This book invites you to accompany new CIO Jim Barton to better understand the role of IT in your organization. You'll see Jim struggle through a challenging first year, handling (and fumbling) situations that, although fictional, are based on true events.
You can read this book from beginning to end, or treat is as a series of cases. You can also skip around to address your most pressing needs. For example, need to learn about crisis management and security? Read chapters 10-12. You can formulate your own responses to a CIO's obstacles by reading the authors' regular "Reflection" questions.
You'll turn to this book many times as you face IT-related issues in your own career.
Which paint color is most likely to tell you that a used car is in good shape? How can officials identify the most dangerous New York City manholes before they explode? And how did Google searches predict the spread of the H1N1 flu outbreak?
The key to answering these questions, and many more, is big data. “Big data” refers to our burgeoning ability to crunch vast collections of information, analyze it instantly, and draw sometimes profoundly surprising conclusions from it. This emerging science can translate myriad phenomena—from the price of airline tickets to the text of millions of books—into searchable form, and uses our increasing computing power to unearth epiphanies that we never could have seen before. A revolution on par with the Internet or perhaps even the printing press, big data will change the way we think about business, health, politics, education, and innovation in the years to come. It also poses fresh threats, from the inevitable end of privacy as we know it to the prospect of being penalized for things we haven’t even done yet, based on big data’s ability to predict our future behavior.
In this brilliantly clear, often surprising work, two leading experts explain what big data is, how it will change our lives, and what we can do to protect ourselves from its hazards. Big Data is the first big book about the next big thing.
The key? Make tough decisions about which processes you must execute well, then implement the IT systems needed to digitize those processes. Citing numerous companies worldwide, the authors show how constructing the right enterprise architecture enhances profitability and time to market, improves strategy execution, and even lowers IT costs. Though clear, engaging explanation, they demonstrate how to define your operating model—your vision of how your firm will survive and grow—and implement it through your enterprise architecture. Their counterintuitive but vital message: when it comes to executing your strategy, your enterprise architecture may matter far more than your strategy itself.
The book begins by tracing the historical development of emergency management from the 1800s to the present world of homeland security. It then discusses the hazards faced by emergency management and the methods of assessing hazard risk; the function of mitigation and the strategies and programs emergency management or other disciplines use to reduce the impact of disasters; and emergency management preparedness.
The book also covers the importance of communication in the emergency management of the twenty-first century; the functions and processes of disaster response; government and voluntary programs aimed at helping people and communities rebuild in the aftermath of a disaster; and international emergency management. It also addresses the impact of September 11, 2001 on traditional perceptions of emergency management; and emergency management in the post-9/11, post-Katrina environment.
* Expanded coverage of risk management * Enhanced coverage of disaster communications, including social networking sites like Twitter * More material on mitigation of disasters * Up-to-date information on the role of FEMA in the Obama administration
The text covers the fundamentals of pin tumbler and wafer locks; the basics of picking; beginner and advanced training; and quick entry techniques. The discussions focus on pin tumbler locks, with several diagrams provided to illustrate the construction and function of these locks. Guides and exercises demonstrate the use of basic lock-picking tools in order to manipulate and open these locks. The text also describes the most common “alternative designs of pin tumbler locks and summarizes the tools and techniques that can be effective against them.
The book can be a valuable resource for both beginners and those seeking advanced, professional training in lock picking. Individuals working in the field of penetration testing can use the book to enhance their repertoire of skills.Detailed photos make learning as easy as picking a lockDVD is filled with indispensible lock picking videos and color photosExtensive appendix details tools and toolkits currently available for all your lock picking needs
Mullins presents realistic, thorough, and up-to-date coverage of every DBA task, including creating database environments, data modeling, normalization, design, performance, data integrity, compliance, governance, security, backup/recovery, disaster planning, data and storage management, data movement/distribution, data warehousing, connectivity, metadata, tools, and more.
This edition adds new coverage of “Big Data,” database appliances, cloud computing, and NoSQL. Mullins includes an entirely new chapter on the DBA’s role in regulatory compliance, with substantial new material on data breaches, auditing, encryption, retention, and metadata management. You’ll also find an all-new glossary, plus up-to-the-minute DBA rules of thumb.
Master Data Management equips you with a deeply practical, business-focused way of thinking about MDM—an understanding that will greatly enhance your ability to communicate with stakeholders and win their support. Moreover, it will help you deserve their support: you’ll master all the details involved in planning and executing an MDM project that leads to measurable improvements in business productivity and effectiveness.
* Presents a comprehensive roadmap that you can adapt to any MDM project.
* Emphasizes the critical goal of maintaining and improving data quality.
* Provides guidelines for determining which data to “master.
* Examines special issues relating to master data metadata.
* Considers a range of MDM architectural styles.
