Book picks similar to
Disrupt or Die: What the World Needs to Learn from Silicon Valley to Survive the Digital Era by Jedidiah Yueh
business
cybersecurity-canon
orlando-debruce
cyber-security
OS X 10.10 Yosemite: The Ars Technica Review
John Siracusa - 2014
Siracusa's overview, wrap-up, and critique of everything new in OS X 10.10 Yosemite.
Aligning Strategy and Sales: The Choices, Systems, and Behaviors that Drive Effective Selling
Frank V. Cespedes - 2014
Addressing that gap, actionably and with attention to relevant research, is the focus of this book.In Aligning Strategy and Sales, Harvard Business School professor Frank Cespedes equips you to link your go-to-market initiatives with strategic goals. Cespedes offers a road map to articulate strategy in ways that people in the field can understand and that will fuel the behaviors required for profitable growth. Without that alignment, leaders will press for better execution when they need a better strategy, or change strategic direction with great cost and turmoil when they should focus on the basics of sales execution.With thoughtful, clear, and engaging examples, Aligning Strategy and Sales provides a framework for diagnosing and managing the core levers available for effective selling in any organization. It will give you the know-how and tools to move from ideas to action and build a sales effort linked to your firm’s unique goals, not a generic selling formula.Cespedes shows how sales efforts affect all elements of value creation in a business, whether you’re a start-up seeking to scale or an established firm looking to jump-start new growth. The book provides key insights to optimize your firm’s customer management activities and so improve selling and strategy.
Identity Is the New Money
David Birch - 2014
Because of technological change the two trends are converging so that all that we need for transacting will be our identities captured in the unique record of our online social contacts. Social networks and mobile phones are the key technologies. They will enable the building of an identity infrastructure that can enhance both privacy and security - there is no trade-off. The long-term consequences of these changes are impossible to predict, partly because how they take shape will depend on how companies take advantage of business opportunities to deliver transaction services. But one prediction made here is that cash will soon be redundant - and a good thing too. In its place we will see a proliferation of new digital currencies.
The Art of Doing Science and Engineering: Learning to Learn
Richard Hamming - 1996
By presenting actual experiences and analyzing them as they are described, the author conveys the developmental thought processes employed and shows a style of thinking that leads to successful results is something that can be learned. Along with spectacular successes, the author also conveys how failures contributed to shaping the thought processes. Provides the reader with a style of thinking that will enhance a person's ability to function as a problem-solver of complex technical issues. Consists of a collection of stories about the author's participation in significant discoveries, relating how those discoveries came about and, most importantly, provides analysis about the thought processes and reasoning that took place as the author and his associates progressed through engineering problems.
Hatching Twitter: A True Story of Money, Power, Friendship, and Betrayal
Nick Bilton - 2013
In barely six years, a small group of young, ambitious programmers in Silicon Valley built an $11.5 billion business out of the ashes of a failed podcasting company. Today Twitter boasts more than 200 million active users and has affected business, politics, media, and other fields in innumerable ways. Now Nick Bilton of the New York Times takes readers behind the scenes with a narrative that shows what happened inside Twitter as it grew at exponential speeds. This is a tale of betrayed friendships and high-stakes power struggles as the four founders—Biz Stone, Evan Williams, Jack Dorsey, and Noah Glass—went from everyday engineers to wealthy celebrities, featured on magazine covers, Oprah, The Daily Show, and Time’s list of the world’s most influential people. Bilton’s exclusive access and exhaustive investigative reporting—drawing on hundreds of sources, documents, and internal e-mails—have enabled him to write an intimate portrait of fame, influence, and power. He also captures the zeitgeist and global influence of Twitter, which has been used to help overthrow governments in the Middle East and disrupt the very fabric of the way people communicate.
Intercom On Starting Up
Des TraynorMaggie Cohen - 2017
No one wants to add to the scrap heap. But if you restrict yourself to only reading articles from people who have actually created a business, hit some revenue target, or broken out of the MVP-in-an-incubator stage, there’s very few books and blogs left. This is why we hope this book is relevant to you.It’s not packed with startup clichés, nor is it steeped in myths about how huge companies got their break. Yes, Airbnb sold cereal before they were a 31 billion dollar company, and Slack was one hell of a pivot, but those wells have been over-drilled for their useful lessons at this point. This book is our honest, opinionated take on what we’ve learned building Intercom over the past 6 years. You won’t like it all, you won’t agree with it all, but you’re not supposed to. Your mileage will vary.
Hacking For Dummies
Kevin Beaver - 2004
In order to counter these cyber bad guys, you must become a hacker yourself--an ethical hacker. Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You'll discover how to:Work ethically, respect privacy, and save your system from crashing Develop a hacking plan Treat social engineers and preserve their honesty Counter war dialing and scan infrastructures Understand the vulnerabilities of Windows, Linux, and Novell NetWare Prevent breaches in messaging systems, web applications, and databases Report your results and managing security changes Avoid deadly mistakes Get management involved with defending your systems As we enter into the digital era, protecting your systems and your company has never been more important. Don't let skepticism delay your decisions and put your security at risk. With Hacking For Dummies, you can strengthen your defenses and prevent attacks from every angle!
