whether you want to develop traditional user interfaces or integrate 3D graphics, audio/video, animation, dynamic skinning, rich document support, speech recognition, or more, WPF enables you to do so in a seamless, resolution-independent manner. Windows Presentation Foundation Unleashed is the authoritative book that covers it all, in a practical and approachable fashion, authored by .NET guru and Microsoft developer Adam Nathan. - Covers everything you need to know about Extensible Application Markup Language (XAML) - Examines the WPF feature areas in incredible depth: controls, layout, resources, data binding, styling, graphics, animation, and more - Features a chapter on 3D graphics by Daniel Lehenbauer, lead developer responsible for WPF 3D - Delves into non-mainstream topics: speech, audio/video, documents, bitmap effects, and more - Shows how to create popular UI elements, such as features introduced in the 2007 Microsoft Office System: Galleries, ScreenTips, custom control layouts, and more - Demonstrates how to create sophisticated UI mechanisms, such as Visual Studio-like collapsible/dockable panes - Explains how to develop and deploy all types of applications, including navigation-based applications, applications hosted in a Web browser, and applications with great-looking non-rectangular windows - Explains how to create first-class custom controls for WPF - Demonstrates how to create hybrid WPF software that leverages Windows Forms, ActiveX, or other non-WPF technologies - Explains how to exploit new Windows Vista features in WPF applications

VMware vSphere 5 Clustering Technical Deepdive


Frank Denneman - 2011
    It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it explains the concepts and mechanisms behind HA, DRS and Storage DRS which will enable you to make well educated decisions. This book will take you in to the trenches of HA, DRS and Storage DRS and will give you the tools to understand and implement e.g. HA admission control policies, DRS resource pools, Datastore Clusters and resource allocation settings. On top of that each section contains basic design principles that can be used for designing, implementing or improving VMware infrastructures and fundamental supporting features like (Storage) vMotion, Storage I/O Control and much more are described in detail for the very first time. This book is also the ultimate guide to be prepared for any HA, DRS or Storage DRS related question or case study that might be presented during VMware VCDX, VCP and or VCAP exams.Coverage includes: HA node types HA isolation detection and response HA admission control VM Monitoring HA and DRS integration DRS imbalance algorithm Resource Pools Impact of reservations and limits CPU Resource Scheduling Memory Scheduler DPM Datastore Clusters Storage DRS algorithm Influencing SDRS recommendationsBe prepared to dive deep!