* Covers the synchronization of master data across the application infrastructure.
Companies moving toward flexible SOA architectures often face difficult information management and integration challenges. The master data they rely on is often stored and managed in ways that are redundant, inconsistent, inaccessible, non-standardized, and poorly governed. Using Master Data Management (MDM), organizations can regain control of their master data, improve corresponding business processes, and maximize its value in SOA environments.
Enterprise Master Data Management provides an authoritative, vendor-independent MDM technical reference for practitioners: architects, technical analysts, consultants, solution designers, and senior IT decisionmakers. Written by the IBM® data management innovators who are pioneering MDM, this book systematically introduces MDM’s key concepts and technical themes, explains its business case, and illuminates how it interrelates with and enables SOA.
Drawing on their experience with cutting-edge projects, the authors introduce MDM patterns, blueprints, solutions, and best practices published nowhere else—everything you need to establish a consistent, manageable set of master data, and use it for competitive advantage.
How MDM and SOA complement each other Using the MDM Reference Architecture to position and design MDM solutions within an enterprise Assessing the value and risks to master data and applying the right security controls Using PIM-MDM and CDI-MDM Solution Blueprints to address industry-specific information management challenges Explaining MDM patterns as enablers to accelerate consistent MDM deployments Incorporating MDM solutions into existing IT landscapes via MDM Integration Blueprints Leveraging master data as an enterprise asset—bringing people, processes, and technology together with MDM and data governance Best practices in MDM deployment, including data warehouse and SAP integration
Jim Whitehurst, CEO of Red Hat, one of the world’s most revolutionary companies, shows how open principles of management—based on transparency, participation, and community—reinvent the organization for the fast-paced connected era. Whitehurst gives readers an insider’s look into how an open and innovative organizational model works. He shows how to leverage it to build community, respond quickly to opportunities, harness resources and talent both inside and outside the organization, and inspire, motivate, and empower people at all levels to act with accountability.
The Open Organization is a must-read for leaders struggling to adapt their management practices to the values of the digital and social age. Brimming with Whitehurst’s personal stories and candid advice for leading an open organization, as well as with instructive examples from employees and managers at Red Hat and companies such as Google, The Body Shop, and Whole Foods, this book provides the blueprint for reinventing your organization.
Essential SharePoint® 2010 approaches Microsoft SharePoint Server 2010 from a strict business value perspective, explaining exactly how to plan and implement SharePoint solutions to achieve superior business results.
The authors are leading enterprise SharePoint consultants and draw on their unsurpassed experience to focus on the SharePoint features that offer the most real-world value. You’ll find practical advice about how to succeed with knowledge management, business intelligence, and process improvement, and how to derive value from new innovations such as social tagging and mashups.
The book includes comprehensive, “in the trenches” guidance on planning, architecture, governance, training, and other key issues most SharePoint books ignore. The authors identify success factors, intangibles, and “gotchas,” helping you systematically reduce project risk and time-to-value ratio. Learn how toCustomize your best portal or collaboration strategy Sustain a portal for continual, measurable value Leverage the new community and social features in SharePoint 2010 Succeed with enterprise content management Streamline business processes with Workflow and Forms Choose the right roles for Web collaboration, search, and Microsoft Office Plan for secure external collaboration Migrate smoothly from SharePoint 2007 Train and communicate for a successful launch
Whether you’re a business leader, IT manager, architect, analyst, developer, or consultant, this book will help you tightly align SharePoint projects with business strategy to deliver outstanding results.
The book takes you step-by-step through the analysis of case law as it applies to situations commonly faced by security practitioners. It describes the legal requirements faced by security firms and emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency. It also examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that are likely to intensify in the future. New features of this edition include: a chapter on the legal implications of private contractors operating in war zones like Afghanistan; updated coverage of statutory authority, as well as state and federal processes of oversight and licensure; and special analysis of public-private cooperative relationships in law enforcement. A historical background helps readers understand the present by seeing the full context of recent developments.
This book will appeal to: students in physical security, security management, and criminal justice programs in traditional and for-profit schools; security professionals; and those working in law enforcement.Authoritative, scholarly treatise sheds light on this increasingly important area of the lawHistorical background helps readers understand the present by seeing the full context of recent developmentsNational scope provides crucial parameters to security practitioners throughout the USNEW TO THIS EDITION! A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement
Lopp's straight-from-the-hip style is unlike any other writer on management. He pulls no punches and tells stories he probably shouldn't. But they are massively instructive and cut to the heart of the matter whether it's dealing with your boss, handling a slacker, hiring top guns, or seeing a knotty project through to completion.
This second editions expands on the management essentials. It will explain why we hate meetings, but must have them, it carefully documents the right way to have a 1-on-1, and it documents the perils of not listening to your team.
