Which paint color is most likely to tell you that a used car is in good shape? How can officials identify the most dangerous New York City manholes before they explode? And how did Google searches predict the spread of the H1N1 flu outbreak?
The key to answering these questions, and many more, is big data. “Big data” refers to our burgeoning ability to crunch vast collections of information, analyze it instantly, and draw sometimes profoundly surprising conclusions from it. This emerging science can translate myriad phenomena—from the price of airline tickets to the text of millions of books—into searchable form, and uses our increasing computing power to unearth epiphanies that we never could have seen before. A revolution on par with the Internet or perhaps even the printing press, big data will change the way we think about business, health, politics, education, and innovation in the years to come. It also poses fresh threats, from the inevitable end of privacy as we know it to the prospect of being penalized for things we haven’t even done yet, based on big data’s ability to predict our future behavior.
In this brilliantly clear, often surprising work, two leading experts explain what big data is, how it will change our lives, and what we can do to protect ourselves from its hazards. Big Data is the first big book about the next big thing.
This instructional manual focuses on pin tumbler locks, the construction and function of which are illustrated with the aid of several diagrams. Everything from straightforward lock picking to quick-entry techniques like shimming, bumping, and bypassing are explained and shown. Guides and exercises demonstrate the use of basic lock-picking tools in order to manipulate and open these locks. The text also describes the most common "alternative" designs of pin tumbler locks and summarizes the tools and techniques that can be effective against them. It comes with a DVD filled with indispensable lock picking videos and color photos.
This book is an ideal reference for penetration testers, security consultants, and IT security professionals as well as hackers.Detailed photos make learning as easy as picking a lockDVD is filled with indispensible lock picking videos and color photosExtensive appendix details tools and toolkits currently available for all your lock picking needs
Mullins presents realistic, thorough, and up-to-date coverage of every DBA task, including creating database environments, data modeling, normalization, design, performance, data integrity, compliance, governance, security, backup/recovery, disaster planning, data and storage management, data movement/distribution, data warehousing, connectivity, metadata, tools, and more.
This edition adds new coverage of “Big Data,” database appliances, cloud computing, and NoSQL. Mullins includes an entirely new chapter on the DBA’s role in regulatory compliance, with substantial new material on data breaches, auditing, encryption, retention, and metadata management. You’ll also find an all-new glossary, plus up-to-the-minute DBA rules of thumb.
More than ever, the effective management of technology is critical for business competitiveness. For decades, technology leaders have struggled to balance agility, reliability, and security. The consequences of failure have never been greater―whether it's the healthcare.gov debacle, cardholder data breaches, or missing the boat with Big Data in the cloud.
And yet, high performers using DevOps principles, such as Google, Amazon, Facebook, Etsy, and Netflix, are routinely and reliably deploying code into production hundreds, or even thousands, of times per day.
Following in the footsteps of The Phoenix Project, The DevOps Handbook shows leaders how to replicate these incredible outcomes, by showing how to integrate Product Management, Development, QA, IT Operations, and Information Security to elevate your company and win in the marketplace.
Take the DORA DevOps X-ray Assessment and see where you stand! Visit devops-survey.com with your access code to take the DevOps X-ray Assessment.
Jim Whitehurst, CEO of Red Hat, one of the world’s most revolutionary companies, shows how open principles of management—based on transparency, participation, and community—reinvent the organization for the fast-paced connected era. Whitehurst gives readers an insider’s look into how an open and innovative organizational model works. He shows how to leverage it to build community, respond quickly to opportunities, harness resources and talent both inside and outside the organization, and inspire, motivate, and empower people at all levels to act with accountability.
The Open Organization is a must-read for leaders struggling to adapt their management practices to the values of the digital and social age. Brimming with Whitehurst’s personal stories and candid advice for leading an open organization, as well as with instructive examples from employees and managers at Red Hat and companies such as Google, The Body Shop, and Whole Foods, this book provides the blueprint for reinventing your organization.
The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced.
With the help of a prospective board member and his mysterious philosophy of The Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined. With the clock ticking, Bill must organize work flow, streamline interdepartmental communications, and effectively serve the other business functions at Parts Unlimited.
