Amazon Price: $55.00 $37.84 You save: $17.16 (31%). (as of September 20, 2017 10:13 –
A ground shaking exposé on the failure of popular cyber risk management methods
How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In their bestselling book How to Measure Anything, authors Douglas W. Hubbard and Richard Seiersen opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.
Continue reading “How to Measure Anything in Cybersecurity Risk”
Amazon Price: N/A (as of September 19, 2017 22:13 –
SHORTLISTED FOR THE 2015 FINANCIAL TIMES AND MCKINSEY BUSINESS BOOK OF THE YEAR
A New York Times technology and business reporter charts the dramatic rise of Bitcoin and the fascinating personalities who are striving to create a new global money for the Internet age.
Continue reading “Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money”
Amazon Price: $12.99 (as of September 20, 2017 05:20 –
Make money today on your own terms! Making money has never been more attainable than it is today. This book will show you five easy to start business ideas you can put into use immediately. These businesses do not require a great deal of up-front capital and can be started in only one weekend! Five business plans you can start now In this book, you will be presented with five opportunities, all laid out for you in an easy-to-read plan. Inside this book you will learn: 1. How to make money using your talents 2. How to make money using other people’s resources 3. How to obtain free money, some you don’t even have to pay back! 4. How to make money off stuff you don’t even own 5. How to capitalize on the latest trend in cyber-money The more effort you put into these new business ideas, the more you will earn. It’s that simple!
Amazon Price: N/A (as of September 20, 2017 14:22 –
With an emphasis on peer–produced content and collaboration, Wikipedia exemplifies a departure from traditional management and organizational models. This iconic "project" has been variously characterized as a hive mind and an information revolution, attracting millions of new users even as it has been denigrated as anarchic and plagued by misinformation. Have Wikipedia's structure and inner workings promoted its astonishing growth and enduring public relevance?
In Common Knowledge?, Dariusz Jemielniak draws on his academic expertise and years of active participation within the Wikipedia community to take readers inside the site, illuminating how it functions and deconstructing its distinctive organization. Against a backdrop of misconceptions about its governance, authenticity, and accessibility, Jemielniak delivers the first ethnography of Wikipedia, revealing that it is not entirely at the mercy of the public: instead, it balances open access and power with a unique bureaucracy that takes a page from traditional organizational forms. Along the way, Jemielniak incorporates fascinating cases that highlight the tug of war among the participants as they forge ahead in this pioneering environment.
Amazon Price: $84.95 $24.95 You save: $60.00 (71%). (as of September 20, 2017 08:36 –
"Managerial Guide for Handling Cyber-Terrorism and Information Warfare" presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. "Managerial Guide for Handling Cyber-Terrorism and Information Warfare" defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.