Writing code is easy. Managing humans is not. You need a book to help you do it, and this is it.
Covering cloud computing from what the business leader needs to know, this book describes how IT can nimbly ramp up revenue initiatives, positively impact business operations and costs, and how this allows business leaders to shed worry about technology so they can focus on their business. It also reveals the cloud's effect on corporate organization structures, the evolution of traditional IT in the global economy, potential benefits and risks of cloud models and most importantly, how the IT function is being rethought by companies today who are making room for the coming tidal wave that is cloud computing.Why IT and business thinking must change to capture the full potential of cloud computing Topics including emerging cloud solutions, data security, service reliability, the new role of IT and new business organization structures Other titles by Hugos include: Business Agility: Sustainable Prosperity in a Relentlessly Competitive World and Essentials of Supply Chain Management, 2nd Edition
Practical and timely, this book reveals why it's worth every company's time and effort to exploit cloud computing's potential for their business's survival and success.
Implementing an enterprise-wide Configuration Management Database (CMDB) is one of the most influential actions an IT organization can take to improve service delivery and bridge the gap between technology and the business. With a well-designed CMDB in place, companies are better positioned to manage and optimize IT infrastructure, applications, and services; automate more IT management tasks; and restrain burgeoning costs. Now, there’s an objective, vendor-independent guide to making a CMDB work in your organization. The CMDB Imperative presents a start-to-finish implementation methodology that works and describes how the CMDB is shifting to the superior Configuration Management System (CMS).
Expert CMDB industry analyst Glenn O’Donnell and leading-edge architect and practitioner Carlos Casanova first review the drivers behind a CMDB and the technical, economic, cultural, and political obstacles to success. Drawing on the experiences of hundreds of organizations, they present indispensable guidance on architecting and customizing CMDB solutions to your specific environment. They’ll guide you through planning, implementation, transitioning into production, day-to-day operation and maintenance, and much more. Coverage includes
Defining the tasks and activities associated with configuration management Understanding the CMDB’s role in ITIL and the relationship between CMDBs and ITIL v3’s CMS Building software models that accurately represent each entity in your IT environment Ensuring information accuracy via change management and automated discovery Understanding the state of the CMDB market and selling the CMDB within your organization Creating federated CMDB architectures that successfully balance autonomy with centralized control Planning a deployment strategy that sets appropriate priorities and reflects a realistic view of your organization’s maturity Integrating systems and leveraging established and emerging standards Previewing the future of the CMDB/CMS and how it will be impacted by key trends such as virtualization, SOA, mobility, convergence, and “flexi-sourcing”
Today, number crunching affects your life in ways you might never imagine. In this lively and groundbreaking new book, economist Ian Ayres shows how today's best and brightest organizations are analyzing massive databases at lightening speed to provide greater insights into human behavior. They are the Super Crunchers. From internet sites like Google and Amazon that know your tastes better than you do, to a physician's diagnosis and your child's education, to boardrooms and government agencies, this new breed of decision makers are calling the shots. And they are delivering staggeringly accurate results. How can a football coach evaluate a player without ever seeing him play? Want to know whether the price of an airline ticket will go up or down before you buy? How can a formula outpredict wine experts in determining the best vintages? Super crunchers have the answers. In this brave new world of equation versus expertise, Ayres shows us the benefits and risks, who loses and who wins, and how super crunching can be used to help, not manipulate us.
Gone are the days of solely relying on intuition to make decisions. No businessperson, consumer, or student who wants to stay ahead of the curve should make another keystroke without reading Super Crunchers.
From the Hardcover edition.
When the term “big data” first came on the scene, bestselling author Tom Davenport (Competing on Analytics, Analytics at Work) thought it was just another example of technology hype. But his research in the years that followed changed his mind.
Now, in clear, conversational language, Davenport explains what big data means—and why everyone in business needs to know about it. Big Data at Work covers all the bases: what big data means from a technical, consumer, and management perspective; what its opportunities and costs are; where it can have real business impact; and which aspects of this hot topic have been oversold.
This book will help you understand:
• Why big data is important to you and your organization
• What technology you need to manage it
• How big data could change your job, your company, and your industry
• How to hire, rent, or develop the kinds of people who make big data work
• The key success factors in implementing any big data project
• How big data is leading to a new approach to managing analytics
With dozens of company examples, including UPS, GE, Amazon, United Healthcare, Citigroup, and many others, this book will help you seize all opportunities—from improving decisions, products, and services to strengthening customer relationships. It will show you how to put big data to work in your own organization so that you too can harness the power of this ever-evolving new resource.
