Book picks similar to
Cybersecurity for Executives in the Age of Cloud by Teri Radichel
cybersecurity
industry
infosec
it-tech
The Certified Six SIGMA Black Belt Handbook
T.M. Kubiak - 2008
While the primary audience for this work is the individual preparing to sit for the Six Sigma Black Belt certification examination, a secondary audience for the handbook is the quality and Six Sigma professional who would like a relevant Six Sigma reference book. With this audience in mind, the authors have greatly expanded the appendices section to include: * The 2001 Body of Knowledge, so that readers can compare changes and perhaps offer recommendations to future bodies of knowledge * Statistical tables completely redeveloped using a combination of Microsoft Excel and Minitab 15 * A table for control constants expanded to now include virtually all control constants * Tables for both cumulative and non-cumulative forms of the most useful distributions, including binomial, Poisson, and normal * Additional alpha values in tables * An expanded glossary, with more terms relating to lean * A second glossary of the most common Japanese terms used by quality and Six Sigma professionals
Zero Day: The Threat In Cyberspace
Robert O'Harrow Jr. - 2013
For more than a year, Washington Post reporter Robert O'Harrow has explored the threats proliferating in our digital universe. This eBook is a compilation of that reporting. With chapters built around real people, including hackers, security researchers and corporate executives, this book will help regular people, lawmakers and businesses better understand the mind-bending challenge of keeping the internet safe from hackers and security breaches -- and all out war.
Cissp (Isc)2 Certified Information Systems Security Professional Official Study Guide
James Michael Stewart - 2003
This comprehensive book will guide readers through CISSP exam topics, including: Access ControlApplication Development SecurityBusiness Continuity and Disaster Recovery PlanningCryptographyInformation Security Governance and Risk Management Legal, Regulations, Investigations and ComplianceOperations SecurityPhysical (Environmental) SecuritySecurity Architecture and DesignTelecommunications and Network SecurityThis study guide will be complete with 100% coverage of the exam objectives, real world scenarios, hands-on exercises, and challenging review questions, both in the book as well via the exclusive Sybex Test Engine.
Digging Into WordPress
Jeff Starr - 2009
From your first steps of learning about WordPress all the way through maintaining a site throughout the years, this book is packed with truly practical information.
Stealing the Network: How to Own a Shadow
Johnny Long - 2007
Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. . The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles . The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth . Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries
How to Measure Anything in Cybersecurity Risk
Douglas W. Hubbard - 2016
In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely.Discover the shortcomings of cybersecurity's best practices Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing--as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
Revenue Management
Robert G. Cross - 1996
Cross answers this question with his ground-breaking approach to revitalizing businesses: focusing on the revenue side of the ledger instead of the cost side. The antithesis of slash-and-burn methods that left companies with empty profits and dissatisfied stockholders, Revenue Management overturns conventional thinking on marketing strategies and offers the key to initiating and sustaining growth.Using case studies from a variety of industries, small businesses, and nonprofit organizations, Cross describes no-tech, low-tech, and high-tech methods that managers can use to increase revenue without increasing products or promotions; predict consumer behavior; tap into new markets; and deliver products and services to customers effectively and efficiently. His proven tactics will help any business dramatically improve its bottom line by meeting the challenge of matching supply with demand.
MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment
Dan Holme - 2003
As you d expect, there s accurate, clearly written coverage of every exam objective (now including Service Pack 1): installation and configuration; user, group, and computer accounts; filesystems and backup/recovery; hardware, disk storage, and printers; Update Services and licensing; monitoring, and more. The content s been extensively revamped and more effectively focused on the exam s objectives. There s also a large Prepare for the Test section packed with questions, answers, testing skills, and suggested practices. You ll find more case studies, more troubleshooting scenarios, electronic practice testing in practically any form your heart desires, and (if you don t have Windows Server handy) a 120-day evaluation version. There s even a 15% discount coupon for your exam -- making this package an even more compelling proposition. Bill Camarda, from the June 2006 href="http://www.barnesandnoble.com/newslet... Only
Single-Minded: My Life in Business
Claude Littner - 2016
His abrupt style and zero-tolerance policy on nonsense have become the highlights of every series. But what is he like in real business?Single-Minded reveals the story of Claude's varied career and the turbulent years that shaped him. From being told at school that he would never amount to anything to his current status as a boardroom heavyweight both on-screen and off it, success has never come easy. Claude's complex, fascinating work has taken him into many different industries and countries, encompassing retail start-ups; knife-edge company rescue missions; the bruising rough-and-tumble of Premier League football; facing down French trade unions; taking on Texan oil barons in multi-million-dollar deals; and, in the private sphere, conquering life-threatening illness.Told with characteristic candour and disarming modesty, Single-Minded is an unflinching account of a remarkable career in the spotlight.
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Joseph Menn - 2010
His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers and defense secrets from governments. Using unprecedented access to Mob businesses and Russian officials, the book reveals how top criminals earned protection from the Russian government.Fatal System Error penetrates both the Russian cyber-mob and La Cosa Nostra as the two fight over the Internet's massive spoils. The cloak-and-dagger adventure shows why cyber-crime is much worse than you thought—and why the Internet might not survive.
Strategic Management: Concepts
Fred R. David - 2002
Forty-one Experiential Exercises, and 41 cases are included. Topics covered include corporate culture, organizational structure, marketing concepts, financial tools and techniques, strategy implementation issues, as well as extensive coverage of global issues, concerns and idiosyncrasies. For anyone interested in the fields of Strategic Management, Strategy, and Business Policy.
Digital Transformation at Scale: Why the Strategy Is Delivery
Andrew Greenway - 2018
Based on experience, it is a guide for navigating the blockers, buzzwords and bloody-mindedness that doom any analogue organisation trapped into thinking that while the internet has changed the world, it won't change their world. Companies that grew up on the web have changed our expectations of the services we rely on. We demand simplicity, speed and low cost. Organizations founded before the Internet aren't keeping up - despite spending millions on IT, marketing and 'innovation'. This book is a guide to building a digital institution. It explains how a growing band of reformers in businesses and governments around the world have helped their organizations pivot to this new way of working, and what lessons others can learn from their experience. It is based on the authors' experience designing and helping to deliver the UK's Government Digital Service (GDS). The GDS was a new institution made responsible for the digital transformation of government, designing public services for the Internet era. It snipped �4 billion off the government's technology bill, opened up public sector contracts to thousands of new suppliers, and delivered online services so good that citizens chose to use them over the offline alternatives, without a big marketing campaign. Other countries and companies noticed, with the GDS model now being copied around the world.
Social Engineering: The Art of Human Hacking
Christopher Hadnagy - 2010
Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.
Where Wizards Stay Up Late: The Origins of the Internet
Katie Hafner - 1996
Today, twenty million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone. In the 1960's, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices. With Defense Department funds, he and a band of visionary computer whizzes began work on a nationwide, interlocking network of computers. Taking readers behind the scenes, Where Wizards Stay Up Late captures the hard work, genius, and happy accidents of their daring, stunningly successful venture.