In a fast-paced and entertaining style, three luminaries of the DevOps movement deliver a story that anyone who works in IT will recognize. Readers will not only learn how to improve their own IT organizations, they'll never view IT the same way again.
Leading-edge companies like Amazon and Google are applying DevOps and Agile principles to deliver large software projects faster than anyone thought possible. But most executives don’t understand how to transform their current legacy systems and processes to scale these principles across their organizations.
Leading the Transformation is an executive guide, providing a clear framework for improving development and delivery. Instead of the traditional Agile and DevOps approaches that focus on improving the effectiveness of teams, this book targets the coordination of work across teams in large organizations—an improvement that executives are uniquely positioned to lead.
Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management.Comprehensive introduction to security and IT security management principlesDiscussion of both public and private sector roles, as well as the increasingly common privatizing of government functionsNew experience-based exercises to sharpen security management and strategic skills and reinforce the content of each chapter
Tomorrow’s winning “Intelligent Enterprises” will bring together far more diverse sources of data, analyze it in more powerful ways, and deliver immediate insight to decision-makers throughout the organization. Today, however, most companies fail to apply the information they already have, while struggling with the complexity and costs of their existing information environments.
In this book, a team of IBM’s leading information management experts guide you on a journey that will take you from where you are today toward becoming an “Intelligent Enterprise.”
Drawing on their extensive experience working with enterprise clients, the authors present a new, information-centric approach to architecture and powerful new models that will benefit any organization. Using these strategies and models, companies can systematically unlock the business value of information by delivering actionable, real-time information in context to enable better decision-making throughout the enterprise–from the “shop floor” to the “top floor.”
Coverage IncludesHighlighting the importance of Dynamic Warehousing Defining your Enterprise Information Architecture from conceptual, logical, component, and operational views Using information architecture principles to integrate and rationalize your IT investments, from Cloud Computing to Information Service Lifecycle Management Applying enterprise Master Data Management (MDM) to bolster business functions, ranging from compliance and risk management to marketing and product management Implementing more effective business intelligence and business performance optimization, governance, and security systems and processes Understanding “Information as a Service” and “Info 2.0,” the information delivery side of Web 2.0
The book takes you step-by-step through the analysis of case law as it applies to situations commonly faced by security practitioners. It describes the legal requirements faced by security firms and emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency. It also examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that are likely to intensify in the future. New features of this edition include: a chapter on the legal implications of private contractors operating in war zones like Afghanistan; updated coverage of statutory authority, as well as state and federal processes of oversight and licensure; and special analysis of public-private cooperative relationships in law enforcement. A historical background helps readers understand the present by seeing the full context of recent developments.
This book will appeal to: students in physical security, security management, and criminal justice programs in traditional and for-profit schools; security professionals; and those working in law enforcement.Authoritative, scholarly treatise sheds light on this increasingly important area of the lawHistorical background helps readers understand the present by seeing the full context of recent developmentsNational scope provides crucial parameters to security practitioners throughout the USNEW TO THIS EDITION! A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement
* Completely updated with coverage of all core security principles
* Course text for the Certified Protection Officer (CPO) Program
* Includes all new sections on information security, terrorism awareness, and first response during crises
Covering cloud computing from what the business leader needs toknow, this book describes how IT can nimbly ramp up revenueinitiatives, positively impact business operations and costs, andhow this allows business leaders to shed worry about technology sothey can focus on their business. It also reveals the cloud'seffect on corporate organization structures, the evolution oftraditional IT in the global economy, potential benefits and risksof cloud models and most importantly, how the IT function is beingrethought by companies today who are making room for the comingtidal wave that is cloud computing.Why IT and business thinking must change to capture the fullpotential of cloud computingTopics including emerging cloud solutions, data security,service reliability, the new role of IT and new businessorganization structuresOther titles by Hugos include: Business Agility: SustainableProsperity in a Relentlessly Competitive World andEssentials of Supply Chain Management, 2nd Edition
Practical and timely, this book reveals why it's worth everycompany's time and effort to exploit cloud computing's potentialfor their business's survival and success.
