Today's leaders are expected to reduce costs, increase productivity, drive innovation and help the business identify and pursue new business opportunities. Successful IT leaders will be the ones that become strategic business partners and decision influencers in their organizations. Unleashing the Power of IT describes in actionable detail, the new mindset, core skill set, and interpersonal tool set that are necessary for IT leaders to thrive in today's increasingly complex challenging business environment.Provides tangible, hard-hitting, real-world strategies, techniques and approaches that will immediately transform your IT workforce and culture Includes Top Ten lists of tips and techniques, proven frameworks and practical guidance to help you launch and sustain your IT culture change and professional development initiatives Addresses how to build a client-focused IT culture; move your organization from order takers to trusted business partners, market IT's value, lead change with confidence, manage projects and vendor relationships
A special feature of this book includes a chapter profiling several world-class organizations that have implemented the principles in this book. Learn about the culture change challenges they overcame and benefit from their best practices and successes.
We encounter crazed cybernetic killers, megalomaniac computers, living spaceships, beautiful androids, human brains in metal bodies, and ultracompetitive robot gladiators. Along the way, find answers to such questions as: Are robots capable of love? Which were the least convincing and most laughable movie robots of all time? Can robots harm humans to save themselves? And can you really destroy a deadly cyborg assassin with the force of an exploding oil tanker?
Famous Robots and Cyborgs is a joyful, eclectic, informative, celebratory journey through the hi-tech world of the mechanical man (and woman). Packed full of trivia, robo-facts, controversy, history, and information on robot toys, games, films, TV, and books, it will delight the dedicated robot aficionado and the interested newcomer alike.
If you're in IT, quite a lot is expected of you and your team: be technologically advanced, business-minded, customer-focused, and financially astute, all at once. In the face of unforgiving competition, rampant globalization, and demanding customers, business leaders are discovering that it's absolutely essential to have a strong, active partner keeping a firm hand on the decisions and strategies surrounding information technology. Unleashing the Power of IT provides tangible, hard-hitting, real-world strategies, techniques, and approaches that will immediately transform your IT workforce and culture, presenting the new mindset, skill set, and tool set necessary for IT leaders to thrive in today's challenging environment.Includes new discussion on social media Offers online access to the IT Skill Builder Competency Assessment Tool Features top ten lists of tips and techniques, proven frameworks, and practical guidance to help you launch and sustain your IT culture change and professional development initiatives
Profiling several world-class organizations that have implemented the principles in this book, Unleashing the Power of IT reveals the best practices to get you on the path to implementation.
Within each of the “7 Rings,” Brian Watson offers fresh insight into the art of servant leadership and prioritizing one’s life with numerous examples of people, both historical and contemporary, that have inspired him. In addition, each chapter includes thought-provoking quotations and action-igniting questions for practical application.
Nicholas Blick, a highly skilled twenty-year-old volleyball player, was "just snooping around" when he came across the corpse of a person who had been brutally murdered. The police have arrested another young volleyball player but Nick, thinking the wrong person has been locked up, begins his own investigation into the matter. In working on the case, the young athlete meets FBI Special Agent Tom Davis and eventually joins with the agent in not only investigating the murder but also in trying to find the person attempting to steal plans for the U.S. Navy's new missile guidance system, one called ArrowStar.
At the center of the espionage plot is globe-hopping Chen Xong Wu, a man of tremendous wealth, who is working behind the scenes to help bring about a shift in the power structure of the Chinese Communist party and, in doing so, attain for himself more influence as well as more wealth. As the story unfolds, it is Nick who, unwittingly, becomes the key person in bringing both of these cases a a together. Eventually, young Blick and Special Agent Davis find themselves working together in a race against the clock. Their goal: to find the murderer as well as uncover the identity of the espionage agent's "mole" before the Navy's plans end up in the wrong hands.
Which paint color is most likely to tell you that a used car is in good shape? How can officials identify the most dangerous New York City manholes before they explode? And how did Google searches predict the spread of the H1N1 flu outbreak?
The key to answering these questions, and many more, is big data. “Big data” refers to our burgeoning ability to crunch vast collections of information, analyze it instantly, and draw sometimes profoundly surprising conclusions from it. This emerging science can translate myriad phenomena—from the price of airline tickets to the text of millions of books—into searchable form, and uses our increasing computing power to unearth epiphanies that we never could have seen before. A revolution on par with the Internet or perhaps even the printing press, big data will change the way we think about business, health, politics, education, and innovation in the years to come. It also poses fresh threats, from the inevitable end of privacy as we know it to the prospect of being penalized for things we haven’t even done yet, based on big data’s ability to predict our future behavior.
In this brilliantly clear, often surprising work, two leading experts explain what big data is, how it will change our lives, and what we can do to protect ourselves from its hazards. Big Data is the first big book about the next big thing.
The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced.
