Smart Security: Practices that Increase Business Profits offers proven concepts and practices for those seeking new and creative ways to understand and shape security that are tailored to the needs of their business or organization. In this 58-minute Proven Practices presentation, presenter J. David Quilter discusses how a fully integrated security program increases business profits while delivering smart security practices at the same time.
The term "smart security" means to be simple, knowledgeable of both business and security basics, knowledgeable of the business market, and having a clear understanding of business principals. Using this definition, the presentation covers how to win and sustain executive leadership, deal with business realities, identify the root causes of business losses, and how to hold a frank and open discussion on loss when dealing with business risk.
Smart Security: Practices that Increase Business Profits is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.The 58-minute, visual PowerPoint presentation with audio narration format is excellent for group learningExplains how to determine the root causes of business losses, such as internal fraud, counterfeit products, and theftShows how to collaborate with operations and other business functions such as human resources, environmental health and safety, audit, legal, and more
The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced.
With the help of a prospective board member and his mysterious philosophy of The Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined. With the clock ticking, Bill must organize work flow, streamline interdepartmental communications, and effectively serve the other business functions at Parts Unlimited.
In a fast-paced and entertaining style, three luminaries of the DevOps movement deliver a story that anyone who works in IT will recognize. Readers will not only learn how to improve their own IT organizations, they'll never view IT the same way again.
From One Winning Career to the Next is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.Provides tips for all aspects of a career change, including narrowing the job search, preparing for an interview, presenting yourself in an interview, researching a company, and evaluating a positionPrepares security leaders for specific challenges they may face during the transition into a new positionIncludes easily adaptable, on-the-job lessons for a newly hired security leader
More than ever, the effective management of technology is critical for business competitiveness. For decades, technology leaders have struggled to balance agility, reliability, and security. The consequences of failure have never been greater―whether it's the healthcare.gov debacle, cardholder data breaches, or missing the boat with Big Data in the cloud.
And yet, high performers using DevOps principles, such as Google, Amazon, Facebook, Etsy, and Netflix, are routinely and reliably deploying code into production hundreds, or even thousands, of times per day.
Following in the footsteps of The Phoenix Project, The DevOps Handbook shows leaders how to replicate these incredible outcomes, by showing how to integrate Product Management, Development, QA, IT Operations, and Information Security to elevate your company and win in the marketplace.
Take the DORA DevOps X-ray Assessment and see where you stand! Visit devops-survey.com with your access code to take the DevOps X-ray Assessment.
Blending the informed analysis of The Signal and the Noise with the instructive iconoclasm of Think Like a Freak, a fascinating, illuminating, and witty look at what the vast amounts of information now instantly available to us reveals about ourselves and our world—provided we ask the right questions.
By the end of an average day in the early twenty-first century, human beings searching the internet will amass eight trillion gigabytes of data. This staggering amount of information—unprecedented in history—can tell us a great deal about who we are—the fears, desires, and behaviors that drive us, and the conscious and unconscious decisions we make. From the profound to the mundane, we can gain astonishing knowledge about the human psyche that less than twenty years ago, seemed unfathomable.
Everybody Lies offers fascinating, surprising, and sometimes laugh-out-loud insights into everything from economics to ethics to sports to race to sex, gender and more, all drawn from the world of big data. What percentage of white voters didn’t vote for Barack Obama because he’s black? Does where you go to school effect how successful you are in life? Do parents secretly favor boy children over girls? Do violent films affect the crime rate? Can you beat the stock market? How regularly do we lie about our sex lives and who’s more self-conscious about sex, men or women?
Investigating these questions and a host of others, Seth Stephens-Davidowitz offers revelations that can help us understand ourselves and our lives better. Drawing on studies and experiments on how we really live and think, he demonstrates in fascinating and often funny ways the extent to which all the world is indeed a lab. With conclusions ranging from strange-but-true to thought-provoking to disturbing, he explores the power of this digital truth serum and its deeper potential—revealing biases deeply embedded within us, information we can use to change our culture, and the questions we’re afraid to ask that might be essential to our health—both emotional and physical. All of us are touched by big data everyday, and its influence is multiplying. Everybody Lies challenges us to think differently about how we see it and the world.
Which paint color is most likely to tell you that a used car is in good shape? How can officials identify the most dangerous New York City manholes before they explode? And how did Google searches predict the spread of the H1N1 flu outbreak?
The key to answering these questions, and many more, is big data. “Big data” refers to our burgeoning ability to crunch vast collections of information, analyze it instantly, and draw sometimes profoundly surprising conclusions from it. This emerging science can translate myriad phenomena—from the price of airline tickets to the text of millions of books—into searchable form, and uses our increasing computing power to unearth epiphanies that we never could have seen before. A revolution on par with the Internet or perhaps even the printing press, big data will change the way we think about business, health, politics, education, and innovation in the years to come. It also poses fresh threats, from the inevitable end of privacy as we know it to the prospect of being penalized for things we haven’t even done yet, based on big data’s ability to predict our future behavior.
In this brilliantly clear, often surprising work, two leading experts explain what big data is, how it will change our lives, and what we can do to protect ourselves from its hazards. Big Data is the first big book about the next big thing.
Today, number crunching affects your life in ways you might never imagine. In this lively and groundbreaking new book, economist Ian Ayres shows how today's best and brightest organizations are analyzing massive databases at lightening speed to provide greater insights into human behavior. They are the Super Crunchers. From internet sites like Google and Amazon that know your tastes better than you do, to a physician's diagnosis and your child's education, to boardrooms and government agencies, this new breed of decision makers are calling the shots. And they are delivering staggeringly accurate results. How can a football coach evaluate a player without ever seeing him play? Want to know whether the price of an airline ticket will go up or down before you buy? How can a formula outpredict wine experts in determining the best vintages? Super crunchers have the answers. In this brave new world of equation versus expertise, Ayres shows us the benefits and risks, who loses and who wins, and how super crunching can be used to help, not manipulate us.
