Dix jours qui ébranlèrent le monde

République des Lettres

Texte intégral révisé suivi d'une biographie de John Reed. Dix jours suffirent au peuple pour prendre le pouvoir, dix jours pour que déjà Pétrograd devienne Léningrad, et la Sainte Russie, l'Union des Républiques Socialistes Soviétiques. John Reed, un correspondant de guerre américain, était là. Il nous a laissé, sur ces journées d'Octobre Rouge qui changèrent la face du monde, le seul récit qui mérite d'être lu et relu. "Je voudrais que ce livre soit répandu à des millions d'exemplaires" disait Lénine.
Read more

About the author

John Silas Jack Reed (1887-1920) was an American journalist, poet, and socialist activist, best remembered for his first-hand account of the Bolshevik Revolution, Ten Days That Shook the World. He was married to writer and feminist Louise Bryant. Reed died in Russia in 1920 and is one of only three Americans buried in the Kremlin Wall Necropolis. Reed's short life as a revolutionary writer and activist made him the hero of a generation of radical intellectuals.

Read more
1 total

Additional Information

République des Lettres
Read more
Published on
Mar 18, 2017
Read more
Read more
Read more
Read more
History / General
Read more
Content Protection
This content is DRM protected.
Read more
Read Aloud
Available on Android devices
Read more

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Show me a company with weak cybersecurity and I will show you a company with lackluster corporate governance, anemic C-suite leadership and head-in-the-sand operations. That is why there is a new, specialized and complex business demand in the corporate world: cybersecurity due diligence.

Cybersecurity due diligence is rapidly becoming a critical factor of the decision-making calculus for a corporation contemplating a merger, acquisition, asset purchase or other business combination; an organization taking on a new vendor, partner or other alliance; or a private equity firm purchasing a new portfolio company.

In every industry, cybersecurity weaknesses represent a significant threat to the operations, reputation and the bottom line of all companies, whatever their size and wherever their location. Poor cybersecurity at any company creates tremendous risk for any suitor who buys that company, merges with that company, partners with that company or hires that company as a vendor. The mantra underlying cybersecurity due diligence concerns is simple: No matter what the terms, when adding, partnering or working with another enterprise, a company is taking on that company’s data troubles and attendant data risks. Consider corporate business combinations and corporate vendor management:

Corporate Business Combinations. For corporate mergers and acquisitions and other changes in control, vigorous cybersecurity due diligence not only better informs deal terms and deal value but can also signal early deal-breakers, saving buyers from unforeseen financial costs, regulatory liabilities, technological integration headaches or even bankruptcy. Aside from offering additional opportunities to more closely assess the risk of business combinations, cybersecurity due diligence analysis can impact valuation and contracting issues as well. Without a fully developed understanding of a company’s cybersecurity profile, a company cannot:

• Fully appreciate the value of another company, whether acquisition target, partner or vendor;

• Meaningfully identify and execute whatever opportunities exist for strengthening cybersecurity; and

• Thoughtfully draft data-related provisions in the transaction’s or vendor’s agreements, so that where possible, parties can implement post-transaction cybersecurity solutions.

Corporate Vendor Management. For corporate vendor management, cybersecurity due diligence has become similarly essential. Given that cyber-attackers will often traverse a company’s network and gain entry into the networks of its vendors or vice versa, third-party vendors have become one of the more prevalent attack vectors in the most recent cyber-attacks, as cybersecurity shortcomings of third-party vendors have become a cybercriminal’s dream.

Cyber risks are real and costly, and the most forward-thinking companies assess the cyber health and safety of an enterprise before committing to a significant investment or relationship. Likewise, a company or vendor can strengthen its attractiveness as a partner or a takeover target by conducting “self” cybersecurity due diligence to demonstrate the fitness of its enterprise.

The stakes are extraordinarily high for everyone involved when contemplating cybersecurity. That is why I wrote The Cybersecurity Due Diligence Handbook. My goal is to present highly technical cybersecurity subject matter in plain English and to help due diligence teams identify and manage cybersecurity risk. I want to empower due diligence teams with a thorough and comprehensive reference resource – no matter how complex and dynamic the merger, acquisition, partnership, vendor relationship or other contemplated business combination and collaboration.

©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.