With the help of a prospective board member and his mysterious philosophy of The Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined. With the clock ticking, Bill must organize work flow, streamline interdepartmental communications, and effectively serve the other business functions at Parts Unlimited.
In a fast-paced and entertaining style, three luminaries of the DevOps movement deliver a story that anyone who works in IT will recognize. Readers will not only learn how to improve their own IT organizations, they'll never view IT the same way again.
More than ever, the effective management of technology is critical for business competitiveness. For decades, technology leaders have struggled to balance agility, reliability, and security. The consequences of failure have never been greater―whether it's the healthcare.gov debacle, cardholder data breaches, or missing the boat with Big Data in the cloud.
And yet, high performers using DevOps principles, such as Google, Amazon, Facebook, Etsy, and Netflix, are routinely and reliably deploying code into production hundreds, or even thousands, of times per day.
Following in the footsteps of The Phoenix Project, The DevOps Handbook shows leaders how to replicate these incredible outcomes, by showing how to integrate Product Management, Development, QA, IT Operations, and Information Security to elevate your company and win in the marketplace.
Take the DORA DevOps X-ray Assessment and see where you stand! Visit devops-survey.com with your access code to take the DevOps X-ray Assessment.
Mullins presents realistic, thorough, and up-to-date coverage of every DBA task, including creating database environments, data modeling, normalization, design, performance, data integrity, compliance, governance, security, backup/recovery, disaster planning, data and storage management, data movement/distribution, data warehousing, connectivity, metadata, tools, and more.
This edition adds new coverage of “Big Data,” database appliances, cloud computing, and NoSQL. Mullins includes an entirely new chapter on the DBA’s role in regulatory compliance, with substantial new material on data breaches, auditing, encryption, retention, and metadata management. You’ll also find an all-new glossary, plus up-to-the-minute DBA rules of thumb.
Jim Whitehurst, CEO of Red Hat, one of the world’s most revolutionary companies, shows how open principles of management—based on transparency, participation, and community—reinvent the organization for the fast-paced connected era. Whitehurst gives readers an insider’s look into how an open and innovative organizational model works. He shows how to leverage it to build community, respond quickly to opportunities, harness resources and talent both inside and outside the organization, and inspire, motivate, and empower people at all levels to act with accountability.
The Open Organization is a must-read for leaders struggling to adapt their management practices to the values of the digital and social age. Brimming with Whitehurst’s personal stories and candid advice for leading an open organization, as well as with instructive examples from employees and managers at Red Hat and companies such as Google, The Body Shop, and Whole Foods, this book provides the blueprint for reinventing your organization.
Companies moving toward flexible SOA architectures often face difficult information management and integration challenges. The master data they rely on is often stored and managed in ways that are redundant, inconsistent, inaccessible, non-standardized, and poorly governed. Using Master Data Management (MDM), organizations can regain control of their master data, improve corresponding business processes, and maximize its value in SOA environments.
Enterprise Master Data Management provides an authoritative, vendor-independent MDM technical reference for practitioners: architects, technical analysts, consultants, solution designers, and senior IT decisionmakers. Written by the IBM® data management innovators who are pioneering MDM, this book systematically introduces MDM’s key concepts and technical themes, explains its business case, and illuminates how it interrelates with and enables SOA.
Drawing on their experience with cutting-edge projects, the authors introduce MDM patterns, blueprints, solutions, and best practices published nowhere else—everything you need to establish a consistent, manageable set of master data, and use it for competitive advantage.
How MDM and SOA complement each other Using the MDM Reference Architecture to position and design MDM solutions within an enterprise Assessing the value and risks to master data and applying the right security controls Using PIM-MDM and CDI-MDM Solution Blueprints to address industry-specific information management challenges Explaining MDM patterns as enablers to accelerate consistent MDM deployments Incorporating MDM solutions into existing IT landscapes via MDM Integration Blueprints Leveraging master data as an enterprise asset—bringing people, processes, and technology together with MDM and data governance Best practices in MDM deployment, including data warehouse and SAP integration
Coal, iron ore, and oil were the key productive assets that fueled the Industrial Revolution. The vital raw material of today's information economy is data.
In Data-ism, New York Times reporter Steve Lohr explains how big-data technology is ushering in a revolution in proportions that promise to be the basis of the next wave of efficiency and innovation across the economy. But more is at work here than technology. Big data is also the vehicle for a point of view, or philosophy, about how decisions will be—and perhaps should be—made in the future. Lohr investigates the benefits of data while also examining its dark side.
Data-ism is about this next phase, in which vast Internet-scale data sets are used for discovery and prediction in virtually every field. It shows how this new revolution will change decision making—by relying more on data and analysis, and less on intuition and experience—and transform the nature of leadership and management. Focusing on young entrepreneurs at the forefront of data science as well as on giant companies such as IBM that are making big bets on data science for the future of their businesses, Data-ism is a field guide to what is ahead, explaining how individuals and institutions will need to exploit, protect, and manage data to stay competitive in the coming years. With rich examples of how the rise of big data is affecting everyday life, Data-ism also raises provocative questions about policy and practice that have wide implications for everyone.