In All You Can Pay, Anna Bernasek and D.T. Mongan show how companies use what they know about you to determine how much you are willing to pay for certain products and services. Colleges calculate the price you pay based on the information revealed in the application almost all parents submit for federal aid. Hotels, sports events and health products and services are also using this strategy. The price of everything online—from airline tickets to toilet paper—now fluctuates from moment to moment. Through a toxic combination of price discrimination and cutting-edge technology, sellers can instantly change the price they charge an individual based on their calculations of demand and supply at that point in time. Online stores use your zip code to charge you a different price from someone in another zip code.
Bernasek and Mongan offer a dire warning and demonstrate how big data threatens the very icon of the American way: the free market. The ability to understand consumers on a granular level, in real time, and simultaneously to customize the price each person is offered, shifts the balance of power away from the consumer so dramatically that the freedom of markets is at risk. The trend is alarming and, if left unchecked, the destination is clear. Yet consumers and companies can still choose a different path, and in this chilling and illuminating book, Bernasek and Mongan show us how.
* Completely updated with coverage of all core security principles
* Course text for the Certified Protection Officer (CPO) Program
* Includes all new sections on information security, terrorism awareness, and first response during crises
Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management.Comprehensive introduction to security and IT security management principlesDiscussion of both public and private sector roles, as well as the increasingly common privatizing of government functionsNew experience-based exercises to sharpen security management and strategic skills and reinforce the content of each chapter
In Data Driven, Thomas Redman, the "Data Doc," shows how to leverage and deploy data to sharpen your company's competitive edge and enhance its profitability. The author reveals:
· The special properties that make data such a powerful asset
· The hidden costs of flawed, outdated, or otherwise poor-quality data
· How to improve data quality for competitive advantage
· Strategies for exploiting your data to make better business decisions
· The many ways to bring data to market
· Ideas for dealing with political struggles over data and concerns about privacy rights
Your company's data is a key business asset, and you need to manage it aggressively and professionally. Whether you're a top executive, an aspiring leader, or a product-line manager, this eye-opening book provides the tools and thinking you need to do that.
Updates include 14 new chapters, 3 completely revised chapters, "Student Performance Objectives" in each chapter, and added information on related resources (both print and online).
* Completion of the Security Supervision and Management Program is the initial step toward the Certified in Security Supervision and Management (CSSM) designation
* Over 40 experienced security professionals contribute chapters in their area of specialty
* Revised throughout, and completely updated with 14 new chapters on topics such as Leadership, Homeland Security, Strategic Planning and Management, Budget Planning, Career Planning, and much more.
* Quizzes at the end of each chapter allow for self testing or enhanced classroom work
This book includes primary texts, reader-friendly expository explanations, and sample discussion questions. Prior knowledge of the law is not necessary in order to use and understand this book. The contents are organized into 13 substantive chapters plus two additional chapters with problem sets, making the book especially easy to use for a separate course focused on law. The book leads students through the process of understanding both what the law requires and how to analyze issues for which there is no clear legal answer. It features materials on such critical issues as how to judge the extent of Constitutional authority for government to intervene in the lives and property of American citizens. At the same time, it also captures bread-and-butter issues such as responder liability and disaster relief methods. No other book brings these components together in a logically organized, step by step fashion. The book also features case studies of high-risk scenarios including pandemic flu, together with charts and text boxes for clarification.
This book will be of interest to graduate and undergraduate students studying the major legal principles underlying emergency management and homeland security policy and operations; professionals in EM and HS; and private-sector risk managers.
* Features case studies of high-risk scenarios including pandemic flu
* Offers extensive analysis of legal issues from a distinguished scholar, together with charts and text boxes for clarification
* Teaches readers how to think about issues crucial to the life and liberty of US citizens, including the limits of constitutional authority
The perspective of the book is from the top down: looking at the overall architecture and then delving into the issues underlying the components. This allows people who are building or using a data warehouse to see what lies ahead and determine what new technology to buy, how to plan extensions to the data warehouse, what can be salvaged from the current system, and how to justify the expense at the most practical level. This book gives experienced data warehouse professionals everything they need in order to implement the new generation DW 2.0.
It is designed for professionals in the IT organization, including data architects, DBAs, systems design and development professionals, as well as data warehouse and knowledge management professionals.
* First book on the new generation of data warehouse architecture, DW 2.0.
* Written by the "father of the data warehouse", Bill Inmon, a columnist and newsletter editor of The Bill Inmon Channel on the Business Intelligence Network.
* Long overdue comprehensive coverage of the implementation of technology and tools that enable the new generation of the DW: metadata, temporal data, ETL, unstructured data, and data quality control.
It presents proven strategies to prevent and reduce incidents of loss due to legal issues, theft and other crimes, fire, accidental or intentional harm from employees as well as the many ramifications of corporate mismanagement. It contains a brand new terrorism chapter, along with coverage on background investigations, protection of sensitive information, internal threats, and considerations at select facilities (nuclear, DoD, government and federal). Author Philip Purpura once again demonstrates why students and professionals alike rely on this best-selling text as a timely, reliable resource.