Gone are the days of solely relying on intuition to make decisions. No businessperson, consumer, or student who wants to stay ahead of the curve should make another keystroke without reading Super Crunchers.
From the Hardcover edition.
The key? Make tough decisions about which processes you must execute well, then implement the IT systems needed to digitize those processes. Citing numerous companies worldwide, the authors show how constructing the right enterprise architecture enhances profitability and time to market, improves strategy execution, and even lowers IT costs. Though clear, engaging explanation, they demonstrate how to define your operating model—your vision of how your firm will survive and grow—and implement it through your enterprise architecture. Their counterintuitive but vital message: when it comes to executing your strategy, your enterprise architecture may matter far more than your strategy itself.
Jim Whitehurst, CEO of Red Hat, one of the world’s most revolutionary companies, shows how open principles of management—based on transparency, participation, and community—reinvent the organization for the fast-paced connected era. Whitehurst gives readers an insider’s look into how an open and innovative organizational model works. He shows how to leverage it to build community, respond quickly to opportunities, harness resources and talent both inside and outside the organization, and inspire, motivate, and empower people at all levels to act with accountability.
The Open Organization is a must-read for leaders struggling to adapt their management practices to the values of the digital and social age. Brimming with Whitehurst’s personal stories and candid advice for leading an open organization, as well as with instructive examples from employees and managers at Red Hat and companies such as Google, The Body Shop, and Whole Foods, this book provides the blueprint for reinventing your organization.
Aspiring digital businesses need overall IT agility, not just development team agility. In Agile IT Organization Design , IT management consultant and ThoughtWorks veteran Sriram Narayan shows how to infuse agility throughout your organization. Drawing on more than fifteen years’ experience working with enterprise clients in IT-intensive industries, he introduces an agile approach to “Business–IT Effectiveness” that is as practical as it is valuable.
The author shows how structural, political, operational, and cultural facets of organization design influence overall IT agility—and how you can promote better collaboration across diverse functions, from sales and marketing to product development, and engineering to IT operations. Through real examples, he helps you evaluate and improve organization designs that enhance autonomy, mastery, and purpose: the key ingredients for a highly motivated workforce.
You’ll find “close range” coverage of team design, accountability, alignment, project finance, tooling, metrics, organizational norms, communication, and culture. For each, you’ll gain a deeper understanding of where your organization stands, and clear direction for making improvements. Ready to optimize the performance of your IT organization or digital business? Here are practical solutions for the long term, and for right now.Govern for value over predictability Organize for responsiveness, not lowest cost Clarify accountability for outcomes and for decisions along the way Strengthen the alignment of autonomous teams Move beyond project teams to capability teams Break down tool-induced silos Choose financial practices that are free of harmful side effects Create and retain great teams despite today’s “talent crunch” Reform metrics to promote (not prevent) agility Evolve culture through improvements to structure, practices, and leadership—and careful, deliberate interventions
This landmark work, the first to introduce business leaders to analytics, reveals how analytics are rewriting the rules of competition.
Updated with fresh content, Competing on Analytics provides the road map for becoming an analytical competitor, showing readers how to create new strategies for their organizations based on sophisticated analytics. Introducing a five-stage model of analytical competition, Davenport and Harris describe the typical behaviors, capabilities, and challenges of each stage. They explain how to assess your company’s capabilities and guide it toward the highest level of competition. With equal emphasis on two key resources, human and technological, this book reveals how even the most highly analytical companies can up their game.
With an emphasis on predictive, prescriptive, and autonomous analytics for marketing, supply chain, finance, M&A, operations, R&D, and HR, the book contains numerous new examples from different industries and business functions, such as Disney’s vacation experience, Google’s HR, UPS’s logistics, the Chicago Cubs’ training methods, and Firewire Surfboards’ customization. Additional new topics and research include:Data scientists and what they doBig data and the changes it has wroughtHadoop and other open-source software for managing and analyzing dataData products—new products and services based on data and analyticsMachine learning and other AI technologiesThe Internet of Things and its implicationsNew computing architectures, including cloud computingEmbedding analytics within operational systemsVisual analytics
The business classic that turned a generation of leaders into analytical competitors, Competing on Analytics is the definitive guide for transforming your company’s fortunes in the age of analytics and big data.
Leading-edge companies like Amazon and Google are applying DevOps and Agile principles to deliver large software projects faster than anyone thought possible. But most executives don’t understand how to transform their current legacy systems and processes to scale these principles across their organizations.
Leading the Transformation is an executive guide, providing a clear framework for improving development and delivery. Instead of the traditional Agile and DevOps approaches that focus on improving the effectiveness of teams, this book targets the coordination of work across teams in large organizations—an improvement that executives are uniquely positioned to lead.
Mullins presents realistic, thorough, and up-to-date coverage of every DBA task, including creating database environments, data modeling, normalization, design, performance, data integrity, compliance, governance, security, backup/recovery, disaster planning, data and storage management, data movement/distribution, data warehousing, connectivity, metadata, tools, and more.
This edition adds new coverage of “Big Data,” database appliances, cloud computing, and NoSQL. Mullins includes an entirely new chapter on the DBA’s role in regulatory compliance, with substantial new material on data breaches, auditing, encryption, retention, and metadata management. You’ll also find an all-new glossary, plus up-to-the-minute DBA rules of thumb.
Becoming an effective IT leader and manager presents a host of challenges—from anticipating emerging technologies, to managing relationships with senior executives, vendors, and employees, to communicating with the board. A good IT leader must also be a strong business leader.
This book—now thoroughly updated with a new preface by the authors and current tech details and terminology—invites you to accompany new CIO Jim Barton as he steps up to leadership at his company. You’ll get a deeper understanding of the role of IT in your own organization as you see Jim struggle through a tough first year, handling (and fumbling) all kinds of management challenges. Although fictional, the scenarios are based on the authors’ long experience working with real-life companies across industries and sectors.
