Book picks similar to
Disrupt or Die: What the World Needs to Learn from Silicon Valley to Survive the Digital Era by Jedidiah Yueh
business
cybersecurity-canon
cyber-security
orlando-debruce
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Wil Allsopp - 2017
Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data--even from organizations without a direct Internet connection--this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures.Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level--and this book shows you how to defend your high security network.Use targeted social engineering pretexts to create the initial compromise Leave a command and control structure in place for long-term access Escalate privilege and breach networks, operating systems, and trust structures Infiltrate further using harvested credentials while expanding control Today's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.
Android Hacker's Handbook
Joshua J. Drake - 2013
Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
Exploding Data: Reclaiming Our Cybersecurity in the Digital Age
Michael Chertoff - 2018
And yet, as daily events underscore, we are ever more vulnerable to cyber-attack.In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy--the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a path that balances the needs of government, business, and individuals alike.
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Jack Koziol - 2004
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable code files
Banking On It
Anne Boden - 2020
Increasingly frustrated with the inertia within the industry she decided to shake things up herself by doing something totally radical - setting up her own bank.In this awe-inspiring story Anne reveals how she broke through bureaucracy, tackled prejudice and successfully countered widespread suspicion to realise her vision for the future of consumer banking. She fulfilled that dream by founding Starling, the winner of Best British Bank at the British Bank Awards 2018 and in doing so has triggered a new movement that is revolutionising the entire banking industry.
Seven Strategy Questions: A Simple Approach for Better Execution
Robert Simons - 2010
This means channeling resources into the right efforts, striking a balance between innovation and control, and getting everyone pulling in the same direction.How to accomplish all this? Continually ask the right questions, advises Harvard Business School professor Robert Simons. By posing these provocative questions, you identify critical gaps in your strategy execution processes, focus on the most important choices you must make, and understand what's at stake in each one.In this concise guide, Simons presents the seven key questions you and your team must regularly explore together:·Who is your primary customer? Have you organized your company to deliver maximum value to that customer?·How do your core values prioritize shareholders, employees, and customers? Is everyone in your company committed to those values?·What critical performance variables are you tracking? How are you creating accountability for performance on those variables?·What strategic boundaries have you set? Does everyone know what actions are off-limits?·How are you generating creative tension? Is that tension catalyzing innovation across units?·How committed are your employees to helping each other? Are they sharing responsibility for your company’s success?·What strategic uncertainties keep you awake at night? How are you riveting everyone's attention on those uncertainties?These questions force you to reexamine the unspoken assumptions underlying your strategy and analyze how it's implemented through your business processes and structures. Simons' extensive examples then help you understand your options and make the tough choices needed for your company to excel at execution.Drawing on decades of research into performance management systems and organization design, Seven Strategy Questions is a no-nonsense, must-read resource for all leaders in your organization.
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Michael Bazzell - 2012
In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will greatly improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content Cell Phone Subscriber Information Deleted Websites & Posts Missing Facebook Profile Data Full Twitter Account Data Alias Social Network Profiles Free Investigative Software Useful Browser Extensions Alternative Search Engine Results Website Owner Information Photo GPS & Metadata Live Streaming Social Content Social Content by Location IP Addresses of Users Additional User Accounts Sensitive Documents & Photos Private Email Addresses Duplicate Video Posts Mobile App Network Data Unlisted Addresses s Public Government Records Document Metadata Rental Vehicle Contracts Online Criminal Activity Personal Radio Communications Compromised Email Information Automated Collection Solutions Linux Investigative Programs Dark Web Content (Tor) Restricted YouTube Content Hidden Website Details Vehicle Registration Details
Branson
Tom Bower - 2000
What is behind the success of the buccaneering balloonist, the tabloids’ favorite celebrity nude, the "grinning jumper," and the scourge of corporate goliaths? Helped by eyewitness accounts of more than 250 people with direct experience with Branson, Tom Bower has uncovered a different tale than the one so eagerly promoted by Virgin’s publicists. Here is the full story of Branson—his businesses, his friendships, his ambition, his law-breaking, his drug-taking, his bullying. From the cockpit of a balloon in the clouds to the center of Branson’s operations in his Holland Park home, this book is an intimate scrutiny of exactly how Richard Branson created himself and sold himself. Tom Bower’s biography reveals Branson to be a single-minded profiteer who, while occasionally generous to others, has a fixed purpose to enhance his family’s wealth in secret off-shore trust funds. Instead of a glittering saint, Branson emerges as a devious actor, proud of swiping for his own profit the good ideas of others. From his quest to acquire the license for the National Lottery to his plans to launch space tourism with Virgin Galactic, this fully updated edition follows Branson’s enterprises and investments up to his failed bid for Northern Rock.