This book is an ideal resource for criminal justice and security academic programs, physical security professionals, retail security professionals, security managers, security consultants, law enforcement professionals, investigations professionals, risk and contingency planning professionals.
- Covers the latest professional security issues surrounding Homeland Security and risks presented by threats of terrorism
- Recommended reading for ASIS International's prestigious CPP Certification
- Cases provide real-world applications
Strategic IT Best Practices for IT Managers and Executives is an exciting new book focused on the transition currently taking place in the CIO role, which involves developing a capacity for thinking strategically and effectively engaging peers in the senior executive team. This involves changing both theirs, and often their colleagues', mindsets about technology and their role in the organization.
Straightforward and clear, this book fills the need for understanding the learning processes that have shaped the strategic mindsets of technology executives who have successfully made the transition from a technology-focused expert mindset to a strategic orientation that adds value to the business.Defines strategy advocacy as a process through which technology leaders in organizations build on their functional expertise Focuses on the shift in mindset necessary for technology executives to establish a seat at the table in the C suite as a respected strategic colleague Includes stories of high performing CIOs and how they learned successful strategies for getting technology positioned as a strategic driver across the business
Written by Art Langer and Lyle Yorks, recognized authorities in the areas of technology management and leadership, Strategic IT Best Practices for IT Managers and Executives includes anecdotes from CIOs at companies including BP, Prudential, Covance, Guardian, Merck, and others.
* Provides practical, "battle tested" rules and guidelines to protect computer networks against different forms of attack * Covers both network and client level attacks, including attacks via the internet and damage to the physical hardware of a network
"Uniting the Virtual Workforce offers much-needed guidance on how to navigate the largely unmapped territory of virtual work environments in the global economy. The authors do an outstanding job of presenting how organizations should address the challenges of virtual workforces so as to reap the huge potential benefits of increased growth, productivity, and innovation."
-C. Warren Axelrod, PhD, Chief Privacy Officer and Business Information Security Officer, U.S. Trust, and author of Outsourcing Information Security
"Lojeski and Reilly bring us something that readers of business books so rarely get-no nonsense practical guidance on how to manage distance, especially where it most often serves as an impediment to working effectively.Ê If you interface with widely dispersed team members who rarely see one another and communicate by virtue of impersonal electronics, you may expect to find this book provocative, counterintuitive, and above all, exciting. It gives all of us who have to struggle, while working with talent stretched across distance, hope, that maybe there are ways to do this right!"
-Patrick J. McKenna, author of First Among EqualsÊ
"A must-read for global corporate executives who manage geographically dispersed job sharing teams. Practical strategies for preventing productivity loss and optimizing innovation. The authors pull no punches in showing the real downsides to the virtual work phenomenon; they have done a great service for us all."
-Jeff Saperstein, author of Creating Regional Wealth in the Innovation Economy
"Uniting the Virtual Workforce charts the course for competing in the twenty-first century by tapping into the powers of virtual work. Any manager who ignores the virtual workforce is underperforming, and any company or organization that does not appreciate virtual work is already at a competitive disadvantage. Karen and Dick have tapped into a key ingredient in the recipe for global growth."
-Jerry MacArthur Hultin, President, Polytechnic University, and former Under Secretary of the Navy
"Authors Sobel Lojeski and Reilly have provided a useful primer for the harried executive striving for productivity improvements while seeing the workload expand and the workforce disperse. Using conceptual definitions of Physical, Operational, and Affinity Distance to describe the multifaceted dimensions of building teams of people to work effectively together, the authors construct a very powerful set of metrics for a manager to improve the capability of his or her workgroup, no matter where it resides or how it is composed. The book is rich in anecdotes and specific studies that illustrate the concepts in an engaging, pertinent, and easy-to-understand manner. In an age of outsourcing, offshoring, and decentralizing groups of people who have to get things done together, reading this small book will repay itself many times over."
-Charles House, Director, Media X Lab at Stanford University, and former Director of the Societal Impact of Technology, Intel Corporation
It includes new coverage throughout of terrorism as it relates to cargo and travel security, potential areas of attack and target hardening techniques, and the use of current technologies to combat new threats.
The book begins with a new chapter on the development of Homeland Security in the United States. Traditional physical and guard security is covered in addition to advances in the electronic and computer security areas, including biometric security, access control, CCTV surveillance advances, as well as the growing computer security issues of identity theft and computer fraud.