The Adventures of an IT Leader is both an insightful story and an instructive guidebook. You can read it from beginning to end or treat it as a series of cases, skipping around to different chapters that address your most pressing needs. (For example, if you need to learn about crisis management and security, read chapters 10–12.) You can also test yourself and think about how to use the book’s lessons in your own company by reading the authors’ “Reflection” questions at the end of each chapter.
This book is your indispensable manual for IT management and leadership, no matter what business you’re in.
Drawing from their work with more than thirty knowledge-rich firms, Davenport and Prusak--experienced consultants with a track record of success--examine how all types of companies can effectively understand, analyze, measure, and manage their intellectual assets, turning corporate wisdom into market value. They categorize knowledge work into four sequential activities--accessing, generating, embedding, and transferring--and look at the key skills, techniques, and processes of each. While they present a practical approach to cataloging and storing knowledge so that employees can easily leverage it throughout the firm, the authors caution readers on the limits of communications and information technology in managing intellectual capital.
The book contains 12 units and 45 chapters. Written by leading security educators, trainers and consultants, it has served as the authoritative text for both students and professionals worldwide. This new edition adds critical updates and fresh pedagogy, as well as new diagrams, illustrations, and self assessments. Information included is designed to reflect the latest trends in the industry and to support and reinforce continued professional development. The book concludes with an Emerging Trends feature, laying the groundwork for the future growth of this increasingly vital profession.
This will be an ideal reference for security students and CPO candidates.Information included is designed to reflect the latest trends in the industry and to support and reinforce continued professional development.Concludes chapters with an Emerging Trends feature, laying the groundwork for the future growth of this increasingly vital profession.Written by a cross-disciplinary contributor team consisting of top experts in their respective fields.
all the music, film and text ever produced will be available on-demand in our own homesyour "bodynet" will let you make phone calls, check email and pay bills as you walk down the streetadvances in telecommunication will radically alter the role of face-to-face contact in our livesglobal disparities in infrastructure will widen the gap between rich and poorsurgical mini-robots and online care will change the practice of medicine as we know it.
Detailed, accessible and visionary, What Will Be is essential for Information Age revolutionaries and technological neophytes alike.
Coal, iron ore, and oil were the key productive assets that fueled the Industrial Revolution. The vital raw material of today's information economy is data.
In Data-ism, New York Times reporter Steve Lohr explains how big-data technology is ushering in a revolution in proportions that promise to be the basis of the next wave of efficiency and innovation across the economy. But more is at work here than technology. Big data is also the vehicle for a point of view, or philosophy, about how decisions will be—and perhaps should be—made in the future. Lohr investigates the benefits of data while also examining its dark side.
Data-ism is about this next phase, in which vast Internet-scale data sets are used for discovery and prediction in virtually every field. It shows how this new revolution will change decision making—by relying more on data and analysis, and less on intuition and experience—and transform the nature of leadership and management. Focusing on young entrepreneurs at the forefront of data science as well as on giant companies such as IBM that are making big bets on data science for the future of their businesses, Data-ism is a field guide to what is ahead, explaining how individuals and institutions will need to exploit, protect, and manage data to stay competitive in the coming years. With rich examples of how the rise of big data is affecting everyday life, Data-ism also raises provocative questions about policy and practice that have wide implications for everyone.
The age of data-ism is here. But are we ready to handle its consequences, good and bad?
This instructional manual focuses on pin tumbler locks, the construction and function of which are illustrated with the aid of several diagrams. Everything from straightforward lock picking to quick-entry techniques like shimming, bumping, and bypassing are explained and shown. Guides and exercises demonstrate the use of basic lock-picking tools in order to manipulate and open these locks. The text also describes the most common "alternative" designs of pin tumbler locks and summarizes the tools and techniques that can be effective against them. It comes with a DVD filled with indispensable lock picking videos and color photos.
This book is an ideal reference for penetration testers, security consultants, and IT security professionals as well as hackers.Detailed photos make learning as easy as picking a lockDVD is filled with indispensible lock picking videos and color photosExtensive appendix details tools and toolkits currently available for all your lock picking needs
What You’ll LearnInstall SharePoint Server 2016, both using the user interface provided by Microsoft, and by using PowerShell
Understand your authentication options and associated security considerations
Deploy add-ins, either from the store, or from your own custom app catalog
Configure Search Service Application using either the provided UI or PowerShell
Configure business intelligence components such as Excel Services, SQL Server Reporting Services, and PowerPivot
Migrate to SharePoint Server 2016 from either SharePoint Server 2010 or 2013Understand approaches to high availability, disaster recovery, patching, and ways to monitor and maintain your SharePoint 2016 deployment once it’s up and running
Who This Book Is For
Anyone tasked with installing, configuring, and maintaining SharePoint Server 2016 in their organization. This book assumes some working knowledge of a previous release of SharePoint Server, such as SharePoint 2010 or SharePoint 2013
Effective Security Management, Sixth Editionteaches practicing security professionals how to build their careers by mastering the fundamentals of good management.
The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers.