The key? Make tough decisions about which processes you must execute well, then implement the IT systems needed to digitize those processes. Citing numerous companies worldwide, the authors show how constructing the right enterprise architecture enhances profitability and time to market, improves strategy execution, and even lowers IT costs. Though clear, engaging explanation, they demonstrate how to define your operating model—your vision of how your firm will survive and grow—and implement it through your enterprise architecture. Their counterintuitive but vital message: when it comes to executing your strategy, your enterprise architecture may matter far more than your strategy itself.
From one of the world's leading figures in social media marketing, networking, and business applications comes the heavily revised and updated edition of the Likeable Social Media.
Dave Kerpen is CEO of Likeable Local and Likeable Media, which has won two WOMMY awards from the Word of Mouth Marketing Association (WOMMA) for excellence in word-of-mouth marketing.
The book contains 12 units and 45 chapters. Written by leading security educators, trainers and consultants, it has served as the authoritative text for both students and professionals worldwide. This new edition adds critical updates and fresh pedagogy, as well as new diagrams, illustrations, and self assessments. Information included is designed to reflect the latest trends in the industry and to support and reinforce continued professional development. The book concludes with an Emerging Trends feature, laying the groundwork for the future growth of this increasingly vital profession.
This will be an ideal reference for security students and CPO candidates.Information included is designed to reflect the latest trends in the industry and to support and reinforce continued professional development.Concludes chapters with an Emerging Trends feature, laying the groundwork for the future growth of this increasingly vital profession.Written by a cross-disciplinary contributor team consisting of top experts in their respective fields.
Today, number crunching affects your life in ways you might never imagine. In this lively and groundbreaking new book, economist Ian Ayres shows how today's best and brightest organizations are analyzing massive databases at lightening speed to provide greater insights into human behavior. They are the Super Crunchers. From internet sites like Google and Amazon that know your tastes better than you do, to a physician's diagnosis and your child's education, to boardrooms and government agencies, this new breed of decision makers are calling the shots. And they are delivering staggeringly accurate results. How can a football coach evaluate a player without ever seeing him play? Want to know whether the price of an airline ticket will go up or down before you buy? How can a formula outpredict wine experts in determining the best vintages? Super crunchers have the answers. In this brave new world of equation versus expertise, Ayres shows us the benefits and risks, who loses and who wins, and how super crunching can be used to help, not manipulate us.
Gone are the days of solely relying on intuition to make decisions. No businessperson, consumer, or student who wants to stay ahead of the curve should make another keystroke without reading Super Crunchers.
From the Hardcover edition.
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.
This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.
John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.
James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.
· Provides critical strategies for maintaining basic business functions when and if systems are shut down
· Establishes up to date methods and techniques for maintaining second site back up and recovery
· Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters
Using the Association of College and Research Libraries' Information Literacy Competency Standards for Higher Education as a framework, this much-needed sourcebook covers all the major facets of the information literacy process. For students, it is a ready-to-use guide that explains what information literacy is, why it is so important, and how to put it to use in both print and online research. For teachers, it is a helpful classroom resource that can serve as the basis for an information literacy course, a supplemental text, or a handy reference for research in any subject.
Archive Stories brings together ethnographies of the archival world, most of which are written by historians. Some contributors recount their own experiences. One offers a moving reflection on how the relative wealth and prestige of Western researchers can gain them entry to collections such as Uzbekistan’s newly formed Central State Archive, which severely limits the access of Uzbek researchers. Others explore the genealogies of specific archives, from one of the most influential archival institutions in the modern West, the Archives nationales in Paris, to the significant archives of the Bakunin family in Russia, which were saved largely through the efforts of one family member. Still others explore the impact of current events on the analysis of particular archives. A contributor tells of researching the 1976 Soweto riots in the politically charged atmosphere of the early 1990s, just as apartheid in South Africa was coming to an end. A number of the essays question what counts as an archive—and what counts as history—as they consider oral histories, cyberspace, fiction, and plans for streets and buildings that were never built, for histories that never materialized.