The age of data-ism is here. But are we ready to handle its consequences, good and bad?
Leading-edge companies like Amazon and Google are applying DevOps and Agile principles to deliver large software projects faster than anyone thought possible. But most executives don’t understand how to transform their current legacy systems and processes to scale these principles across their organizations.
Leading the Transformation is an executive guide, providing a clear framework for improving development and delivery. Instead of the traditional Agile and DevOps approaches that focus on improving the effectiveness of teams, this book targets the coordination of work across teams in large organizations—an improvement that executives are uniquely positioned to lead.
Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructive relationships with organizational peers and company management.Comprehensive introduction to security and IT security management principlesDiscussion of both public and private sector roles, as well as the increasingly common privatizing of government functionsNew experience-based exercises to sharpen security management and strategic skills and reinforce the content of each chapter
The book takes you step-by-step through the analysis of case law as it applies to situations commonly faced by security practitioners. It describes the legal requirements faced by security firms and emphasizes the liability problems common to security operations, including negligence and tortious liability, civil actions frequently litigated, and strategies to avoid legal actions that affect business efficiency. It also examines the constitutional and due-process dimensions of private security both domestically and internationally, including recent cases and trends that are likely to intensify in the future. New features of this edition include: a chapter on the legal implications of private contractors operating in war zones like Afghanistan; updated coverage of statutory authority, as well as state and federal processes of oversight and licensure; and special analysis of public-private cooperative relationships in law enforcement. A historical background helps readers understand the present by seeing the full context of recent developments.
This book will appeal to: students in physical security, security management, and criminal justice programs in traditional and for-profit schools; security professionals; and those working in law enforcement.Authoritative, scholarly treatise sheds light on this increasingly important area of the lawHistorical background helps readers understand the present by seeing the full context of recent developmentsNational scope provides crucial parameters to security practitioners throughout the USNEW TO THIS EDITION! A chapter on the legal implications of private contractors operating in war zones like Afghanistan, updated coverage of statutory authority, updated coverage of state and federal processes of oversight and licensure, special analysis of public-private cooperative relationships in law enforcement
Tomorrow’s winning “Intelligent Enterprises” will bring together far more diverse sources of data, analyze it in more powerful ways, and deliver immediate insight to decision-makers throughout the organization. Today, however, most companies fail to apply the information they already have, while struggling with the complexity and costs of their existing information environments.
In this book, a team of IBM’s leading information management experts guide you on a journey that will take you from where you are today toward becoming an “Intelligent Enterprise.”
Drawing on their extensive experience working with enterprise clients, the authors present a new, information-centric approach to architecture and powerful new models that will benefit any organization. Using these strategies and models, companies can systematically unlock the business value of information by delivering actionable, real-time information in context to enable better decision-making throughout the enterprise–from the “shop floor” to the “top floor.”
Coverage IncludesHighlighting the importance of Dynamic Warehousing Defining your Enterprise Information Architecture from conceptual, logical, component, and operational views Using information architecture principles to integrate and rationalize your IT investments, from Cloud Computing to Information Service Lifecycle Management Applying enterprise Master Data Management (MDM) to bolster business functions, ranging from compliance and risk management to marketing and product management Implementing more effective business intelligence and business performance optimization, governance, and security systems and processes Understanding “Information as a Service” and “Info 2.0,” the information delivery side of Web 2.0
all the music, film and text ever produced will be available on-demand in our own homesyour "bodynet" will let you make phone calls, check email and pay bills as you walk down the streetadvances in telecommunication will radically alter the role of face-to-face contact in our livesglobal disparities in infrastructure will widen the gap between rich and poorsurgical mini-robots and online care will change the practice of medicine as we know it.
Detailed, accessible and visionary, What Will Be is essential for Information Age revolutionaries and technological neophytes alike.
* Completely updated with coverage of all core security principles
* Course text for the Certified Protection Officer (CPO) Program
* Includes all new sections on information security, terrorism awareness, and first response during crises
Covering cloud computing from what the business leader needs to know, this book describes how IT can nimbly ramp up revenue initiatives, positively impact business operations and costs, and how this allows business leaders to shed worry about technology so they can focus on their business. It also reveals the cloud's effect on corporate organization structures, the evolution of traditional IT in the global economy, potential benefits and risks of cloud models and most importantly, how the IT function is being rethought by companies today who are making room for the coming tidal wave that is cloud computing.Why IT and business thinking must change to capture the full potential of cloud computing Topics including emerging cloud solutions, data security, service reliability, the new role of IT and new business organization structures Other titles by Hugos include: Business Agility: Sustainable Prosperity in a Relentlessly Competitive World and Essentials of Supply Chain Management, 2nd Edition
Practical and timely, this book reveals why it's worth every company's time and effort to exploit cloud computing's potential for their business's survival and success.