The sixth edition of this classic professional reference work on the topic includes newly updated and expanded coverage of topics such as the integration of security executive into the business, background checks and hiring procedures, involvement in labor disputes, organized crime, and the role of social media.Offers the most current picture of the role and duties of security managersIncludes three new chapters on security ethics and conflicts of interest, convergence in security management, and ISO security standards, along with coverage of new security jobs titles and dutiesContains updated contributions from leading security experts Colin Braziel, Karim Vellani, and James BroderCase studies and examples from around the world are included to facilitate further understanding
In the current business climate where a tremendous amount of importance is being given to governance, risk, and compliance (GRC), the concept of IT governance is becoming an increasingly strong component. Executive's Guide to IT Governance explains IT governance, why it is important to general, financial, and IT managers, along with tips for creating a strong governance, risk, and compliance IT systems process.Written by Robert Moeller, an authority in auditing and IT governance Practical, no-nonsense framework for identifying, planning, delivering, and supporting IT services to your business Helps you identify current strengths and weaknesses of your enterprise IT governance processes Explores how to introduce effective IT governance principles with other enterprise GRC initiatives Other titles by Robert Moeller: IT Audit, Control, and Security and Brink's Modern Internal Auditing: A Common Body of Knowledge
There is strong pressure on corporations to have a good understanding of their IT systems and the controls that need to be in place to avoid such things as fraud and security violations. Executive's Guide to IT Governance gives you the tools you need to improve systems processes through IT service management, COBIT, and ITIL.
The future was a place where technology was supposed to empower individuals and obliterate social organizations. Pundits predicted that information technology would spell the end of almost everything—from mass media to bureaucracies, universities, politics, and governments. Clearly, we are not living in that future. The Social Life of Information explains why.
John Seely Brown and Paul Duguid show us how to look beyond mere information to the social context that creates and gives meaning to it. Arguing elegantly for the important role that human sociability plays, even—perhaps especially—in the digital world, The Social Life of Information gives us an optimistic look beyond the simplicities of information and individuals. It shows how a better understanding of the contribution that communities, organizations, and institutions make to learning, working, and innovating can lead to the richest possible use of technology in our work and everyday lives.With a new introduction by David Weinberger and reflections by the authors on developments since the book’s first publication, this new edition is essential reading for anyone seeking to understand the human place in a digital world.
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book.
ANTICIPATE AND SHAPE TECHNOLOGICAL DISRUPTION...INSTEAD OF BEING VICTIMIZED BY ITGain powerful insights for crafting strategy in technology-rich industries, from IT to finance, and healthcare to energy Understand the massive social impacts of technology, and how today’s societal divisions shape your opportunities to innovate For everyone who must manage new technologies and respond to technological disruption
From biotech to nanotech to big data, the pace of technological disruption continues to accelerate. Now, leading business strategy expert Alfred Marcus offers powerful tools for anticipating technological change, and managing the threats and opportunities it poses.
Marcus illuminates the ongoing interplay between technological change and wider societal trends, helping you recognize new opportunities created by these interactions, and maximize the upside–both for your company and the broader society.
Whether you’re an executive or strategist, technical professional or MBA student, this guide will sharpen your focus on the future so you can navigate radical technological-driven change–wherever it leads.
Emerging technologies offer immense promise for generating growth, profitability, and prosperity. But they face major obstacles to commercialization, and have environmental and social costs that must be carefully managed to maximize the benefit and mitigate the harm.
This book is about the foresight and strategic actions required for these new technologies to play a positive rather than negative role. Alfred Marcus illuminates their potential, reviews the risky decisions needed to transform potential into reality, and discusses how technologies might be used to ameliorate social problems rather than exacerbate them.
Whether you’re an executive, manager, or student, you’ll gain powerful insights into innovation, strategy, execution, technology management, and the fastchanging business environment in which technological change takes place.
In Data Driven, Thomas Redman, the "Data Doc," shows how to leverage and deploy data to sharpen your company's competitive edge and enhance its profitability. The author reveals:
· The special properties that make data such a powerful asset
· The hidden costs of flawed, outdated, or otherwise poor-quality data
· How to improve data quality for competitive advantage
· Strategies for exploiting your data to make better business decisions
· The many ways to bring data to market
· Ideas for dealing with political struggles over data and concerns about privacy rights
Your company's data is a key business asset, and you need to manage it aggressively and professionally. Whether you're a top executive, an aspiring leader, or a product-line manager, this eye-opening book provides the tools and thinking you need to do that.
This book contains important coverage of environmental design, security surveys, locks, lighting, and CCTV, the latest ISO standards for risk assessment and risk management, physical security planning, network systems infrastructure, and environmental design.Provides detailed coverage of physical security in an easily accessible formatPresents information that should be required reading for ASIS International’s Physical Security Professional (PSP) certificationIncorporates expert contributors in the field of physical security, while maintaining a consistent flow and styleServes the needs of multiple audiences, as both a textbook and professional desk referenceBlends theory and practice, with a specific focus on today’s global business and societal environment, and the associated security, safety, and asset protection challengesIncludes useful information on the various and many aids appearing in the bookFeatures terminology, references, websites, appendices to chapters, and checklists
"Having taught health care law for years, Pozgar is rightfully considered among the finest authors within this ever changing discipline, by both professors and students. The 3rd Edition continues his tradition of presenting lucid comprehensible material in a manner which enhances learning of legal and ethical topics. I commend his works unreservedly."
~ Arthur Reynolds, MA, MHA, JD, Professor, Health Care Management, University of Maryland University College Graduate School
Legal and Ethical Issues for Health Professionals, Third Edition is a concise and practical guide to legal and ethical dilemmas facing healthcare professionals in the real-world today. Thoroughly updated and featuring new case studies, this dynamic text will help students to better understand the issues they will face on the job and the implications in the legal arena. With contemporary topics, real-world examples, and accessible language, this comprehensive text offers students an applied perspective and the opportunity to develop critical thinking skills. Legal and Ethical Issues for Health Professionals provides an effective transition from the classroom to the reality of a clinical environment.
Each new textbook includes an online access code for a Companion Website with helpful student resources. Access to the Companion Website may be purchased separately.
This title is also available as an ebook on VitalSource.
