Book picks similar to
The Great Transition by James Martin
business
systems-and-engineering
technology
boxes
Advanced Rails Recipes
Mike Clark - 2007
Fueled by significant benefits and an impressive portfolio of real-world applications already in production, Rails is destined to continue making significant inroads in coming years.Each new Rails application showing up on the web adds yet more to the collective wisdom of the Rails development community. Yesterday's best practices yield to today's latest and greatest techniques, as the state of the art is continually refined in kitchens all across the Internet. Indeed, these are times of great progress.At the same time, it's easy to get left behind in the wake of progress. Advanced Rails Recipes keeps you on the cutting edge of Rails development and, more importantly, continues to turn this fast-paced framework to your advantage.Advanced Rails Recipes is filled with pragmatic recipes you'll use on every Rails project. And by taking the code in these recipes and slipping it into your application you'll not only deliver your application quicker, you'll do so with the confidence that it's done right.The book includes contributions from Aaron Batalion, Adam Keys, Adam Wiggins, Andre Lewis, Andrew Kappen, Benjamin Curtis, Ben Smith, Chris Bernard, Chris Haupt, Chris Wanstrath, Cody Fauser, Dan Benjamin, Dan Manges, Daniel Fischer, David Bock, David Chelimsky, David Heinemeier Hansson, Erik Hatcher, Ezra Zygmuntowicz, Geoffrey Grosenbach, Giles Bowkett, Greg Hansen, Gregg Pollack, Hemant Kumar, Hugh Bien, Jamie Orchard-Hays, Jamis Buck, Jared Haworth, Jarkko Laine, Jason LaPier, Jay Fields, John Dewey, Jonathan Dahl, Josep Blanquer, Josh Stephenson, Josh Susser, Kevin Clark, Luke Francl, Mark Bates, Marty Haught, Matthew Bass, Michael Slater, Mike Clark, Mike Hagedorn, Mike Mangino, Mike Naberezny, Mike Subelsky, Nathaniel Talbott, PJ Hyett, Patrick Reagan, Peter Marklund, Pierre-Alexandre Meyer, Rick Olson, Ryan Bates, Scott Barron, Tony Primerano, Val Aleksenko, and Warren Konkel.
When Digital Becomes Human: The Transformation of Customer Relationships
Steven Van Belleghem - 2014
In a recent global market study, 73% of respondents stated that even when a company’s digital channels work perfectly, they still want access to a real person.Steven Van Belleghem explores and explains the new digital relationships and offers a strategic guide to combining a business's two most important assets — its people and its digital strengths. He shows marketing managers, directors and commercial decision makers how to positively transform customers’ digital experiences by adding a human touch. He covers the latest issues in digital marketing and CRM including: omnichannel and multichannel experiences, big data and predictive analytics, privacy concerns, and crowdsourcing.Packed with examples from organizations that have successfully transformed their customer relationships, such as Amazon, Toyota, ING, Nike and Starbucks, the book presents a clear model that illustrates how to integrate an “emotional” layer in any digital strategy to achieve consumer engagement and loyalty.
Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
Edward Skoudis - 2005
I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits
Storm the Norm: Untold Stories of 20 Brands That Did It Best
Anisha Motwani - 2016
Some of these are brands that have come from nowhere and created new categories, some have challenged the hegemony of long-standing leaders, and some are decades-old brands which have continuously reinvented themselves to stay on top.Drawing from her rich experience with brands in India, Anisha Motwani has created a powerful package of inspiration and methodology. With a Foreword by insights specialist Santosh Desai and an Afterword by innovation specialist Ranjan Malik, Storm the Norm will leave you altered. This book is replete with crucial untold secrets of businesses that made all the difference.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
Management in 10 Words
Terry Leahy - 2012
As a result, Sir Terry is now one of the world's most admired business leaders, widely acclaimed for his drive, flair and no-nonsense approach.In Management in 10 Words he draws on his experience and expertise to pinpoint the ten vital attributes that make successful managers and underlie great organisations. He tackles the challenges that every manager faces, in a series of insights that are personal, provocative, and down to earth. And he explains:- Why initial failure often leads to ultimate success.- Why profits stem from a company's values, not its day-to-day business.- Why competition should always be welcomed.- Why simplicity leads to innovation.- Why trust is the bedrock of effective leadership.The result is an inspiring, thoughtful and supremely practical guide that will prove invaluable to all managers in all types of organisation.