The key? Make tough decisions about which processes you must execute well, then implement the IT systems needed to digitize those processes. Citing numerous companies worldwide, the authors show how constructing the right enterprise architecture enhances profitability and time to market, improves strategy execution, and even lowers IT costs. Though clear, engaging explanation, they demonstrate how to define your operating model—your vision of how your firm will survive and grow—and implement it through your enterprise architecture. Their counterintuitive but vital message: when it comes to executing your strategy, your enterprise architecture may matter far more than your strategy itself.
From one of the world's leading figures in social media marketing, networking, and business applications comes the heavily revised and updated edition of the Likeable Social Media.
Dave Kerpen is CEO of Likeable Local and Likeable Media, which has won two WOMMY awards from the Word of Mouth Marketing Association (WOMMA) for excellence in word-of-mouth marketing.
The book contains 12 units and 45 chapters. Written by leading security educators, trainers and consultants, it has served as the authoritative text for both students and professionals worldwide. This new edition adds critical updates and fresh pedagogy, as well as new diagrams, illustrations, and self assessments. Information included is designed to reflect the latest trends in the industry and to support and reinforce continued professional development. The book concludes with an Emerging Trends feature, laying the groundwork for the future growth of this increasingly vital profession.
This will be an ideal reference for security students and CPO candidates.Information included is designed to reflect the latest trends in the industry and to support and reinforce continued professional development.Concludes chapters with an Emerging Trends feature, laying the groundwork for the future growth of this increasingly vital profession.Written by a cross-disciplinary contributor team consisting of top experts in their respective fields.
Today, number crunching affects your life in ways you might never imagine. In this lively and groundbreaking new book, economist Ian Ayres shows how today's best and brightest organizations are analyzing massive databases at lightening speed to provide greater insights into human behavior. They are the Super Crunchers. From internet sites like Google and Amazon that know your tastes better than you do, to a physician's diagnosis and your child's education, to boardrooms and government agencies, this new breed of decision makers are calling the shots. And they are delivering staggeringly accurate results. How can a football coach evaluate a player without ever seeing him play? Want to know whether the price of an airline ticket will go up or down before you buy? How can a formula outpredict wine experts in determining the best vintages? Super crunchers have the answers. In this brave new world of equation versus expertise, Ayres shows us the benefits and risks, who loses and who wins, and how super crunching can be used to help, not manipulate us.
Gone are the days of solely relying on intuition to make decisions. No businessperson, consumer, or student who wants to stay ahead of the curve should make another keystroke without reading Super Crunchers.
From the Hardcover edition.
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.
This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.
John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.
James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.
· Provides critical strategies for maintaining basic business functions when and if systems are shut down
· Establishes up to date methods and techniques for maintaining second site back up and recovery
· Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters
Aspiring digital businesses need overall IT agility, not just development team agility. In Agile IT Organization Design , IT management consultant and ThoughtWorks veteran Sriram Narayan shows how to infuse agility throughout your organization. Drawing on more than fifteen years’ experience working with enterprise clients in IT-intensive industries, he introduces an agile approach to “Business–IT Effectiveness” that is as practical as it is valuable.
The author shows how structural, political, operational, and cultural facets of organization design influence overall IT agility—and how you can promote better collaboration across diverse functions, from sales and marketing to product development, and engineering to IT operations. Through real examples, he helps you evaluate and improve organization designs that enhance autonomy, mastery, and purpose: the key ingredients for a highly motivated workforce.
You’ll find “close range” coverage of team design, accountability, alignment, project finance, tooling, metrics, organizational norms, communication, and culture. For each, you’ll gain a deeper understanding of where your organization stands, and clear direction for making improvements. Ready to optimize the performance of your IT organization or digital business? Here are practical solutions for the long term, and for right now.Govern for value over predictability Organize for responsiveness, not lowest cost Clarify accountability for outcomes and for decisions along the way Strengthen the alignment of autonomous teams Move beyond project teams to capability teams Break down tool-induced silos Choose financial practices that are free of harmful side effects Create and retain great teams despite today’s “talent crunch” Reform metrics to promote (not prevent) agility Evolve culture through improvements to structure, practices, and leadership—and careful, deliberate interventions
Strategic Security Management fills a definitive need for guidelines on security best practices. The book also explores the process of in-depth security analysis for decision making, and provides the reader with the framework needed to apply security concepts to specific scenarios. Advanced threat, vulnerability, and risk assessment techniques are presented as the basis for security strategies. These concepts are related back to establishing effective security programs, including program implementation, management, and evaluation. The book also covers metric-based security resource allocation of countermeasures, including security procedures, personnel, and electronic measures.