Student Companion Website Includes:
Forthcoming Instructor Resources
Instructor's Manual, including a Sample Syllabus
Formatted Test Bank
Download Transition Guide now
View Chapter Objectives
NEW TO THE THIRD EDITION
Content and Data Updated and Revised Throughout
Numerous New: Quotes, Newspaper Articles, People Stories, Reality Checks, and Legal Case Studies
Chapter 1 - New: Expanded discussion of Ethics, Virtues and Values
Chapter 7 - New Topics:
Patient Protection and Affordable Care Act
Democracy for the Wealthy: Fairness and Justice Illusive
Ethics in Public Service
CMS Non-Payment For Performance of Wrong Procedures
Chapter 8 - New Topic: Accreditation of Hospitals and Conflicts of Interest
Chapter 9 - New Additions:
New Section: Social Workers
New Abstract: Incidence and Recognition of Malnutrition in Hospital
Chapter 15 - An Entirely New Summary Case chapter, which offers a realistic and comprehensive synthesis and application of the text's principles
New Appendix on utilizing Internet Resources and finding up-to-date information
The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues. It includes a step-by-step analysis of the development of a reliable, one-shot, remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel. Finally, Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold.Covers a range of operating system families — UNIX derivatives, Mac OS X, WindowsDetails common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditionsDelivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks
This book will show you how to develop and maintain current business contingency and disaster recovery plans to ensure your enterprises are able to sustain loss are able to recover, and protect your assets, be it your business, your information, or yourself, from threats.Offers powerful techniques for weighing and managing the risks that face your organizationGives insights into universal principles that can be adapted to specific situations and threatsCovers topics needed by homeland security professionals as well as IT and physical security managers
To gain the full benefits of technology—and avoid the staggering costs of technology failure—you must manage IT with vision, direction, and expertise. Only one set of methods is robust enough to do this: IT Service Management (ITSM). In Service Intelligence, ITSM pioneer Sharon Taylor shows business managers how to make the most of it. You’ll learn how to ensure service quality, anticipate vulnerabilities, improve reliability, and link IT directly to business performance. Taylor explains ITSM from a true business point of view, cutting through jargon and helping you drive value without becoming overly technical. She gives you powerful tools for negotiating IT services more effectively, improving IT ROI, and escaping “captivity” to either internal or external IT providers.
• Recognizing what excellent IT service looks like and assessing what you’re getting now
• Selecting the best IT service providers and services for your needs
• Spotting and rectifying trouble with internal or external supplier relationships
• Making sure you don’t pay for services you don’t need
• Negotiating services, requirements, levels, price, quality, and delivery
• Leveraging ITSM practices without losing focus on the business
• Creating business-focused service reports and scorecards that focus on what matters most
This update examines the impact of many recent large-scale and catastrophic disaster events on countries and communities, as well as their influence on disaster risk reduction efforts worldwide. It also expands coverage of small-island developing states (SIDS) and explores the achievements of the United Nations Hyogo Framework for Action (2005–2015) and the priorities for action in the Post-2015 Framework for Disaster Risk Reduction currently under development. This useful, relevant text includes many changes that have occurred since the last edition for a better understanding of the rapidly advancing field of international disaster management.Includes updated perspectives on recent events that have shaped the direction emergency management is taking todayExamines outcomes of the Hyogo Framework for Action (HFA) decade, such as insight into how disaster risk reduction has advanced globally, and how it differs among countries and regionsUpdated statistics on disaster frequency and impact provide a better understanding about how and why risk and vulnerability are changingPresents information on multilateral emergency management agreements as well as profiles of important NGOs and international organizationsKey terms and summaries are provided at the beginning of each chapter to ease student comprehensionOffers customized and updated instructor materials, including PowerPoint lecture slides, test banks, and a detailed instructor's guide
"Uniting the Virtual Workforce offers much-needed guidance on how to navigate the largely unmapped territory of virtual work environments in the global economy. The authors do an outstanding job of presenting how organizations should address the challenges of virtual workforces so as to reap the huge potential benefits of increased growth, productivity, and innovation."
-C. Warren Axelrod, PhD, Chief Privacy Officer and Business Information Security Officer, U.S. Trust, and author of Outsourcing Information Security
"Lojeski and Reilly bring us something that readers of business books so rarely get-no nonsense practical guidance on how to manage distance, especially where it most often serves as an impediment to working effectively.Ê If you interface with widely dispersed team members who rarely see one another and communicate by virtue of impersonal electronics, you may expect to find this book provocative, counterintuitive, and above all, exciting. It gives all of us who have to struggle, while working with talent stretched across distance, hope, that maybe there are ways to do this right!"
-Patrick J. McKenna, author of First Among EqualsÊ
"A must-read for global corporate executives who manage geographically dispersed job sharing teams. Practical strategies for preventing productivity loss and optimizing innovation. The authors pull no punches in showing the real downsides to the virtual work phenomenon; they have done a great service for us all."
-Jeff Saperstein, author of Creating Regional Wealth in the Innovation Economy
"Uniting the Virtual Workforce charts the course for competing in the twenty-first century by tapping into the powers of virtual work. Any manager who ignores the virtual workforce is underperforming, and any company or organization that does not appreciate virtual work is already at a competitive disadvantage. Karen and Dick have tapped into a key ingredient in the recipe for global growth."
-Jerry MacArthur Hultin, President, Polytechnic University, and former Under Secretary of the Navy
"Authors Sobel Lojeski and Reilly have provided a useful primer for the harried executive striving for productivity improvements while seeing the workload expand and the workforce disperse. Using conceptual definitions of Physical, Operational, and Affinity Distance to describe the multifaceted dimensions of building teams of people to work effectively together, the authors construct a very powerful set of metrics for a manager to improve the capability of his or her workgroup, no matter where it resides or how it is composed. The book is rich in anecdotes and specific studies that illustrate the concepts in an engaging, pertinent, and easy-to-understand manner. In an age of outsourcing, offshoring, and decentralizing groups of people who have to get things done together, reading this small book will repay itself many times over."