Contributors. Tony Ballantyne, Marilyn Booth, Antoinette Burton, Ann Curthoys, Peter Fritzsche, Durba Ghosh, Laura Mayhall, Jennifer S. Milligan, Kathryn J. Oberdeck, Adele Perry, Helena Pohlandt-McCormick, John Randolph, Craig Robertson, Horacio N. Roque Ramírez, Jeff Sahadeo, Reneé Sentilles
Aspiring digital businesses need overall IT agility, not just development team agility. In Agile IT Organization Design , IT management consultant and ThoughtWorks veteran Sriram Narayan shows how to infuse agility throughout your organization. Drawing on more than fifteen years’ experience working with enterprise clients in IT-intensive industries, he introduces an agile approach to “Business–IT Effectiveness” that is as practical as it is valuable.
The author shows how structural, political, operational, and cultural facets of organization design influence overall IT agility—and how you can promote better collaboration across diverse functions, from sales and marketing to product development, and engineering to IT operations. Through real examples, he helps you evaluate and improve organization designs that enhance autonomy, mastery, and purpose: the key ingredients for a highly motivated workforce.
You’ll find “close range” coverage of team design, accountability, alignment, project finance, tooling, metrics, organizational norms, communication, and culture. For each, you’ll gain a deeper understanding of where your organization stands, and clear direction for making improvements. Ready to optimize the performance of your IT organization or digital business? Here are practical solutions for the long term, and for right now.Govern for value over predictability Organize for responsiveness, not lowest cost Clarify accountability for outcomes and for decisions along the way Strengthen the alignment of autonomous teams Move beyond project teams to capability teams Break down tool-induced silos Choose financial practices that are free of harmful side effects Create and retain great teams despite today’s “talent crunch” Reform metrics to promote (not prevent) agility Evolve culture through improvements to structure, practices, and leadership—and careful, deliberate interventions
Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures.
Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald.Provides clear direction on how to meet new business demands on the security professionalGuides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the programCovers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each
"Without good data and analysis—much of it grounded in economic theory—we cannot hope to strengthen communities through the arts or to achieve any of the other goals we set for the National Endowment for the Arts, the largest nationwide funder of the arts." —from the Foreword by Rocco Landesman
Contributors: Hasan Bakhshi (Nesta UK), Elisa Barbour (University of California, Berkeley), Shiri M. Breznitz (Georgia Institute of Technology), Roland J. Kushner (Muhlenberg College), Rex LaMore (Michigan State University), James Lawton (Michigan State), Neil Lee (Nesta UK), Richard G. Maloney (Boston University), Ann Markusen (University of Minnesota), Juan Mateos-Garcia (Nesta UK), Anne Gadwa Nicodemus (Metris Arts Consulting), Douglas S. Noonan (Indiana University–Purdue University Indianapolis), Peter Pedroni (Williams College), Amber Peruski (Michigan State), Michele Root-Bernstein (Michigan State), Robert Root-Bernstein (Michigan State), Eileen Roraback (Michigan State), Michael Rushton (Indiana University), Lauren Schmitz (New School for Social Research), Jenny Schuetz (University of Southern California), John Schweitzer (Michigan State), Stephen Sheppard (Williams College), Megan VanDyke (Michigan State), Gregory H. Wassall (Northeastern University)
Specific topics covered include establishing positive relationships between students and school librarians; characteristics of students in different grade levels; techniques that librarians can use for effectively managing students in the school library; ways to relate with diverse students, including students with special needs; managing students as they utilize technology in library settings; and designing a school library environment to avoid potential discipline problems.
of setting up the field operations needed to provide adequate protection to the client, firm or individual. The Standard Operating Procedure System asks all
the questions required to survey any protection objective. In addition, the system provides all the basic information needed to answer those questions and leads to the implementation of the tactical or mission standard operating procedure. The Standard Operating Procedure System may be applied to any type of security or protection operation and may be modified, expanded or contracted, without needing to rewrite or redesign an existing security program.
Details a system to survey, implement, and maintain at full operational
effectiveness many types of assets protection programs.
Provides the basis for the vital training required by every security or physical
This book is for IT managers and company managers who need to understand how PCI DSS applies to their organizations. It is for the small- and medium-size businesses that do not have an IT department to delegate to. It is for large organizations whose PCI DSS project scope is immense. It is also for all organizations that need to grasp the concepts of PCI DSS and how to implement an effective security framework that is also compliant.Completely updated to follow the PCI DSS standard 1.2.1Packed with help to develop and implement an effective security strategy to keep infrastructure compliant and secureBoth authors have broad information security backgrounds, including extensive PCI DSS experience
The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered.