The Seventh Edition provides the most comprehensive breakdown of security issues for the student while detailing the latest trends, legislation, and technology in the private and government sectors for real-world application in students' future careers. As the definitive resource for anyone entering or currently working in the security industry, this book will also benefit law enforcement personnel, security consultants, security managers, security guards and other security professionals, and individuals responsible for Homeland Security.
* Examines the attacks of September 11th, 2001 and the lasting impact on the security industry
* Expanded figures and photographs support new coverage of emerging security issues
* Recommended reading for the American Society for Industrial Security's (ASIS) Certified Protection Professional (CPP) and Physical Security Professional (PSP) exams
This book is a guide for the savvy manager who wants to capitalize on this technological revolution. It begins with a high-level example of how an average person might interact with a service-oriented architecture, and progresses to more detail, discussing technical forces driving adoption and how to manage technology, culture and personnel issues that can arise during adoption. An extensive reference section provides quick access to commonly used terms and concepts.Broad, non-technical explanation of a technical topic for managers at all levelsOnly web services book to cover data management and software engineering perspectives; excellent resource for all members of IT teamsProvides a set of leadership principles and suggested applications for using this technology
The book contains 12 units and 45 chapters. Written by leading security educators, trainers and consultants, it has served as the authoritative text for both students and professionals worldwide. This new edition adds critical updates and fresh pedagogy, as well as new diagrams, illustrations, and self assessments. Information included is designed to reflect the latest trends in the industry and to support and reinforce continued professional development. The book concludes with an Emerging Trends feature, laying the groundwork for the future growth of this increasingly vital profession.
This will be an ideal reference for security students and CPO candidates.Information included is designed to reflect the latest trends in the industry and to support and reinforce continued professional development.Concludes chapters with an Emerging Trends feature, laying the groundwork for the future growth of this increasingly vital profession.Written by a cross-disciplinary contributor team consisting of top experts in their respective fields.
Building on the success of the first edition, this considerably expanded second edition now comprises four parts. Part I contains the foundational concepts, as well as a new first chapter that explains the central role of queues in successful performance analysis. Part II provides the basics of queueing theory in a highly intelligible style for the non-mathematician; little more than high-school algebra being required. Part III presents many practical examples of how PDQ can be applied. The PDQ manual has been relegated to an appendix in Part IV, along with solutions to the exercises contained in each chapter.Throughout, the Perl code listings have been newly formatted to improve readability. The PDQ code and updates to the PDQ manual are available from the author's web site at www.perfdynamics.com
Storytelling with Data teaches you the fundamentals of data visualization and how to communicate effectively with data. You'll discover the power of storytelling and the way to make data a pivotal point in your story. The lessons in this illuminative text are grounded in theory, but made accessible through numerous real-world examples—ready for immediate application to your next graph or presentation.
Storytelling is not an inherent skill, especially when it comes to data visualization, and the tools at our disposal don't make it any easier. This book demonstrates how to go beyond conventional tools to reach the root of your data, and how to use your data to create an engaging, informative, compelling story. Specifically, you'll learn how to:Understand the importance of context and audience Determine the appropriate type of graph for your situation Recognize and eliminate the clutter clouding your information Direct your audience's attention to the most important parts of your data Think like a designer and utilize concepts of design in data visualization Leverage the power of storytelling to help your message resonate with your audience
Together, the lessons in this book will help you turn your data into high impact visual stories that stick with your audience. Rid your world of ineffective graphs, one exploding 3D pie chart at a time. There is a story in your data—Storytelling with Data will give you the skills and power to tell it!
Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
A key Guerrilla concept is tactical planning whereby short-range planning questions and projects are brought up in team meetings such that management is compelled to know the answer, and therefore buys into capacity planning without recognizing it as such. Once you have your "foot in the door", capacity planning methods can be refined in an iterative cycle of improvement called "The Wheel of Capacity Planning". Another unique Guerrilla tool is Virtual Load Testing, based on Dr. Gunther's "Universal Law of Computational Scaling", which provides a highly cost-effective method for assessing application scalability.
"Honest and moving...Her painful tale is engrossing."
WASHINGTON POST BOOK WORLD
From the Paperback edition.
Social Network Data Analytics covers an important niche in the social network analytics field. This edited volume, contributed by prominent researchers in this field, presents a wide selection of topics on social network data mining such as Structural Properties of Social Networks, Algorithms for Structural Discovery of Social Networks and Content Analysis in Social Networks. This book is also unique in focussing on the data analytical aspects of social networks in the internet scenario, rather than the traditional sociology-driven emphasis prevalent in the existing books, which do not focus on the unique data-intensive characteristics of online social networks. Emphasis is placed on simplifying the content so that students and practitioners benefit from this book.
This book targets advanced level students and researchers concentrating on computer science as a secondary text or reference book. Data mining, database, information security, electronic commerce and machine learning professionals will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science.