-Charles House, Director, Media X Lab at Stanford University, and former Director of the Societal Impact of Technology, Intel Corporation
Information Governance (IG) is a rapidly emerging "super discipline" and is now being applied to electronic document and records management, email, social media, cloud computing, mobile computing, and, in fact, the management and output of information organization-wide. IG leverages information technologies to enforce policies, procedures and controls to manage information risk in compliance with legal and litigation demands, external regulatory requirements, and internal governance objectives. Information Governance: Concepts, Strategies, and Best Practices reveals how, and why, to utilize IG and leverage information technologies to control, monitor, and enforce information access and security policies.Written by one of the most recognized and published experts on information governance, including specialization in e-document security and electronic records management Provides big picture guidance on the imperative for information governance and best practice guidance on electronic document and records management Crucial advice and insights for compliance and risk managers, operations managers, corporate counsel, corporate records managers, legal administrators, information technology managers, archivists, knowledge managers, and information governance professionals IG sets the policies that control and manage the use of organizational information, including social media, mobile computing, cloud computing, email, instant messaging, and the use of e-documents and records. This extends to e-discovery planning and preparation. Information Governance: Concepts, Strategies, and Best Practices provides step-by-step guidance for developing information governance strategies and practices to manage risk in the use of electronic business documents and records.
Tomorrow’s winning “Intelligent Enterprises” will bring together far more diverse sources of data, analyze it in more powerful ways, and deliver immediate insight to decision-makers throughout the organization. Today, however, most companies fail to apply the information they already have, while struggling with the complexity and costs of their existing information environments.
In this book, a team of IBM’s leading information management experts guide you on a journey that will take you from where you are today toward becoming an “Intelligent Enterprise.”
Drawing on their extensive experience working with enterprise clients, the authors present a new, information-centric approach to architecture and powerful new models that will benefit any organization. Using these strategies and models, companies can systematically unlock the business value of information by delivering actionable, real-time information in context to enable better decision-making throughout the enterprise–from the “shop floor” to the “top floor.”
Coverage IncludesHighlighting the importance of Dynamic Warehousing Defining your Enterprise Information Architecture from conceptual, logical, component, and operational views Using information architecture principles to integrate and rationalize your IT investments, from Cloud Computing to Information Service Lifecycle Management Applying enterprise Master Data Management (MDM) to bolster business functions, ranging from compliance and risk management to marketing and product management Implementing more effective business intelligence and business performance optimization, governance, and security systems and processes Understanding “Information as a Service” and “Info 2.0,” the information delivery side of Web 2.0
These challenges call for new levels of IT savvy: the ability of all managers-IT or non-IT-to transform their company's technology assets into operational efficiencies that boost margins. Companies with IT-savvy managers are 20 percent more profitable than their competitors.
In IT Savvy, Peter Weill and Jeanne Ross-two of the world's foremost authorities on using IT in business-explain how non-IT executives can acquire this savvy. Concise and practical, the book describes the practices, competencies, and leadership skills non-IT managers need to succeed in the digital economy. You'll discover how to:
-Define your firm's operating model-how IT can help you do business
-Revamp your IT funding model to support your operating model
-Build a digitized platform of business processes, IT systems, and data to execute on the model
-Determine IT decision rights
-Extract more business value from your IT assets
Packed with examples and based on research into eighteen hundred organizations in more than sixty countries, IT Savvy is required reading for non-IT managers seeking to push their company's performance to new heights.
Drawing on his cutting-edge work at MIT and Harvard, Waber addresses crucial issues ranging from technology to privacy, revealing what will be possible in a few years, and what you can achieve right now. In bringing the power of analytics to organizational development, he offers immense new opportunities to everyone with responsibility for workplace performance.
When “metadata” became breaking news, appearing in stories about surveillance by the National Security Agency, many members of the public encountered this once-obscure term from information science for the first time. Should people be reassured that the NSA was “only” collecting metadata about phone calls—information about the caller, the recipient, the time, the duration, the location—and not recordings of the conversations themselves? Or does phone call metadata reveal more than it seems? In this book, Jeffrey Pomerantz offers an accessible and concise introduction to metadata.
In the era of ubiquitous computing, metadata has become infrastructural, like the electrical grid or the highway system. We interact with it or generate it every day. It is not, Pomerantz tell us, just “data about data.” It is a means by which the complexity of an object is represented in a simpler form. For example, the title, the author, and the cover art are metadata about a book. When metadata does its job well, it fades into the background; everyone (except perhaps the NSA) takes it for granted.
Pomerantz explains what metadata is, and why it exists. He distinguishes among different types of metadata—descriptive, administrative, structural, preservation, and use—and examines different users and uses of each type. He discusses the technologies that make modern metadata possible, and he speculates about metadata's future. By the end of the book, readers will see metadata everywhere. Because, Pomerantz warns us, it's metadata's world, and we are just living in it.
Beginning with theories, concepts and models, the book moves on to consider rigorous methods of practice and self-observation in a relationship of mutual trust, respect and freedom of expression. It will probe you to rethink how you relate to your clients and your staff, how you produce long-term excellent performance in yourself and how you can become more effective in helping others to achieve their goals
This third edition includes a new chapter on communication and a new central case study that runs throughout the book to illustrate the impact of the themes and concepts discussed in the book.
Coaching, 3rd edition is a rich learning resource guide for new and experienced coaches who want to challenge their methods of partnering with clients. It is also an inspiring guide for training managers and leaders, human resource development managers and general managers who want to develop their teams.