There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.
This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.
These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.
- Interdisciplinary coverage of the history Information Security
- Written by top experts in law, history, computer and information science
- First comprehensive work in Information Security
In Data Driven, Thomas Redman, the "Data Doc," shows how to leverage and deploy data to sharpen your company's competitive edge and enhance its profitability. The author reveals:
· The special properties that make data such a powerful asset
· The hidden costs of flawed, outdated, or otherwise poor-quality data
· How to improve data quality for competitive advantage
· Strategies for exploiting your data to make better business decisions
· The many ways to bring data to market
· Ideas for dealing with political struggles over data and concerns about privacy rights
Your company's data is a key business asset, and you need to manage it aggressively and professionally. Whether you're a top executive, an aspiring leader, or a product-line manager, this eye-opening book provides the tools and thinking you need to do that.
Updates include 14 new chapters, 3 completely revised chapters, "Student Performance Objectives" in each chapter, and added information on related resources (both print and online).
* Completion of the Security Supervision and Management Program is the initial step toward the Certified in Security Supervision and Management (CSSM) designation
* Over 40 experienced security professionals contribute chapters in their area of specialty
* Revised throughout, and completely updated with 14 new chapters on topics such as Leadership, Homeland Security, Strategic Planning and Management, Budget Planning, Career Planning, and much more.
* Quizzes at the end of each chapter allow for self testing or enhanced classroom work
Commercializing technology has never been easy, and it's getting tougher all the time. All the decisions you need to make are complicated by today's breakneck rates of change in enabling technology and by competitive pressures disseminated globally at the speed of the internet: Where to get ideas? Which to pursue? Whom to hire? Where to manufacture? How to fund? Create a startup or license to another? To answer these questions adequately and bring sophisticated products and services successfully to market, you need to deploy the systematic methods detailed in this book.
Jerry Schaufeld--serial technology entrepreneur, angel investor, and distinguished professor of entrepreneurship--presents in detail his proven step-by-step commercialization process, beginning with technology assessment and culminating with the successful launch of viable products into the global market. Using case studies, models, and practical tips culled from his entrepreneurial career, he shows readers of Commercializing Innovation how toSource technology that can be turned into products
Recognize an opportunity to create a viable product
Perform feasibility analyses before sinking too much money into a project
Find the right method and means to introduce the product to market
Plan the project down to the last detail
Execute the project in ways that improve chances of its success
Comply with government regulation without crippling your project
Decide whether offshore manufacturing is your best option
Compete globally with globally sourced ideas and funding
The book consists of seven chapters that cover the seven deadliest attacks against Microsoft software and networks: attacks against Windows passwords; escalation attacks; stored procedure attacks; mail service attacks; client-side ActiveX and macro attacks; Web service attacks; and multi-tier attacks. Each chapter provides an overview of a single Microsoft software product, how it is used, and some of the core functionality behind the software. Furthermore, each chapter explores the anatomy of attacks against the software, the dangers of an attack, and possible defenses to help prevent the attacks described in the scenarios.
This book will be a valuable resource for those responsible for oversight of network security for either small or large organizations. It will also benefit those interested in learning the details behind attacks against Microsoft infrastructure, products, and services; and how to defend against them. Network administrators and integrators will find value in learning how attacks can be executed, and transfer knowledge gained from this book into improving existing deployment and integration practices.Windows Operating System-Password AttacksActive Directory-Escalation of PrivilegeSQL Server-Stored Procedure AttacksExchange Server-Mail Service AttacksOffice-Macros and ActiveXInternet Information Serives(IIS)-Web Serive AttacksSharePoint-Multi-tier Attacks
Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of “log file. This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity.
* Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network
* Dozens of working scripts and tools presented throughout the book are available for download from Syngress Solutions Web site.
* Will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks
* Provides practical, "battle tested" rules and guidelines to protect computer networks against different forms of attack * Covers both network and client level attacks, including attacks via the internet and damage to the physical hardware of a network
"Uniting the Virtual Workforce offers much-needed guidance on howto navigate the largely unmapped territory of virtual workenvironments in the global economy. The authors do an outstandingjob of presenting how organizations should address the challengesof virtual workforces so as to reap the huge potential benefits ofincreased growth, productivity, and innovation."