Remote: Office Not Required
David Heinemeier Hansson - 2013
Moms in particular will welcome this trend. A full 60% wish they had a flexible work option. But companies see advantages too in the way remote work increases their talent pool, reduces turnover, lessens their real estate footprint, and improves the ability to conduct business across multiple time zones, to name just a few advantages. In Remote, inconoclastic authors Fried and Hansson will convince readers that letting all or part of work teams function remotely is a great idea--and they're going to show precisely how a remote work setup can be accomplished.
CISSP All-in-One Exam Guide
Shon Harris - 2001
Revised and updated using feedback from Instructors and students, learn security operations in the areas of telecommunications, cryptography, management practices, and more. Plan for continuity and disaster recovery. Update your knowledge of laws, investigations, and ethics. Plus, run the CD-ROM and practice with more than 500 all new simulated exam questions. Browse the all new electronic book for studying on the go. Let security consultant and author Shon Harris lead you to successful completion of the CISSP.
Conquering the Chaos: Win in India, Win Everywhere
Ravi Venkatesan - 2013
The renewal of interest in India is all the greater because of what’s happening in neighboring China. For over thirty years, China was the growth engine for many Western multinational companies, but the combination of a slowing economy, rising wages, and increasing political risk has most companies looking for the next China. No other country is better positioned to play that role than India. In the short term, though, India will remain a challenging market, with a well-deserved reputation for corruption, uncertainty, and stultifying bureaucracy. Those hurdles are unlikely to go away soon. Yet India may be on the verge of unprecedented growth. Can you afford to wait or should you plunge into this complex market today? What does it really take to win there? How do executives deal with India’s volatility, uncertainty, and intense competition—and even prosper from it? Ravi Venkatesan, the former Chairman of Microsoft India and Cummins India, offers expert advice on how your company can overcome the unique challenges of the Indian market. He argues that India is in fact an archetype for most developing nations, many of which present similar challenges. Succeeding in India is important not just because it is a big market but also because it is a litmus test for your corporation’s ability to succeed in other emerging markets. If you can win in India, you should be able to win anywhere. Hard as these frontier markets are, Venkatesan argues, the bigger hurdle may well be the internal culture and mind-set at a multinational’s headquarters. The unwillingness to make a long-term commitment or to adequately trust local leadership, combined with the propensity to rigidly replicate the products, business models, and operating systems that have worked at home, drives many companies into a “midway trap.” That often results in India remaining an irrelevantly small contributor to the company’s global growth and profits. Combining personal experience and in-depth interviews with CEOs and senior leaders at dozens of companies—including Microsoft, GE, JCB, Dell, Honeywell, Volvo, Bosch, Deere, Unilever, and Nestlé—Venkatesan shows you how to tackle political changes, policy uncertainty, and corruption and thrive in India. He proves that you can break through, but it takes a very different type of leadership, both locally and at corporate headquarters. If you want to succeed in the twenty-first century, you must succeed in emerging markets. This practical book, written by one of India’s most respected CEOs, gives you the keys to win in India, other emerging markets, and, indeed, globally.
The Standard for Portfolio Management
Project Management Institute - 2006
Product DetailsPaperback: 79 pagesPublisher: Project Management Inst (May 31, 2006)Language: EnglishISBN-10: 1930699905ISBN-13: 978-1930699908Product Dimensions: 10.9 x 8.5 x 0.3 inchesShipping Weight: 1.2 poundsAverage Customer Review: 3.7 out of 5 stars See all reviews (6 customer reviews)Amazon Best Sellers Rank: #372,351 in Books (See Top 100 in Books)
Hacking Exposed: Network Security Secrets & Solutions
Joel Scambray - 2003
Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material:
New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
New wireless and RFID security tools, including multilayered encryption and gateways
All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
Fully updated chapters on hacking the Internet user, web hacking, and securing code
Inside Cyber Warfare: Mapping the Cyber Underworld
Jeffrey Carr - 2009
You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and PalestineDiscover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nationsRead about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survivalFind out why many attacks originate from servers in the United States, and who's responsibleLearn how hackers are "weaponizing" malware to attack vulnerabilities at the application level
Strategic Management of Technological Innovation
Melissa A. Schilling - 2000
Unlike other books, Schilling's approach synthesizes the major research in the field, providing students with the knowledge needed to enhance case discussion and analysis. The subject is approached as a strategic process, and as such, is organized to mirror the strategic management process used in most strategy textbooks, progressing from assessing the competitive dynamics of a situation, to strategy formulation, to strategy implementation. As a brief, affordable paperback, it is ideal to package with cases. Recommended case sets from the author are available through the Primis Custom Case Database or from the Harvard Business School Case Database.