Disruptive Marketing: What Growth Hackers, Data Punks, and Other Hybrid Thinkers Can Teach Us About Navigating the New Normal

Rating: 
Amazon Price: $24.95 $6.73 You save: $18.22 (73%). (as of April 18, 2018 18:21 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Selected by Oracle Marketing Cloud as a Top 15 Marketing Book for 2016 Are you still marketing like it's 2006? Now that 75 percent of screen time is spent on connected devices, digital strategies have moved front and center of most marketing plans. But what if that's not enough? What if most people ignore company messages? What if consumer engagement never goes further than the "like" button? A sobering reality is hitting marketers. Technology hasn't just reshaped mass media, it's altering behavior as well. And getting through to customers will take some radical rethinking. First step is to toss the linear plan. Next is to strip away conventions, open your mind, and join Disruptive Marketing on a provocative, fast-paced tour of our changing world . . . – Where selling is dead, but ongoing conversation thrives – Where consumers generate the best content about brands – Where people tune out noise and listen to feelings – Where curiosity leads the marketing team – Where growth depends on merging analytics with boundless creativity Packed with trends, predictions, interviews with big-think marketers, and stories from a career spent pushing boundaries, this book will propel you out of your comfort zone and into the disruptive mindset you need for future success.

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector ThreatsCybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed “Subversive Multi-Vector Threats” or ‘SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace.

  • Includes detailed analysis and examples of the threats in addition to related anecdotal information
  • Authors' combined backgrounds of security, military, and intelligence, give you distinct and timely insights
  • Presents never-before-published information: identification and analysis of cybercrime and the psychological profiles that accompany them

Price: $59.95

Click here to buy from Amazon

Hacking Exposed 7: Network Security Secrets and Solutions

Rating: 
Amazon Price: N/A (as of April 18, 2018 08:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” –Brett Wahlin, CSO, Sony Network Entertainment
Continue reading “Hacking Exposed 7: Network Security Secrets and Solutions”

The New Cyberwar: Technology and the Redefinition of Warfare

Rating: 
Amazon Price: N/A (as of April 19, 2018 03:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Carl Von Clausewitz described the purpose of war as "the compulsory submission of the enemy to our will." Unlike conventional military conflicts of the past, war in the information age is more a battle of wills than artillery, and doesn't necessarily end with decisive conclusions or clear winners. Cyber warfare between nations is conducted not only without the consent or participation of citizens but often without their knowledge, with little to see in the way of airstrikes and troop movements.
The weapons are information systems, intelligence, propaganda and the media. The combatants are governments, multinational corporations, hackers and whistleblowers. The battlefields are economies, command and control networks, election outcomes and the hearts and minds of populations. As with Russia's bloodless 2014 annexation of the Crimea, the cyberwar is fought before the infantry arrives. Written by a United States intelligence community insider, this book describes the covert aspects of modern wars and the agencies who fund and fight them.

The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests

Rating: 
Amazon Price: $29.95 $28.61 You save: $1.34 (4%). (as of April 19, 2018 01:43 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book is about a cyberwar with China. This new type of war, says the author, is China's effort at bending another country's will to its own. It is clever, broadly applied, successful, and aimed directly at the United States. This war is neither conventional nor accidental. The U.S. military is at a disadvantage because it is part of a system of government that is democratic, decentralized and mostly separated from American businesses. This system has served the country well but is not a path that China sees as worth following. This book is not a "how to" book of strategies that might be developed to fight a cyberwar. It is a way to grasp and categorize what the Chinese are already doing, to make sense of it. Until the U.S. sees itself as in a war, it cannot begin to effectively prosecute it.