-C. Warren Axelrod, PhD, Chief Privacy Officer and BusinessInformation Security Officer, U.S. Trust, and author of OutsourcingInformation Security
"Lojeski and Reilly bring us something that readers of businessbooks so rarely get-no nonsense practical guidance on how to managedistance, especially where it most often serves as an impediment toworking effectively.Ê If you interface with widely dispersedteam members who rarely see one another and communicate by virtueof impersonal electronics, you may expect to find this bookprovocative, counterintuitive, and above all, exciting. It givesall of us who have to struggle, while working with talent stretchedacross distance, hope, that maybe there are ways to do thisright!"
-Patrick J. McKenna, author of First Among EqualsÊ
"A must-read for global corporate executives who managegeographically dispersed job sharing teams. Practical strategiesfor preventing productivity loss and optimizing innovation. Theauthors pull no punches in showing the real downsides to thevirtual work phenomenon; they have done a great service for usall."
-Jeff Saperstein, author of Creating Regional Wealth in theInnovation Economy
"Uniting the Virtual Workforce charts the course for competing inthe twenty-first century by tapping into the powers of virtualwork. Any manager who ignores the virtual workforce isunderperforming, and any company or organization that does notappreciate virtual work is already at a competitive disadvantage.Karen and Dick have tapped into a key ingredient in the recipe forglobal growth."
-Jerry MacArthur Hultin, President, Polytechnic University, andformer Under Secretary of the Navy
"Authors Sobel Lojeski and Reilly have provided a useful primer forthe harried executive striving for productivity improvements whileseeing the workload expand and the workforce disperse. Usingconceptual definitions of Physical, Operational, and AffinityDistance to describe the multifaceted dimensions of building teamsof people to work effectively together, the authors construct avery powerful set of metrics for a manager to improve thecapability of his or her workgroup, no matter where it resides orhow it is composed. The book is rich in anecdotes and specificstudies that illustrate the concepts in an engaging, pertinent, andeasy-to-understand manner. In an age of outsourcing, offshoring,and decentralizing groups of people who have to get things donetogether, reading this small book will repay itself many timesover."
-Charles House, Director, Media X Lab at Stanford University, andformer Director of the Societal Impact of Technology, IntelCorporation
Information Seeking Behavior and Technology Adoption: Theories and Trends brings together the many theories and meta-theories that make information science relevant across different disciplines. Highlighting theories that had their base in the early days of text-based information and expanding to the digitization of the Internet, this book is an essential reference source for those involved in the education and training of the next-generation of information science professionals, as well as those who are currently working on the design and development of our current information products, systems, and services.
The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints; eavesdropping and modification attacks; control channel attacks; attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection; attacks on identity; and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability.
This book will be of interest to information security professionals of all levels as well as recreational hackers.Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globallyDiscover the best ways to defend against these vicious attacks; step-by-step instruction shows you howInstitute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
* Covers air, sea, roadway, rail and public transport modes
* Offers technological solutions for mobility based problems in planning, logistics and policy to improve security, combat terrorism and ensure national preparedness
* Includes work of international experts & global examples related to transportation security
In an attempt to instil trust in their performance, credibility, integrity, efficiency, cost-effectiveness, and good governance, many public organizations are in effect viewing tax-paying citizens as consumers. Little research exists to explore synergies between the market economy, public administration reformation, and their complex bilateral effects. This book takes a timely look at the heightened need for public administration reform as a result of the economic challenges currently faced by nations across the globe. In particular it explores the roles of eGovernment and a citizen-centric focus in this transformation.
Public Administration Reformexamines several commonly-held assumptions about public administration: the public sector is slow and bureaucratic; government employees are frequently disengaged; and government agencies are sometimes wasteful. eGovernment is proposed as a key tool in the improvement of both public services and reputations of public organizations.
This book examines the impact of new technologies on children's experiences of books and libraries, and demonstrates how librarians can adapt to new technologies and integrate library services into the lives of today's children. From Boardbook to Facebook: Children's Services in an Interactive Age draws on current research to illuminate how children's use of media has changed in recent years and suggests ways in which new technologies can be integrated into library services now and in the future.