"It's unlikely that Trump has ever read Amusing Ourselves to Death, but his ascent would not have surprised Postman.” -CNN
Originally published in 1985, Neil Postman’s groundbreaking polemic about the corrosive effects of television on our politics and public discourse has been hailed as a twenty-first-century book published in the twentieth century. Now, with television joined by more sophisticated electronic media—from the Internet to cell phones to DVDs—it has taken on even greater significance. Amusing Ourselves to Death is a prophetic look at what happens when politics, journalism, education, and even religion become subject to the demands of entertainment. It is also a blueprint for regaining control of our media, so that they can serve our highest goals.
“A brilliant, powerful, and important book. This is an indictment that Postman has laid down and, so far as I can see, an irrefutable one.” –Jonathan Yardley, The Washington Post Book World
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.
The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters—such as Topiary, tflow, Anachaos, and Sabu—emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of “trolling,” the ethics and metaphysics of hacking, and the origins and manifold meanings of “the lulz.”
From the Hardcover edition.
Weaving personal experiences through meticulous research, the author ranges widely over aspects of television that have rarely been examined and never before joined together, allowing an entirely new, frightening image to emerge. The idea that all technologies are "neutral," benign instruments that can be used well or badly, is thrown open to profound doubt. Speaking of TV reform is, in the words of the author, "as absurd as speaking of the reform of a technology such as guns."
When Rupert Murdoch enlisted Roger Ailes to launch a cable news network in 1996, American politics and media changed forever. With a remarkable level of detail and insight, New York magazine reporter Gabriel Sherman brings Ailes’s unique genius to life, along with the outsize personalities—Bill O’Reilly, Sean Hannity, Megyn Kelly, Sarah Palin, Karl Rove, Glenn Beck, Mike Huckabee, and others—who have helped Fox News play a defining role in the great social and political controversies of the past two decades. From the Clinton-Lewinsky scandal to the Bush-Gore recount, from the war in Iraq to the Tea Party attack on the Obama presidency, Roger Ailes has developed an unrivaled power to sway the national agenda. Even more, he has become the indispensable figure in conservative America and the man any Republican politician with presidential aspirations must court.
How did this man, whose life story has until now been shrouded in myth, become the master strategist of our political landscape? In revelatory detail, Sherman chronicles the rise of Ailes, a sickly kid from an Ohio factory town who, through sheer willpower, the flair of a showman, fierce corporate politicking, and a profound understanding of the priorities of middle America, built the most influential television news empire of our time.
Drawing on hundreds of interviews with Fox News insiders past and present, Sherman documents Ailes’s tactical acuity as he battles the press, business rivals, and countless real and perceived enemies inside and outside Fox. Sherman takes us inside the morning meetings in which Ailes and other high-level executives strategize Fox’s presentation of the news to advance Ailes’s political agenda; provides behind-the-scenes details of Ailes’s crucial role as finder and shaper of talent, including his sometimes rocky relationships with Fox News stars such as O’Reilly and Hannity; and probes Ailes’s fraught partnership with his equally brash and mercurial boss, Rupert Murdoch.
Roger Ailes’s life is a story worthy of Citizen Kane. Featuring a new afterword about Ailes's epic downfall during the extraordinary 2016 election, The Loudest Voice in the Room is an extraordinary feat of reportage with a compelling human drama at its heart.
NAMED ONE OF THE BEST BOOKS OF THE YEAR BY NPR
“[An] actually fair and balanced, carefully documented biography.”—Jacob Weisberg, The New York Times Book Review
“The book excels at compiling data establishing Ailes’s control freakishness and authoritarian nature. . . . A veteran of the New York media-reporting scene, Sherman nails the Fox News palace intrigue and brings to light interactions that Ailes clearly never wanted to go public.”—Erik Wemple, The Washington Post
“[An] enormously entertaining new biography.”—The New Republic
“A thoroughly reported look behind that curtain . . . Part of the reason [Ailes] and his allies have campaigned against the book is not because it is false, but because it tells a true story.”—David Carr, The New York Times
“Sherman is at his best writing with sweep about the history of cable news and placing Ailes in context.”—Los Angeles Times
Winner of the 2007 Society for Cinema and Media Studies Katherine Singer Kovacs Book Award
2007 Choice Outstanding Academic Title
Convergence Culture maps a new territory: where old and new media intersect, where grassroots and corporate media collide, where the power of the media producer and the power of the consumer interact in unpredictable ways.