Strategic Security Management contains contributions by many renowned security experts, such as Nick Vellani, Karl Langhorst, Brian Gouin, James Clark, Norman Bates, and Charles Sennewald.Provides clear direction on how to meet new business demands on the security professionalGuides the security professional in using hard data to drive a security strategy, and follows through with the means to measure success of the programCovers threat assessment, vulnerability assessment, and risk assessment - and highlights the differences, advantages, and disadvantages of each
of setting up the field operations needed to provide adequate protection to the client, firm or individual. The Standard Operating Procedure System asks all
the questions required to survey any protection objective. In addition, the system provides all the basic information needed to answer those questions and leads to the implementation of the tactical or mission standard operating procedure. The Standard Operating Procedure System may be applied to any type of security or protection operation and may be modified, expanded or contracted, without needing to rewrite or redesign an existing security program.
Details a system to survey, implement, and maintain at full operational
effectiveness many types of assets protection programs.
Provides the basis for the vital training required by every security or physical
This book is for IT managers and company managers who need to understand how PCI DSS applies to their organizations. It is for the small- and medium-size businesses that do not have an IT department to delegate to. It is for large organizations whose PCI DSS project scope is immense. It is also for all organizations that need to grasp the concepts of PCI DSS and how to implement an effective security framework that is also compliant.Completely updated to follow the PCI DSS standard 1.2.1Packed with help to develop and implement an effective security strategy to keep infrastructure compliant and secureBoth authors have broad information security backgrounds, including extensive PCI DSS experience
The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered.
There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.
This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.
These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.
- Interdisciplinary coverage of the history Information Security
- Written by top experts in law, history, computer and information science
- First comprehensive work in Information Security
In Data Driven, Thomas Redman, the "Data Doc," shows how to leverage and deploy data to sharpen your company's competitive edge and enhance its profitability. The author reveals:
· The special properties that make data such a powerful asset
· The hidden costs of flawed, outdated, or otherwise poor-quality data
· How to improve data quality for competitive advantage
· Strategies for exploiting your data to make better business decisions
· The many ways to bring data to market
· Ideas for dealing with political struggles over data and concerns about privacy rights
Your company's data is a key business asset, and you need to manage it aggressively and professionally. Whether you're a top executive, an aspiring leader, or a product-line manager, this eye-opening book provides the tools and thinking you need to do that.
Updates include 14 new chapters, 3 completely revised chapters, "Student Performance Objectives" in each chapter, and added information on related resources (both print and online).
* Completion of the Security Supervision and Management Program is the initial step toward the Certified in Security Supervision and Management (CSSM) designation
* Over 40 experienced security professionals contribute chapters in their area of specialty
* Revised throughout, and completely updated with 14 new chapters on topics such as Leadership, Homeland Security, Strategic Planning and Management, Budget Planning, Career Planning, and much more.
* Quizzes at the end of each chapter allow for self testing or enhanced classroom work
How does their life experience inform their learning processes?
These were the questions at the heart of Malcolm Knowles’s pioneering theory of andragogy which transformed education theory in the 1970s. The resulting principles of a self-directed, experiential, problem-centered approach to learning have been hugely influential and are still the basis of the learning practices we use today. Understanding these principles is the cornerstone of increasing motivation and enabling adult learners to achieve.
This eighth edition has been thoughtfully updated in terms of structure, content, and style. On top of this, online material and added chapter-level reflection questions make this classic text more accessible than ever. The new edition includes:
Two new chapters: Neuroscience and Andragogy, and Information Technology and Learning.
Updates throughout the book to reflect the very latest advancements in the field.
A companion website with instructor aids for each chapter.
If you are a researcher, practitioner or student in education, an adult learning practitioner, training manager, or involved in human resource development, this is the definitive book in adult learning that you should not be without.
Commercializing technology has never been easy, and it's getting tougher all the time. All the decisions you need to make are complicated by today's breakneck rates of change in enabling technology and by competitive pressures disseminated globally at the speed of the internet: Where to get ideas? Which to pursue? Whom to hire? Where to manufacture? How to fund? Create a startup or license to another? To answer these questions adequately and bring sophisticated products and services successfully to market, you need to deploy the systematic methods detailed in this book.
Jerry Schaufeld--serial technology entrepreneur, angel investor, and distinguished professor of entrepreneurship--presents in detail his proven step-by-step commercialization process, beginning with technology assessment and culminating with the successful launch of viable products into the global market. Using case studies, models, and practical tips culled from his entrepreneurial career, he shows readers of Commercializing Innovation how toSource technology that can be turned into products
Recognize an opportunity to create a viable product
Perform feasibility analyses before sinking too much money into a project
Find the right method and means to introduce the product to market
Plan the project down to the last detail
Execute the project in ways that improve chances of its success
Comply with government regulation without crippling your project
Decide whether offshore manufacturing is your best option
Compete globally with globally sourced ideas and funding
The book consists of seven chapters that cover the seven deadliest attacks against Microsoft software and networks: attacks against Windows passwords; escalation attacks; stored procedure attacks; mail service attacks; client-side ActiveX and macro attacks; Web service attacks; and multi-tier attacks. Each chapter provides an overview of a single Microsoft software product, how it is used, and some of the core functionality behind the software. Furthermore, each chapter explores the anatomy of attacks against the software, the dangers of an attack, and possible defenses to help prevent the attacks described in the scenarios.