Information Now is an innovative approach to information literacy that will reinvent the way college students think about research. Instead of the typical textbook format, it uses illustrations, humor, and reflective exercises to teach students how to become savvy researchers. Students will learn how to evaluate information, to incorporate it into their existing knowledge base, to wield it effectively, and to understand the ethical issues surrounding its use. Written by two library professionals, it incorporates concepts and skills drawn from the Association of College and Research Libraries’ Information Literacy Competency Standards for Higher Education and their Framework for Information Literacy for Higher Education. Thoroughly researched and highly engaging, Information Now offers the tools that students need to become powerful consumers and creators of information.
Whether used by a high school student tackling a big paper, an undergrad facing the newness of a university library, or a writer wanting to go beyond Google, Information Now is a powerful tool for any researcher’s arsenal.
Authors represent the healthcare industry, financial services experience, state and federal government experience, and senior practitioners spanning many industries.
This book accomplishes the following: 1) It is for managers and decision-makers who make things happen in their organization. 2) It addresses BRs as a leverage for agility, compliance, and corporate intelligence, as a key mechanism for engineering the business itself. 3) It is not meant to be read cover-to-cover. Business people will focus on section 2. Technical people will focus on section 3. 4) Together, the sections provide a step-by-step management approach that crosses business and IT barriers. 5) Real case studies are written by real people in well-respected corporations, government agencies, consultancies, and software vendors. 6) Leading technology is highlighted. 7) Present the possibilities that BR Approach can achieve for both business and IT
Nearly all business records created today are electronic, andare increasing in number at breathtaking rates, yet mostorganizations do not have the policies and technologies in place toeffectively organize, search, protect, preserve, and produce theserecords. Authored by an internationally recognized expert one-records in collaboration with leading subject matter expertsworldwide, this authoritative text addresses the widest range ofin-depth e-records topics available in a single volume.
Using guidance from information governance (IG) principles, thebook covers methods and best practices for everything from newe-records inventorying techniques and retention scheduledevelopment, to taxonomy design, business process improvement,managing vital records, and long term digital preservation. It goesfurther to include international standards and metadataconsiderations and then on to proven project planning, systemprocurement, and implementation methodologies. ManagingElectronic Records is filled with current, critical informationon e-records management methods, emerging best practices, and keytechnologies.Thoroughly introduces the fundamentals of electronic recordsmanagementExplains the use of ARMA's Generally Accepted RecordkeepingPrinciples (GARP®)Distills e-records best practices for email, social media, andcloud computingReveals the latest techniques for e-records inventorying andretention schedulingCovers MS SharePoint governance planning for e-recordsincluding policy guidelinesDemonstrates how to optimally apply business processimprovement techniquesMakes clear how to implement e-document security strategies andtechnologiesFully presents and discusses long term digital preservationstrategies and standards
Managing e-records is a critical area, especially for thoseorganizations faced with increasing regulatory compliancerequirements, greater litigation demands, and tightened internalgovernance. Timely and relevant, Managing Electronic Recordsreveals step-by-step guidance for organizing, managing, protecting,and preserving electronic records.
Lanza and Marinescu demystify the design metrics used to assess the size, quality and complexity of object-oriented software systems. Based on statistical information from many industrial projects and generally accepted semantics they deduce many single and combined threshold values. They show in detail how to identify collaboration and classification disharmony patterns in code, how to visualize their results using the freely available CodeCrawler visualization tool, and how to devise possible remedies.
The combination of theoretically sound results and practically tested procedures and solution paths makes this book an ideal companion for professional software architects, developers and quality engineers. The pattern-oriented description of disharmonies offers easy access to detecting shortcomings and applying solution strategies.
"This well-written book is an important piece of work that takes the seemingly forgotten art of object-oriented metrics to the next level in terms of relevance and usefulness." Richard C. Gronback, Chief Scientist, Borland Software Corporation.
The first three chapters provide an overview of the Guided Inquiry design framework, identify the eight phases of the Guided Inquiry process, summarize the research that grounds Guided Inquiry, and describe the five tools of inquiry that are essential to implementation. The following chapters detail the eight phases in the Guided Inquiry design process, providing examples at all levels from pre-K through 12th grade and concluding with recommendations for building Guided Inquiry in your school.