Globally recognized and on the ASIS International Certified Protection Professional reading list, the sixth edition of Security and Loss Prevention enhances its position in the market as a comprehensive, interdisciplinary, and up-to-date treatment of the area, connecting the public and private sector and the worlds of physical security and technological security. Purpura once again demonstrates why students and professionals alike rely on this best-selling text as a timely, reliable resource encompassing the breadth and depth of considerations involved when implementing general loss prevention concepts and security programs within an organization.New focus on recent technologies like social networks, digital evidence warrants, and advances in CCTV, and how those apply to security and loss prevention. Incorporates changes in laws, presents various strategies of asset protection, and covers the ever-evolving technology of security and loss prevention.Utilizes end-of-chapter case problems that take the chapters’ content and relate it to real security situations and issues, offering various perspectives on contemporary security challenges.Includes student study questions and an accompanying Instructor’s manual with lecture slides, lesson plans, and an instructor test bank for each chapter.
This edition has been updated to reflect the changing landscape of tools and tactics which have emerged in recent years. It consists of 6 chapters that discuss topics such as the fundamentals of pin tumbler and wafer locks; the basics of picking, with emphasis on how to exploit weaknesses; tips for beginners on how to get very good and very fast in picking locks; advanced training; quick-entry tricks about shimming, bumping, and bypassing; and pin tumblers in other configurations.
This book is geared specifically toward penetration testers, security consultants, IT security professionals, and hackers.Detailed full-color photos make learning as easy as picking a lockExtensive appendix details tools and toolkits currently available for all your lock picking needs
— Sue Miller-Sylvia, IBM Fellow and Vice President, Application Innovation Services, IBM Global Business Services
Make the Right Cloud Adoption and Deployment Decisions for Your Business
This is the first complete guide to cloud decision making for senior executives in both technology and non-technology roles. IBM® Global Business Services® Executive Architect Pamela K. Isom and IBM Fellow Kerrie Holley present practical business cases, vignettes, and techniques to help you understand when cloud investments make sense and when they don’t. You’ll find decision models that are anchored with practical experiences and lessons to guide your decision making, best practices for leveraging investments you’ve already made, and expert assistance with every aspect of the cloud transition.
Drawing on their extensive experience working with enterprise clients, Isom and Holley show how to integrate both business and technical considerations, set the right priorities, and successfully manage everything from security and performance to governance. Whatever your company’s size, industry, or challenges, this book will help you drive maximum business value from the cloud—on your terms and on your timeline.
Assessing the business value of a cloud adoption strategy based on 10 specific expectations Gaining more value by incorporating cloud into enterprise architecture Implementing cloud when you don’t already have an enterprise architecture Fully understanding the financial implications of cloud-based strategies and technologies Incorporating cloud in environments that have already adopted Service Oriented Architecture (SOA) Selecting components of your cloud portfolio, including elements of larger outsourced or managed solutions Governing cloud as part of your overall organizational landscape Systematically recognizing and mitigating cloud adoption risks, including security, cost, and performance Planning the transition: retiring legacy applications, transforming business processes, and selecting partners Anticipating and guiding the use of cloud business patterns, trends, and technologies
The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints; eavesdropping and modification attacks; control channel attacks; attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection; attacks on identity; and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability.
This book will be of interest to information security professionals of all levels as well as recreational hackers.Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globallyDiscover the best ways to defend against these vicious attacks; step-by-step instruction shows you howInstitute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
The book consists of seven chapters that cover the seven deadliest attacks against Microsoft software and networks: attacks against Windows passwords; escalation attacks; stored procedure attacks; mail service attacks; client-side ActiveX and macro attacks; Web service attacks; and multi-tier attacks. Each chapter provides an overview of a single Microsoft software product, how it is used, and some of the core functionality behind the software. Furthermore, each chapter explores the anatomy of attacks against the software, the dangers of an attack, and possible defenses to help prevent the attacks described in the scenarios.
This book will be a valuable resource for those responsible for oversight of network security for either small or large organizations. It will also benefit those interested in learning the details behind attacks against Microsoft infrastructure, products, and services; and how to defend against them. Network administrators and integrators will find value in learning how attacks can be executed, and transfer knowledge gained from this book into improving existing deployment and integration practices.Windows Operating System-Password AttacksActive Directory-Escalation of PrivilegeSQL Server-Stored Procedure AttacksExchange Server-Mail Service AttacksOffice-Macros and ActiveXInternet Information Serives(IIS)-Web Serive AttacksSharePoint-Multi-tier Attacks
This book will help you to break free from the so-called best practices argument by articulating risk exposures in business terms. It includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. It explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. It also presents a roadmap for designing and implementing a security risk management program.
This book will be a valuable resource for CISOs, security managers, IT managers, security consultants, IT auditors, security analysts, and students enrolled in information security/assurance college programs.Named a 2011 Best Governance and ISMS Book by InfoSec Reviews Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investmentExplores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate riskPresents a roadmap for designing and implementing a security risk management program
Early works on business analysis suggest that use of specific diagrams, possessing a technical background or being a strong facilitator is what makes a successful business analyst. Seven Steps to Mastering Business Analysisadvances the field by illustrating how all of these factors combined, along with many others, are the key to success. This book gives insight into the ideal skills and characteristics of successful business analysts and provides a foundation of learning for effecting business analysis work. This guide will also help prepare you for business analysis certification by explaining the tasks and knowledge areas in the Business Analysis Body of Knowledge (BABOK™).
Seven Steps to Mastering Business Analysis will help build the skill sets of new and experienced analysts, and those currently doing analysis work including project managers, system analysts, product managers and business development professionals. Human resource professionals who are working to establish business analysis job descriptions and career paths in their organizations and executives who may have responsibility for managing and evaluating the success of business analysts will also find this book useful.
From cyberwarfare, to devastating tornadoes, to car bombs, all hazards currently fall within the purview of the Department of Homeland Security, yet the federal role must be closely aligned with the work of partners in the private sector.