This book will be a valuable resource for those responsible for oversight of network security for either small or large organizations. It will also benefit those interested in learning the details behind attacks against Microsoft infrastructure, products, and services; and how to defend against them. Network administrators and integrators will find value in learning how attacks can be executed, and transfer knowledge gained from this book into improving existing deployment and integration practices.Windows Operating System-Password AttacksActive Directory-Escalation of PrivilegeSQL Server-Stored Procedure AttacksExchange Server-Mail Service AttacksOffice-Macros and ActiveXInternet Information Serives(IIS)-Web Serive AttacksSharePoint-Multi-tier Attacks
Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of “log file. This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity.
* Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network
* Dozens of working scripts and tools presented throughout the book are available for download from Syngress Solutions Web site.
* Will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks
Strategic IT Best Practices for IT Managers and Executives is an exciting new book focused on the transition currently taking place in the CIO role, which involves developing a capacity for thinking strategically and effectively engaging peers in the senior executive team. This involves changing both theirs, and often their colleagues', mindsets about technology and their role in the organization.
Straightforward and clear, this book fills the need for understanding the learning processes that have shaped the strategic mindsets of technology executives who have successfully made the transition from a technology-focused expert mindset to a strategic orientation that adds value to the business.Defines strategy advocacy as a process through which technology leaders in organizations build on their functional expertise Focuses on the shift in mindset necessary for technology executives to establish a seat at the table in the C suite as a respected strategic colleague Includes stories of high performing CIOs and how they learned successful strategies for getting technology positioned as a strategic driver across the business
Written by Art Langer and Lyle Yorks, recognized authorities in the areas of technology management and leadership, Strategic IT Best Practices for IT Managers and Executives includes anecdotes from CIOs at companies including BP, Prudential, Covance, Guardian, Merck, and others.
* Provides practical, "battle tested" rules and guidelines to protect computer networks against different forms of attack * Covers both network and client level attacks, including attacks via the internet and damage to the physical hardware of a network
"Uniting the Virtual Workforce offers much-needed guidance on how to navigate the largely unmapped territory of virtual work environments in the global economy. The authors do an outstanding job of presenting how organizations should address the challenges of virtual workforces so as to reap the huge potential benefits of increased growth, productivity, and innovation."
-C. Warren Axelrod, PhD, Chief Privacy Officer and Business Information Security Officer, U.S. Trust, and author of Outsourcing Information Security
"Lojeski and Reilly bring us something that readers of business books so rarely get-no nonsense practical guidance on how to manage distance, especially where it most often serves as an impediment to working effectively.Ê If you interface with widely dispersed team members who rarely see one another and communicate by virtue of impersonal electronics, you may expect to find this book provocative, counterintuitive, and above all, exciting. It gives all of us who have to struggle, while working with talent stretched across distance, hope, that maybe there are ways to do this right!"
-Patrick J. McKenna, author of First Among EqualsÊ
"A must-read for global corporate executives who manage geographically dispersed job sharing teams. Practical strategies for preventing productivity loss and optimizing innovation. The authors pull no punches in showing the real downsides to the virtual work phenomenon; they have done a great service for us all."
-Jeff Saperstein, author of Creating Regional Wealth in the Innovation Economy
"Uniting the Virtual Workforce charts the course for competing in the twenty-first century by tapping into the powers of virtual work. Any manager who ignores the virtual workforce is underperforming, and any company or organization that does not appreciate virtual work is already at a competitive disadvantage. Karen and Dick have tapped into a key ingredient in the recipe for global growth."
-Jerry MacArthur Hultin, President, Polytechnic University, and former Under Secretary of the Navy
"Authors Sobel Lojeski and Reilly have provided a useful primer for the harried executive striving for productivity improvements while seeing the workload expand and the workforce disperse. Using conceptual definitions of Physical, Operational, and Affinity Distance to describe the multifaceted dimensions of building teams of people to work effectively together, the authors construct a very powerful set of metrics for a manager to improve the capability of his or her workgroup, no matter where it resides or how it is composed. The book is rich in anecdotes and specific studies that illustrate the concepts in an engaging, pertinent, and easy-to-understand manner. In an age of outsourcing, offshoring, and decentralizing groups of people who have to get things done together, reading this small book will repay itself many times over."
-Charles House, Director, Media X Lab at Stanford University, and former Director of the Societal Impact of Technology, Intel Corporation
Information Seeking Behavior and Technology Adoption: Theories and Trends brings together the many theories and meta-theories that make information science relevant across different disciplines. Highlighting theories that had their base in the early days of text-based information and expanding to the digitization of the Internet, this book is an essential reference source for those involved in the education and training of the next-generation of information science professionals, as well as those who are currently working on the design and development of our current information products, systems, and services.
