Book picks similar to
Big Breaches: Cybersecurity Lessons for Everyone by Neil Daswani


a-recs
cyber-security
data-sci-and-programming
information-science

Jeffrey Dahmer: The Gruesome True Story of a Hungry Cannibalistic Rapist and Necrophiliac Serial Killer (Real Crime by Real Killers Book 3)


Ryan Becker - 2017
    Necrophiliac. Kidnapper. Killer.The stories of serial killers often begin with terrible upbringings and sad events of trauma, but not all have such unfortunate beginnings. Some simply develop their evil on their own and become tainted without anyone realizing it.Jeffrey Dahmer was a man described by his own father as the result of a child becoming lost in the maelstrom while nobody paid attention, of a child who was strange and apathetic but who nobody bothered to ask why......The results were catastrophic.Seventeen men lost their lives and were defiled even after death because of the desires of a neglected young boy who just wanted to fulfill his needs. The following is the tale of said child, the same young man who grew up to become the infamous Milwaukee Cannibal, one of the worst serial killers in humanity's history.Jeffrey Dahmer: The Gruesome True Story of a Hungry Cannibalistic Rapist and Necrophiliac Serial Killer (Vol 3) is a book that recounts the tale of the Milwaukee Cannibal, a man capable of committing the most truly degrading acts on his victims before and even after death; a man who to his last days - and long after - still haunts the city of Milwaukee with the memories of his horrific murders.Be warned, reader, you aren't just about to read about Jeffrey Dahmer and his acts.You are about to walk into his very mind.

Hackers: Heroes of the Computer Revolution


Steven Levy - 1984
    That was before one pioneering work documented the underground computer revolution that was about to change our world forever. With groundbreaking profiles of Bill Gates, Steve Wozniak, MIT's Tech Model Railroad Club, and more, Steven Levy's Hackers brilliantly captured a seminal moment when the risk-takers and explorers were poised to conquer twentieth-century America's last great frontier. And in the Internet age, the hacker ethic-first espoused here-is alive and well.

Ctrl+Shift+Enter Mastering Excel Array Formulas: Do the Impossible with Excel Formulas Thanks to Array Formula Magic


Mike Girvin - 2013
    Beginning with an introduction to array formulas, this manual examines topics such as how they differ from ordinary formulas, the benefits and drawbacks of their use, functions that can and cannot handle array calculations, and array constants and functions. Among the practical applications surveyed include how to extract data from tables and unique lists, how to get results that match any criteria, and how to utilize various methods for unique counts. This book contains 529 screen shots.

Beyond The To-Do List: Goals


Erik Fisher - 2013
    

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

10 Management Models


Fons Trompenaars - 2015
    The way we think about leadership, for instance, has shifted radically from the genius of great entrepreneurs like Rockefeller, Carnegie and Ford, through leadership as a science, leadership that releases human potential, the leader as strategist and warrior, customer champion, globalist and shareholder advocate, to, more recently, leadership as stewardship of the environment. Hundreds of models have been developed to track, measure and forecast business solutions, but as fashions shift how can we apply them in real organizations that have to succeed outside the classroom? 10 Management Models is taken from the book, 100+ Management Models by the same authors.

Writing Secure Code


Michael Howard - 2001
    You need to assume it will run in the most hostile environments imaginable -- and design, code, and test accordingly. Writing Secure Code, Second Edition shows you how. This edition draws on the lessons learned and taught throughout Microsoft during the firm s massive 2002 Windows Security Push. It s a huge upgrade to the respected First Edition, with new coverage across the board. Michael Howard and David LeBlanc first help you define what security means to your customers -- and implement a three-pronged strategy for securing design, defaults, and deployment. There s especially useful coverage of threat modeling -- decomposing your application, identifying threats, ranking them, and mitigating them. Then, it s on to in-depth coverage of today s key security issues from the developer s standpoint. Everyone knows buffer overruns are bad: Here s a full chapter on avoiding them. You ll learn how to establish appropriate access controls and default to running with least privilege. There s detailed coverage of overcoming attacks on cryptography (for example, avoiding poor random numbers and bit-flipping attacks). You ll learn countermeasures for virtually every form of user input attack, from malicious database updates to cross-site scripting. We ve just scratched the surface: There are authoritative techniques for securing sockets and RPC, protecting against DOS attacks, building safer .NET applications, reviewing and testing code, adding privacy features, and even writing high-quality security documentation. Following these techniques won t just improve security -- it ll dramatically improve robustness and reliability, too. Bill CamardaBill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.