The book lays a solid foundation for the study of present and future threats to our communities and to national security, also challenging readers to imagine more effective ways to manage these risks.Highlights and expands on key content from the bestselling book Introduction to Homeland SecurityConcisely delineates the bedrock principles of preparing for, mitigating, managing, and recovering from emergencies and disastersProvides coverage of the Boston Marathon bombingExplains the border security, immigration, and intelligence functions in detailAnalyzes the NIST Cybersecurity Framework for critical infrastructure protectionExplores the emergence of social media as a tool for reporting on homeland security issues
To really address the data concerns of today's enterprise, they wanted to find a way to help enterprises achieve the success they seek. Not as a prescriptive process—but a methodology to become agile and leverage data and analytics to drive a competitive advantage.
You know, it's amazing what can happen when two people with very different perspectives get together to solve a big problem. This evolutionary guide resulted from the a-ha moment between these two influencers at the top of their fields—one, an academic researcher and consultant, and the other, a longtime analytics practitioner and chief product officer at Teradata. Together, they created a powerful framework every type of business can use to connect analytic power, business practices, and human dynamics in ways that can transform what is currently possible.
Remember how fast smart phones evolved and these days if you do not have one you feel you arer missing out?
Blockchain technology which fuels cryptocurrency is a revolution at the same level as smart phones once was!
Did you know that a $100 investment in a cryptocurrency could have made you over $400,000?
This book Blockchain: is an in-depth guide on blockchain technology and cryptocurrency (including bitcoin). You will be amazed what is uncovered in this book!
Discover all thеrе іѕ to knоw аbоut the Blосkсhаіn revolution! Lіkе many, аѕ Bitcoin rоѕе tо рrоmіnеnсе, I decided tо stay оn thе ѕіdеlіnеѕ. Wіthіn a short tіmе, this оnе сrурtосurrеnсу сlіmbеd in vаluе tо new highs each аnd еvеrу mоnth. I wоuld look at hоw much a ѕіnglе Bitcoin wаѕ trаdіng fоr аnd think tо myself: "I wіѕh I had іnvеѕtеd еаrlіеr." Twо уеаrѕ ago, I dіd ѕоmе rеѕеаrсh аnd concluded thаt there іѕ still money tо be mаdе. Tоdау аnd іn thе уеаr 2017, I'm рrоud tо ѕау thаt thеrе іѕ ѕtіll a lоt оf рrоfіt left on thе tаblе fоr those that wіѕh tо еntеr thе dіgіtаl есоnоmу. Thе intention of this bооk is tо give уоu a ѕummаrу on thе world of сrурtосurrеnсіеѕ аnd tо provide уоu with аll of thе basic іnfоrmаtіоn thаt уоu nееd to gеt invested аnd bе able tо рrоvіdе a better есоnоmіс futurе fоr you аnd уоur fаmіlу. Wе are thе рrесірісе of a rеvоlutіоn in thе wау thе wоrld trеаtѕ thе mоnеtаrу policy as a whole. There will bе rаріd сhаngеѕ іn thе соmіng уеаrѕ, and you will want tо bе аn early аdорtеr оf what іѕ sure to bе a grеаt ѕоurсе of іnсоmе for thе few that dесіdе to learn аbоut thе dіgіtаl есоnоmу аnd gеt a head ѕtаrt. Continue rеаdіng аnd you will dіѕсоvеr thе ѕесrеt undеrgrоund есоnоmу аrіѕіng іn the fоrm оf сrурtосurrеnсіеѕ. Thе tесhnоlоgу mіght seem complicated; іt mіght appear оut оf уоur area of expertise, but thе truth іѕ thаt this nісhе market іѕ nоt thаt difficult tо undеrѕtаnd, аnd with mу explanations уоu wіll hаvе a сlеаr рісturе оf hоw the digital economy works tоdау, hоw to рrоfіt frоm іt, and whеrе іt is gоіng іn thе future.
In Thіѕ Bооk Yоu Wіll Fіnd: An explanation оf Blосkсhаіn tесhnоlоgу, dеѕіgnеd fоr bеgіnnеrѕ аnd wrіttеn by аn еxреrt Tірѕ and strategies to earn rеаl іnсоmе thrоugh Blockchain bасkеd сurrеnсіеѕ A guіdе dеѕіgnеd аrоund thе соnсерt оf teaching оthеrѕ hоw tо rеаlіzе profits frоm cryptocurrencies A lіѕt оf thе bеѕt сurrеnсіеѕ to іnvеѕt in, wіth advice about where to ѕtаrt аnd hоw tо mаkе thе grеаtеѕt роѕѕіblе рrоfіt A detailed explanation of hоw tо сrеаtе a mіnіng rіg, аlоng with everything you nееd tо know аbоut the hardware аnd components, іnсludіng thе аѕѕосіаtеd costs.
Analytics is not just a technology: It is a better way to do business. Using analytics, you can systematically inform human judgment with data-driven insight. This doesn’t just improve decision-making: It also enables greater innovation and creativity in support of strategy. Your transformation won’t happen overnight; however, it is absolutely achievable, and the rewards are immense.
This book demystifies your analytics journey by showing you how IBM has successfully leveraged analytics across the enterprise, worldwide. Three of IBM’s pioneering analytics practitioners share invaluable real-world perspectives on what does and doesn’t work and how you can start or accelerate your own transformation. This book provides an essential framework for becoming a smarter enterprise and shows through 31 case studies how IBM has derived value from analytics throughout its business.
Creating a smarter workforce through big data and analytics More effectively optimizing supply chain processes Systematically improving financial forecasting Managing financial risk, increasing operational efficiency, and creating business value Reaching more B2B or B2C customers and deepening their engagement Optimizing manufacturing and product management processes Deploying your sales organization to increase revenue and effectiveness Achieving new levels of excellence in services delivery and reducing risk Transforming IT to enable wider use of analytics “Measuring the immeasurable” and filling gaps in imperfect data
Whatever your industry or role, whether a current or future leader, analytics can make you smarter and more competitive. Analytics Across the Enterprise shows how IBM did it--and how you can, too.
Learn more about IBM Analytics