You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise’s computer systems and IT networks. To prevail, an en...
Scott Donaldson, Stanley Siegel and Gary Donaldson interview many of the world's most influential chief technology officers in CTOs at Work, offering a brand-new companion volume to the highly acclaimed elite At Work books including Coders at Work, CIOS at Work and Venture Capitalists at Work. As the words “at work” suggest, the authors focus on how their interviewees tackle the day-to-day work of the CTO while revealing much more: how they got there, how they manage and allocate projects, and how they interact with business units and ensure that their companies take advantage of technologies, teamwork, and software development practices to respond to organizational needs and improve emp...
With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go. This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim: The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.
POSITIVE ORGANIZATIONAL PSYCHOLOGY INTERVENTIONS DISCOVER THE LATEST ADVANCEMENTS IN THE FIELD OF POSITIVE ORGANIZATIONAL PSYCHOLOGY Positive Organizational Psychology Interventions: Design and Evaluation delivers a concise description and synthesis of positive organizational psychology theory, empirical research, and evidence-based applications. Based on a thorough review of the peer-reviewed literature by the accomplished and distinguished editors, the book offers readers an encapsulation of the growth of the field and the latest state-of-the-art theory and research-driven interventions in this emerging area. You’ll discover the breadth and depth of the field of positive organizational p...
“A biography of great immediacy. . . . There are many sections of great poignancy, many funny things, many of electric intimacy and candor . . . there is spellbinding power, never more so than in describing Cheever’s death, pages that are both terrible and deeply moving; one is losing an old, beloved friend.” —James Salter, Los Angeles Times Book Review “John Cheever: A Biography is clearly an indispensable book. Donaldson moves gracefully from the personal to the literary. . . . Solidly researched and entirely readable, admiring of the writer and knowing about the man. Stuffed with fascinating anecdotes. It’s a gut-wrenching story. Donaldson tells it straight, without embellishm...
Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity pers...
The objective of APM Best Practices: Realizing Application Performance Management is to establish reliable application performance management (APM) practices—to demonstrate value, to do it quickly, and to adapt to the client circumstances. It's important to balance long-term goals with short-term deliverables, but without compromising usefulness or correctness. The successful strategy is to establish a few reasonable goals, achieve them quickly, and then iterate over the same topics two more times, with each successive iteration expanding the skills and capabilities of the APM team. This strategy is referred to as “Good, Better, Best”. The application performance monitoring marketplace...
New technology in vehicles is transforming the way people move around as well as what they do in their vehicles. How does one communicate with an in-car speech system and how does this vary by language or cultural community? This book explores this process by focusing on the communication practices that people engage in when using their in-car systems and when talking about their vehicles with co-passengers. Chapters present a robust theory and methodology for studying communication in cars, how tasks are begun and ended, how people switch between tasks, how non-task talk appears, what ways and styles of communication drivers prefer, and how they expect the system voice to respond, among other things. Particular attention is given to cultural preferences as they are evident in this communication; these preferences are found to ground various trajectories in the use and meaning of in-car communication practices. The book explores these matters with a focus on the United States and Mainland China. Implications are drawn for the design and utilization of in-car communication systems.
The best of Edwin Arlington Robinson's poetry rings with a lyrical and emotional purity and singularity that should assure his place as one of the treasured poets of his generation ... Scott Donaldson's book should help to revive appreciation for this solitary figure and the unique resonance of his work. --W.S. Merwin.
F. Scott Fitzgerald and Ernest Hemingway might have been contemporaries, but our understanding of their work often rests on simple differences. Hemingway wrestled with war, fraternity, and the violence of nature. Fitzgerald satirized money and class and the never-ending pursuit of a material tomorrow. Through the provocative arguments of Scott Donaldson, however, the affinities between these two authors become brilliantly clear. The result is a reorientation of how we read twentieth-century American literature. Known for his penetrating studies of Fitzgerald and Hemingway, Donaldson traces the creative genius of these authors and the surprising overlaps among their works. Fitzgerald and Hemi...