Hadoop Explained


Aravind Shenoy - 2014
    Hadoop allowed small and medium sized companies to store huge amounts of data on cheap commodity servers in racks. The introduction of Big Data has allowed businesses to make decisions based on quantifiable analysis. Hadoop is now implemented in major organizations such as Amazon, IBM, Cloudera, and Dell to name a few. This book introduces you to Hadoop and to concepts such as ‘MapReduce’, ‘Rack Awareness’, ‘Yarn’ and ‘HDFS Federation’, which will help you get acquainted with the technology.

Leading from the Library: Help Your School Community Thrive in the Digital Age


Shannon McClintock Miller - 2019
    One essential role librarians play is that of a leader who works collaboratively to build relationships, mold culture and climate, and advocate for the needs of students and the community. In this book, a librarian and an education leader team up to reflect on the librarian's ability to build connections in two ways. First, they discuss the benefits of bringing the outside world into the library through the use of social media, videoconferencing and other tools that allow librarians to partner with others. Then they expand upon these connections by addressing how librarians can lead in the greater educational community by sharing resources and strategies, and partnering with school leaders to tell the story of the school community. Through this book, librarians will discover the influence they can have on the school community as the library becomes the heart of the school, a place where problems are solved, content is explored, connections are made and discovery happens.

The Life of Mikey


Michael K. Willis - 2017
    Willis spent his most impressionable years in southern Appalachia. In his eye-opening new memoir, he perfectly captures the local culture of 1960s rural North Carolina. Willis’s memoir shows both the unique heritage of the region and his personal struggles as a young man growing up in an abusive family. The mountains of North Carolina serve as a deterrent to outsiders, but the locals embrace the beautiful scenery and rugged isolation. This isolation serves to make Mikey’s life a living hell. Even in the wild beauty of the mountains, he can’t escape the violent actions of his parents. If his father isn’t missing, he is beating young Mikey. But his neighbors know Mikey’s father only as the pastor of the local Baptist church. As Willis explores this early-childhood trauma, he also chronicles his encounters with southern gospel music, baptisms, and revival meetings. Things change for his family when his father accepts a position at a church in Asheville, North Carolina. Mikey suddenly finds himself in the big city. As he makes new friends and encounters the pangs of first love, he finally stands up to his father and plans a better future for himself.

The Leader Assistant: Four Pillars of a Confident, Game-Changing Assistant


Jeremy Burrows - 2020
    Whether it's a job change, shifting deadlines, a micromanaging executive, a toxic co-worker, a high-pressure project, or an intense negotiation with a vendor, the administrative profession is not for the faint of heart.If you're looking to maintain the status quo and be "just an assistant," this book is not for you. But, if you want the confidence and ability to conquer the challenges that most try to avoid, then you're in the right place.The Leader Assistant outlines four pillars—embody the characteristics, employ the tactics, engage in relationships, and exercise self-care—that will help you rediscover your passion for the profession and become a confident, future-proof, game-changing Leader Assistant. If you neglect even one pillar, you'll head for burnout, stagnation, and anonymity. You are meant for so much more. Are you ready to be the Leader Assistant the world needs?

Don’t Sweat the Small Stuff: Simple ways to keep the little things from taking over your life


Richard Carlson - 2017
    

Skills for New Managers


Morey Stettner - 2000
    This title includes practical techniques and examples.

Understanding Digital Photography: Techniques for Getting Great Pictures


Bryan Peterson - 2005
    As a bonus, Peterson explains, in straightforward text, the techniques of Photoshop as well as the basics of publishing, printing, and archiving and storing for personal or professional use. Full of great examples for beginners and serious photographers, Understanding Digital Photography makes it easy to create great digital pictures every time.

Modern Technical Writing: An Introduction to Software Documentation


Andrew Etter - 2016
    Written by the lead technical writer at one of Silicon Valley's most exciting companies, Modern Technical Writing is a set of guiding principles and thoughtful recommendations for new and experienced technical writers alike. Not a reference manual, and not comprehensive, it instead serves as an introduction to a sensible writing and publishing process, one that has eluded the profession for too long.