Micro-Isv: From Vision to Reality
Bob Walsh - 2006
As for the latter, are you a programmer and curious about being your own boss? Where do you turn for information? Until now, online and traditional literature havent caught up with the reality of the post-dot com bust.Micro-ISV: From Vision to Reality explains what works and why in today's emerging micro-ISV sector. Currently, thousands of programmers build and deliver great solutions ISV-style, earning success and revenues much larger than you might guess. Written by and for micro-ISVs, with help from some of the leaders of the field, this book takes you beyond just daydreaming to running your own business. It thoroughly explores how it is indeed possible to launch and maintain a small and successful ISV business, and is an ideal read if you're interested in getting started.
Your First 100 Days in a New Executive Job
Robert Hargrove - 2011
Whether you are a newly elected president, CEO, or executive at any level, what you do in your first 100 days will be absolutely pivotal to your success or failure. Your First 100 Days in a New Executive Job will help you to seal your leadership, build a team you can count on, and have a bottom line impact before your first few months on the job is up. It will take you through all the steps of successful executive onboarding and show you how to avoid the typical pitfalls. Hargrove emphasizes the importance of getting clear on your going-in mandate—your contract with key stake holders. He also shows you how to use your first 100 days to declare an Impossible Future that represents the difference you want to make, while delivering on your Day Job. According to Hargrove, the key idea is to go for "quick wins" that establish a virtuous circle of increasing credibility and help you to avoid a vicious circle of decreasing credibility. This book will expand your aspirations and motivations, and give you a treasure trove of practical, down-to-earth tips to immediately apply in your new leadership role. * Have a story ready day one, as key stakeholders look for signals immediately—take symbolic action within 72 hours * Develop a "teachable point of view"—This is how we intend to win in this business * Build a team of 'A' players—get the right people on the bus * Declare an Impossible Future that unites warring tribes * Jump start your vision with 30, 60, 90-day catalytic breakthrough projects * Master the political chessboard and culture—It's all politics! * Drive bottom-line results before the end of your first 100 day
Does IT Matter?: Information Technology and the Corrosion of Competitive Advantage
Nicholas Carr - 2004
IT expert Nicholas G. Carr offers a radically different view in this eloquent and explosive book. As IT's power and presence have grown, he argues, its strategic relevance has actually decreased. IT has been transformed from a source of advantage into a commoditized "cost of doing business" - with huge implications for business management.Expanding on Carr's seminal Harvard Business Review article that generated a storm of controversy, Does IT Matter? provides a truly compelling - and unsettling - account of IT's changing business role and its leveling influence on competition. Through astute analysis of historical and contemporary examples, Carr shows that the evolution of IT closely parallels that of earlier technologies such as railroads and electric power. He goes on to lay out a new agenda for IT management, stressing cost control and risk management over innovation and investment. And he examines the broader implications for business strategy and organization as well as for the technology industry.A frame-changing statement on one of the most important business phenomena of our time, Does IT Matter? marks a crucial milepost in the debate about IT's future.An acclaimed business writer and thinker, Nicholas G. Carr is a former executive editor of the Harvard Business Review.
The Ultimate Guide to Remote Work: How to Grow, Manage and Work with Remote Teams (Zapier App Guides Book 3)
Wade Foster - 2015
Yet at Zapier, we've been working remotely since our founding in October of 2011. This book shares everything we've learned about running a remote team—our successes and our failures.Beginning as a series of posts on the Zapier blog, this book is an ongoing work about our experiences as a remote team, with much of the book written by Zapier CEO Wade Foster along with chapters from our team members and other remote employees. We'll update it periodically so you can learn how our thinking and processes change as we've grown from three to 20+ people and beyond, and will keep the older versions of each chapter archived so you can learn with us over time.Who Is This Guide For?Whether you currently work in or run a remote team, or you hope to work in or run a remote team in the future, this book will have nuggets of wisdom that you can apply to your current situation.
Agile!: The Good, the Hype and the Ugly
Bertrand Meyer - 2014
The book details agile principles, roles, managerial practices, technical practices and artifacts, offering a complete review that will help readers master all the important agile ideas.
Without Their Permission: How the 21st Century Will Be Made, Not Managed
Alexis Ohanian - 2013
And when that power is harnessed to create new communities, technologies, businesses or charities, the results can be absolutely stunning. In this book, Alexis will share his ideas, tips and even his own doodles about harnessing the power of the web for good, and along the way, he will share his philosophy with young entrepreneurs all over the globe. At 29, Ohanian has come to personify the dorm-room tech entrepreneur, changing the world without asking permission. Within a couple of years of graduating from the University of Virginia, Ohanian did just that, selling reddit for millions of dollars. He's gone on to start many other companies, like hipmunk and breadpig, all while representing Y Combinator and investing in over sixty other tech startups. Without Their Permission is his personal guidebook as to how other aspiring entrepreneurs can follow in his footsteps.