Henry Jenkins, one of America’s most respected media analysts, delves beneath the new media hype to uncover the important cultural transformations that are taking place as media converge. He takes us into the secret world of Survivor Spoilers, where avid internet users pool their knowledge to unearth the show’s secrets before they are revealed on the air. He introduces us to young Harry Potter fans who are writing their own Hogwarts tales while executives at Warner Brothers struggle for control of their franchise. He shows us how The Matrix has pushed transmedia storytelling to new levels, creating a fictional world where consumers track down bits of the story across multiple media channels.Jenkins argues that struggles over convergence will redefine the face of American popular culture. Industry leaders see opportunities to direct content across many channels to increase revenue and broaden markets. At the same time, consumers envision a liberated public sphere, free of network controls, in a decentralized media environment. Sometimes corporate and grassroots efforts reinforce each other, creating closer, more rewarding relations between media producers and consumers. Sometimes these two forces are at war.
Jenkins provides a riveting introduction to the world where every story gets told and every brand gets sold across multiple media platforms. He explains the cultural shift that is occurring as consumers fight for control across disparate channels, changing the way we do business, elect our leaders, and educate our children.
She is a fascinating and unique collection of interconnected poems by this multi-talented star -- and marks the beginning of an incredible and totally original artistic career.
The Internet has been hailed as an unprecedented democratizing force, a place where everyone can be heard and all can participate equally. But how true is this claim? In a seminal dismantling of techno-utopian visions, The People's Platform argues that for all that we "tweet" and "like" and "share," the Internet in fact reflects and amplifies real-world inequities at least as much as it ameliorates them. Online, just as off-line, attention and influence largely accrue to those who already have plenty of both.
What we have seen so far, Astra Taylor says, has been not a revolution but a rearrangement. Although Silicon Valley tycoons have eclipsed Hollywood moguls, a handful of giants like Amazon, Apple, Google, and Facebook remain the gatekeepers. And the worst habits of the old media model—the pressure to seek easy celebrity, to be quick and sensational above all—have proliferated on the web, where "aggregating" the work of others is the surest way to attract eyeballs and ad revenue. When culture is "free," creative work has diminishing value and advertising fuels the system. The new order looks suspiciously like the old one.
We can do better, Taylor insists. The online world does offer a unique opportunity, but a democratic culture that supports diverse voices and work of lasting value will not spring up from technology alone. If we want the Internet to truly be a people's platform, we will have to make it so.
In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what’s at stake for Internet users and citizens. As cyberspace develops in unprecedented ways, powerful agents are scrambling for control. Predatory cyber criminal gangs such as Koobface have made social media their stalking ground. The discovery of Stuxnet, a computer worm reportedly developed by Israel and the United States and aimed at Iran’s nuclear facilities, showed that state cyberwar is now a very real possibility. Governments and corporations are in collusion and are setting the rules of the road behind closed doors.
This is not the way it was supposed to be. The Internet’s original promise of a global commons of shared knowledge and communications is now under threat.
Drawing on the first-hand experiences of one of the most important protagonists in the battle — the Citizen Lab and its global network of frontline researchers, who have spent more than a decade cracking cyber espionage rings and uncovering attacks on citizens and NGOs worldwide — Black Code takes readers on a fascinating journey into the battle for cyberspace. Thought-provoking, compelling, and sometimes frightening, it is a wakeup call to citizens who have come to take the Internet for granted. Cyberspace is ours, it is what we make of it, Deibert argues, and we need to act now before it slips through our grasp.
In The Revolution Was Televised, celebrated TV critic Alan Sepinwall chronicles the remarkable transformation of the small screen over the past fifteen years. Focusing on twelve innovative television dramas that changed the medium and the culture at large forever, including The Sopranos, Oz, The Wire, Deadwood, The Shield, Lost, Buffy the Vampire Slayer, 24, Battlestar Galactica, Friday Night Lights, Mad Men, and Breaking Bad, Sepinwall weaves his trademark incisive criticism with highly entertaining reporting about the real-life characters and conflicts behind the scenes.
Drawing on interviews with writers David Chase, David Simon, David Milch, Joel Surnow and Howard Gordon, Damon Lindelof and Carlton Cuse, and Vince Gilligan, among others, along with the network executives responsible for green-lighting these groundbreaking shows, The Revolution Was Televised is the story of a new golden age in TV, one that’s as rich with drama and thrills as the very shows themselves.
Wil van der Aalst delivers the first book on process mining. It aims to be self-contained while covering the entire process mining spectrum from process discovery to operational support. In Part I, the author provides the basics of business process modeling and data mining necessary to understand the remainder of the book. Part II focuses on process discovery as the most important process mining task. Part III moves beyond discovering the control flow of processes and highlights conformance checking, and organizational and time perspectives. Part IV guides the reader in successfully applying process mining in practice, including an introduction to the widely used open-source tool ProM. Finally, Part V takes a step back, reflecting on the material presented and the key open challenges.Overall, this book provides a comprehensive overview of the state of the art in process mining. It is intended for business process analysts, business consultants, process managers, graduate students, and BPM researchers.