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Michael Hale Ligh - 2010
Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.
Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions
Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more
Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions
Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.
The Net Delusion: The Dark Side of Internet Freedom
Evgeny Morozov - 2010
Yet for all the talk about the democratizing power of the Internet, regimes in Iran and China are as stable and repressive as ever. In fact, authoritarian governments are effectively using the Internet to suppress free speech, hone their surveillance techniques, disseminate cutting-edge propaganda, and pacify their populations with digital entertainment. Could the recent Western obsession with promoting democracy by digital means backfire?In this spirited book, journalist and social commentator Evgeny Morozov shows that by falling for the supposedly democratizing nature of the Internet, Western do-gooders may have missed how it also entrenches dictators, threatens dissidents, and makes it harder - not easier - to promote democracy. Buzzwords like "21st-century statecraft" sound good in PowerPoint presentations, but the reality is that "digital diplomacy" requires just as much oversight and consideration as any other kind of diplomacy.Marshaling compelling evidence, Morozov shows why we must stop thinking of the Internet and social media as inherently liberating and why ambitious and seemingly noble initiatives like the promotion of "Internet freedom" might have disastrous implications for the future of democracy as a whole.
IT Savvy: What Top Executives Must Know to Go from Pain to Gain
Peter Weill - 2009
But in many organizations, returns from IT investments are flatlining, even as technology spending has skyrocketed.These challenges call for new levels of IT savvy: the ability of all managers-IT or non-IT-to transform their company's technology assets into operational efficiencies that boost margins. Companies with IT-savvy managers are 20 percent more profitable than their competitors.In IT Savvy, Peter Weill and Jeanne Ross-two of the world's foremost authorities on using IT in business-explain how non-IT executives can acquire this savvy. Concise and practical, the book describes the practices, competencies, and leadership skills non-IT managers need to succeed in the digital economy. You'll discover how to:-Define your firm's operating model-how IT can help you do business-Revamp your IT funding model to support your operating model-Build a digitized platform of business processes, IT systems, and data to execute on the model-Determine IT decision rights-Extract more business value from your IT assetsPacked with examples and based on research into eighteen hundred organizations in more than sixty countries, IT Savvy is required reading for non-IT managers seeking to push their company's performance to new heights.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
CEH Certified Ethical Hacker All-in-One Exam Guide
Matt Walker - 2011
Pub the Date: September. 2011 of Pages: 416 in Publisher: McGraw-Hill the Get complete coverages of all the objectives included on the EC-Council's Certified the Ethical Hacker exam inside the this comprehensive resource. Written by an the IT security expert. The this the authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter. exam tips. practice exam questions. and in-depth explanations. Designed to help you pass the exam with ease. this definitive volume also serves as an essential on-the-job reference.COVERS ALL EXAM TOPICS. INCLUDING: Introduction to ethical hackingCryptographyReconnaissance and footprintingNetwork scanningEnumerationSystem hackingEvasion techniquesSocial engineering and physical securityHacking web servers and applicationsSQL injectionViruses. trojans. and other ...
ITIL Foundation Exam Study Guide
Liz Gallacher - 2012
This essential resource is a complete guide to preparing for the ITIL Foundation exam and includes everything you need for success. Organized around the ITIL Foundation (2011) syllabus, the study guide addresses the ITIL Service Lifecycles, the ITIL processes, roles, and functions, and also thoroughly explains how the Service Lifecycle provides effective and efficient IT services.Offers an introduction to IT service management and ITIL V3 service strategy Highlights the topics of service design and development and the service management processes Reviews the building, testing, authorizing, documenting, and implementation of new and changed services into operation Addresses creating and maintaining value for customers through monitoring and improving services, processes, and technology Download valuable study tools including practice exams, flashcards, a glossary of key terms and more. If you prefer self-study over the more expensive training course, but you don't want to skimp on information or preparation, then this study guide is for you.
The Essential Advantage: How to Win with a Capabilities-Driven Strategy
Paul Leinwand - 2010
In Essential Advantage, Booz & Company's Cesare Mainardi and Paul Leinwand maintain that success in any market accrues to firms with coherence: a tight match between their strategic direction and the capabilities that make them unique.Achieving this clarity takes a sharpness of focus that only exceptional companies have mastered. This book helps you identify your firm's blend of strategic direction and distinctive capabilities that give it the "right to win" in its chosen markets. Based on extensive research and filled with company examples—including Amazon.com, Johnson & Johnson, Tata Sons, and Procter & Gamble—Essential Advantage helps you construct a coherent company in which the pieces reinforce each other instead of working at cross-purposes.The authors reveal:· Why you should focus on a system of a few aligned capabilities· How to identify the "way to play" in your market· How to design a strategy for well-modulated growth· How to align a portfolio of businesses behind your capability system· How your strategy clarifies growth, costs, and people decisionsFew companies achieve a capability-driven "right to win" in their market. This book helps you position your firm to be among them.
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Bruce Sterling - 1992
A journalist investigates the past, present, and future of computer crimes, as he attends a hacker convention, documents the extent of the computer crimes, and presents intriguing facts about hackers and their misdoings.