The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints; eavesdropping and modification attacks; control channel attacks; attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection; attacks on identity; and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability.
This book will be of interest to information security professionals of all levels as well as recreational hackers.Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globallyDiscover the best ways to defend against these vicious attacks; step-by-step instruction shows you howInstitute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
* Covers air, sea, roadway, rail and public transport modes
* Offers technological solutions for mobility based problems in planning, logistics and policy to improve security, combat terrorism and ensure national preparedness
* Includes work of international experts & global examples related to transportation security
In an attempt to instil trust in their performance, credibility, integrity, efficiency, cost-effectiveness, and good governance, many public organizations are in effect viewing tax-paying citizens as consumers. Little research exists to explore synergies between the market economy, public administration reformation, and their complex bilateral effects. This book takes a timely look at the heightened need for public administration reform as a result of the economic challenges currently faced by nations across the globe. In particular it explores the roles of eGovernment and a citizen-centric focus in this transformation.
Public Administration Reformexamines several commonly-held assumptions about public administration: the public sector is slow and bureaucratic; government employees are frequently disengaged; and government agencies are sometimes wasteful. eGovernment is proposed as a key tool in the improvement of both public services and reputations of public organizations.
Authors represent the healthcare industry, financial services experience, state and federal government experience, and senior practitioners spanning many industries.
This book accomplishes the following: 1) It is for managers and decision-makers who make things happen in their organization. 2) It addresses BRs as a leverage for agility, compliance, and corporate intelligence, as a key mechanism for engineering the business itself. 3) It is not meant to be read cover-to-cover. Business people will focus on section 2. Technical people will focus on section 3. 4) Together, the sections provide a step-by-step management approach that crosses business and IT barriers. 5) Real case studies are written by real people in well-respected corporations, government agencies, consultancies, and software vendors. 6) Leading technology is highlighted. 7) Present the possibilities that BR Approach can achieve for both business and IT
Nearly all business records created today are electronic, and are increasing in number at breathtaking rates, yet most organizations do not have the policies and technologies in place to effectively organize, search, protect, preserve, and produce these records. Authored by an internationally recognized expert on e-records in collaboration with leading subject matter experts worldwide, this authoritative text addresses the widest range of in-depth e-records topics available in a single volume.
Using guidance from information governance (IG) principles, the book covers methods and best practices for everything from new e-records inventorying techniques and retention schedule development, to taxonomy design, business process improvement, managing vital records, and long term digital preservation. It goes further to include international standards and metadata considerations and then on to proven project planning, system procurement, and implementation methodologies. Managing Electronic Records is filled with current, critical information on e-records management methods, emerging best practices, and key technologies.Thoroughly introduces the fundamentals of electronic records management Explains the use of ARMA's Generally Accepted Recordkeeping Principles (GARP®) Distills e-records best practices for email, social media, and cloud computing Reveals the latest techniques for e-records inventorying and retention scheduling Covers MS SharePoint governance planning for e-records including policy guidelines Demonstrates how to optimally apply business process improvement techniques Makes clear how to implement e-document security strategies and technologies Fully presents and discusses long term digital preservation strategies and standards
Managing e-records is a critical area, especially for those organizations faced with increasing regulatory compliance requirements, greater litigation demands, and tightened internal governance. Timely and relevant, Managing Electronic Records reveals step-by-step guidance for organizing, managing, protecting, and preserving electronic records.
Lanza and Marinescu demystify the design metrics used to assess the size, quality and complexity of object-oriented software systems. Based on statistical information from many industrial projects and generally accepted semantics they deduce many single and combined threshold values. They show in detail how to identify collaboration and classification disharmony patterns in code, how to visualize their results using the freely available CodeCrawler visualization tool, and how to devise possible remedies.
The combination of theoretically sound results and practically tested procedures and solution paths makes this book an ideal companion for professional software architects, developers and quality engineers. The pattern-oriented description of disharmonies offers easy access to detecting shortcomings and applying solution strategies.
"This well-written book is an important piece of work that takes the seemingly forgotten art of object-oriented metrics to the next level in terms of relevance and usefulness." Richard C. Gronback, Chief Scientist, Borland Software Corporation.
Compare distributed apps (dapps) to web apps
Write Ethereum smart contracts in Solidity
Deploy your own dapp, coin, and blockchain
Work with basic and intermediate smart contracts
Who This Book Is For
Experts will find the advanced sample projects in this book rewarding because of the power of Solidity
Traditionally, intellectual property law has allowed companies to control knowledge and has guarded the rights of the innovator, at the expense of industry-wide cooperation. In turn, engineers of new software code are richly rewarded; but, as Weber shows, in spite of the conventional wisdom that innovation is driven by the promise of individual and corporate wealth, ensuring the free distribution of code among computer programmers can empower a more effective process for building intellectual products. In the case of Open Source, independent programmers--sometimes hundreds or thousands of them--make unpaid contributions to software that develops organically, through trial and error.