The book is for pre-K–12 teachers, school librarians, and principals who are interested in and actively designing an inquiry approach to curricular learning that incorporates a wide range of resources from the library, the Internet, and the community. Staff of community resources, museum educators, and public librarians will also find the book useful for achieving student learning goals.
Traditionally, intellectual property law has allowed companies to control knowledge and has guarded the rights of the innovator, at the expense of industry-wide cooperation. In turn, engineers of new software code are richly rewarded; but, as Weber shows, in spite of the conventional wisdom that innovation is driven by the promise of individual and corporate wealth, ensuring the free distribution of code among computer programmers can empower a more effective process for building intellectual products. In the case of Open Source, independent programmers--sometimes hundreds or thousands of them--make unpaid contributions to software that develops organically, through trial and error.
Weber argues that the success of open source is not a freakish exception to economic principles. The open source community is guided by standards, rules, decisionmaking procedures, and sanctioning mechanisms. Weber explains the political and economic dynamics of this mysterious but important market development.
Table of Contents:
1. Property and the Problem of Software
2. The Early History of Open Source
3. What Is Open Source and How Does It Work?
4. A Maturing Model of Production
5. Explaining Open Source: Microfoundations
6. Explaining Open Source: Macro-Organization
7. Business Models and the Law
8. The Code That Changed the World?
Reviews of this book:
In the world of open-source software, true believers can be a fervent bunch. Linux, for example, may act as a credo as well as an operating system. But there is much substance beyond zealotry, says Steven Weber, the author of The Success of Open Source...An open-source operating system offers its source code up to be played with, extended, debugged, and otherwise tweaked in an orgy of user collaboration. The author traces the roots of that ethos and process in the early years of computers...He also analyzes the interface between open source and the worlds of business and law, as well as wider issues in the clash between hierarchical structures and networks, a subject with relevance beyond the software industry to the war on terrorism.
--Nina C. Ayoub, Chronicle of Higher Education
Reviews of this book:
A valuable new account of the [open-source software] movement.
--Edward Rothstein, New York Times
We can blindly continue to develop, reward, protect, and organize around knowledge assets on the comfortable assumption that their traditional property rights remain inviolate. Or we can listen to Steven Weber and begin to make our peace with the uncomfortable fact that the very foundations of our familiar "knowledge as property" world have irrevocably shifted.
--Alan Kantrow, Chief Knowledge Officer, Monitor Group
Ever since the invention of agriculture, human beings have had only three social-engineering tools for organizing any large-scale division of labor: markets (and the carrots of material benefits they offer), hierarchies (and the sticks of punishment they impose), and charisma (and the promises of rapture they offer). Now there is the possibility of a fourth mode of effective social organization--one that we perhaps see in embryo in the creation and maintenance of open-source software. My Berkeley colleague Steven Weber's book is a brilliant exploration of this fascinating topic.
--J. Bradford DeLong, Department of Economics, University of California at Berkeley
Steven Weber has produced a significant, insightful book that is both smart and important. The most impressive achievement of this volume is that Weber has spent the time to learn and think about the technological, sociological, business, and legal perspectives related to open source. The Success of Open Source is timely and more thought provoking than almost anything I've come across in the past several years. It deserves careful reading by a wide audience.
--Jonathan Aronson, Annenberg School for Communication, University of Southern California
The Fourth Edition covers current computer applications that can help in the administrative, managerial, and supervisory aspects of the security function. In addition, two new chapters address employee management in detail. The first, Lifestyle Management for Managers, will discuss motivation at work: the how, when, where, what and why of self-motivation for the boss. The second, The Departing Employee, will discuss the exit interview and the information that can be gained in that process.
Also, back by popular demand, are the author's "Jackass Management Traits," 32 humorous portrayals of negative management traits that illustrate very real problems that can undermine the effectiveness of supervisors and managers.
* Includes a new chapter on the use of statistics as a security management tool
* Contains complete updates to every chapter while retaining the outstanding organization of the previous editions
* Recommended reading for The American Society for Industrial Security's (ASIS) Certified Protection Professional (CPP) exam