Weber argues that the success of open source is not a freakish exception to economic principles. The open source community is guided by standards, rules, decisionmaking procedures, and sanctioning mechanisms. Weber explains the political and economic dynamics of this mysterious but important market development.
Table of Contents:
1. Property and the Problem of Software
2. The Early History of Open Source
3. What Is Open Source and How Does It Work?
4. A Maturing Model of Production
5. Explaining Open Source: Microfoundations
6. Explaining Open Source: Macro-Organization
7. Business Models and the Law
8. The Code That Changed the World?
Reviews of this book:
In the world of open-source software, true believers can be a fervent bunch. Linux, for example, may act as a credo as well as an operating system. But there is much substance beyond zealotry, says Steven Weber, the author of The Success of Open Source...An open-source operating system offers its source code up to be played with, extended, debugged, and otherwise tweaked in an orgy of user collaboration. The author traces the roots of that ethos and process in the early years of computers...He also analyzes the interface between open source and the worlds of business and law, as well as wider issues in the clash between hierarchical structures and networks, a subject with relevance beyond the software industry to the war on terrorism.
--Nina C. Ayoub, Chronicle of Higher Education
Reviews of this book:
A valuable new account of the [open-source software] movement.
--Edward Rothstein, New York Times
We can blindly continue to develop, reward, protect, and organize around knowledge assets on the comfortable assumption that their traditional property rights remain inviolate. Or we can listen to Steven Weber and begin to make our peace with the uncomfortable fact that the very foundations of our familiar "knowledge as property" world have irrevocably shifted.
--Alan Kantrow, Chief Knowledge Officer, Monitor Group
Ever since the invention of agriculture, human beings have had only three social-engineering tools for organizing any large-scale division of labor: markets (and the carrots of material benefits they offer), hierarchies (and the sticks of punishment they impose), and charisma (and the promises of rapture they offer). Now there is the possibility of a fourth mode of effective social organization--one that we perhaps see in embryo in the creation and maintenance of open-source software. My Berkeley colleague Steven Weber's book is a brilliant exploration of this fascinating topic.
--J. Bradford DeLong, Department of Economics, University of California at Berkeley
Steven Weber has produced a significant, insightful book that is both smart and important. The most impressive achievement of this volume is that Weber has spent the time to learn and think about the technological, sociological, business, and legal perspectives related to open source. The Success of Open Source is timely and more thought provoking than almost anything I've come across in the past several years. It deserves careful reading by a wide audience.
--Jonathan Aronson, Annenberg School for Communication, University of Southern California
The Fourth Edition covers current computer applications that can help in the administrative, managerial, and supervisory aspects of the security function. In addition, two new chapters address employee management in detail. The first, Lifestyle Management for Managers, will discuss motivation at work: the how, when, where, what and why of self-motivation for the boss. The second, The Departing Employee, will discuss the exit interview and the information that can be gained in that process.
Also, back by popular demand, are the author's "Jackass Management Traits," 32 humorous portrayals of negative management traits that illustrate very real problems that can undermine the effectiveness of supervisors and managers.
* Includes a new chapter on the use of statistics as a security management tool
* Contains complete updates to every chapter while retaining the outstanding organization of the previous editions
* Recommended reading for The American Society for Industrial Security's (ASIS) Certified Protection Professional (CPP) exam
“Organizational Development and Strategic Change” explores organizational
learning, behavior, development, and technology. Covering incremental and rapid
change, leadership roles, and management techniques, the book provides in-depth
insight on learning and change. This book provides consultants, change agents,
and strategists with analytical tools and frameworks to lead effective
strategic change and bolster organizational sustainability.
The text explores and defines learning and Knowledge Management concepts, and deals with the elements that play an important part in determining implementation success in the organization. The chapters present a managerially oriented discussion of the following key areas:
* The role of processes in managing knowledge
* The behavioural side of Knowledge Management
* Leadership reflexes for knowledge management success
* The key features of Information Technology required for Knowledge Management
* The future of Knowledge Management as part of organization management.
There are many case studies which include:
The case studies encompass a diverse and broad range of sectors, maturity of practice, problems and approaches to Knowledge Management.
'Leveraging Communities of Practice for Strategic Advantage' combines theory and practice to outline a model for developing successful communities of practice and proposes a direction for establishing communities of practice as an integral part of the organizational structure. Saint-Onge and Wallace relate what worked, what didn't, and why as they tell the story from inception through implementation to assessment. Whether you're developing communities of practice or want to learn how to leverage existing communities for strategic gain, this book provides you with everything you need to launch successful communities of practice in your organization.