• Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy

    Longlisted for the National Book AwardNew York Times BestsellerA former Wall Street quant sounds an alarm on the mathematical models that pervade modern life — and threaten to rip apart our social fabricWe live in the age of the algorithm. Increasingly, the decisions that affect our lives—where we go to school, whether we get a car loan, how much we pay for health insurance—are being made not by humans, but by mathematical models. In theory, this should lead to greater fairness: Everyone is judged according to the same rules, and bias is eliminated.But as Cathy O’Neil reveals in this ... [Read More]

    • ASIN: 0553418831
    • ASIN: 0553418831
    • ISBN: 0553418831
    • Brand: Broadway Books
    • Manufacturer: Broadway Books

  • Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It


    • ASIN: B00N6PCZMC
    • ASIN: B00N6PCZMC
    • Manufacturer: Anchor

  • Hacking: The Art of Exploitation, 2nd Edition

    Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacke... [Read More]

    • ASIN: 1593271441
    • UPC: 884870524442
    • ASIN: 1593271441
    • ISBN: 1593271441
    • Brand: imusti
    • Manufacturer: No Starch Press

  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response

    Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an ... [Read More]

    • ASIN: 1593275099
    • ASIN: 1593275099
    • ISBN: 1593275099
    • Brand: Brand: No Starch Press
    • Manufacturer: No Starch Press

  • Writing Secure Code, Second Edition (Developer Best Practices)

    Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes u... [Read More]

    • ASIN: 0735617228
    • UPC: 790145172280
    • ASIN: 0735617228
    • ISBN: 0735617228
    • Brand: Microsoft
    • Manufacturer: Microsoft Press

  • CEH Certified Ethical Hacker Bundle, Third Edition (All-in-One)

    Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guide This thoroughly updated, money-saving self-study set gathers essential exam-focused resources to use in preparation for the latest Certified Ethical Hacker exam. CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, provides an in-depth review that covers 100% of the exam’s objectives. CEH Certified Ethical Hacker Practice Exams, Third Edition, tests and reinforces this coverage with 500+ realistic practice questions. The CEH Certifi... [Read More]

    • ASIN: B01MR371M4
    • ASIN: B01MR371M4
    • Manufacturer: McGraw-Hill Education

  • What Stays in Vegas: The World of Personal Data-Lifeblood of Big Business-and the End of Privacy as We Know It

    The greatest threat to privacy today is not the NSA, but good-old American companies. Internet giants, leading retailers, and other firms are voraciously gathering data with little oversight from anyone.In Las Vegas, no company knows the value of data better than Caesars Entertainment. Many thousands of enthusiastic clients pour through the ever-open doors of their casinos. The secret to the company's success lies in their one unrivaled asset: they know their clients intimately by tracking the activities of the overwhelming majority of gamblers. They know exactly what games they like to play, ... [Read More]

    • ASIN: B00JNYDHVS
    • ASIN: B00JNYDHVS
    • Manufacturer: PublicAffairs

  • How HIPAA Can Crush Your Medical Practice: HIPAA Compliance Kit & Manual For 2019: Why Most Medical Practices Don't Have A Clue About Cybersecurity or HIPAA And What To Do About It

    How can you protect yourself against an enemy hacker that you can’t see? How can you meet the online privacy regulations of a HIPAA security policy you aren’t aware of? Buy "How HIPAA Can Crush Your Medical Practice" Today and Get 1-Year of HIPAA Security Awareness Training. Details at https://petronellatech.com/hipaa/If you are involved in the medical industry, you know that today’s technology often complicates patient-record confidentiality and privacy. You also know that security, privacy and regulations meant to protect patient records, like the Health Insurance Portability and Affor... [Read More]

    • ASIN: B01K54IXRC
    • ASIN: B01K54IXRC
    • Manufacturer: Craig A. Petronella

  • Threat Modeling: Designing for Security

    The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs aga... [Read More]

    • ASIN: 1118809998
    • UPC: 001118809998
    • ASIN: 1118809998
    • ISBN: 1118809998
    • Brand: imusti
    • Manufacturer: Wiley

  • Python Machine Learning Illustrated Guide For Beginners & Intermediates: The Future Is Here!

    ☆★☆Python Machine Learning Illustrated Guide For Beginners & Intermediates☆★☆ Machines Can Learn ?! Automation and systematization is taking over the world. Slowly but surely we continuously see the rapid expansion of artificial intelligence, self-check out cash registers, automated phone lines, people-less car-washes , etc. The world is changing, find out how python programming ties into machine learning so you don't miss out on this next big trend. This is your beginner's step by step guide with illustrated pictures! Let's face it, machine learning is here to stay for the fo... [Read More]

    • ASIN: B07G1V5792
    • ASIN: B07G1V5792

  • Information Security: Principles and Practices (2nd Edition) (Certification/Training)

    Information Security: Principles and Practices, Second Edition Everything You Need to Know About Modern Computer Security, in One Book Clearly explains all facets of information security in all 10 domains of the latest Information Security Common Body of Knowledge [(ISC)² CBK]. Thoroughly updated for today’s challenges, technologies, procedures, and best practices. The perfect resource for anyone pursuing an IT security career.   Fully updated for the newest technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains o... [Read More]

    • ASIN: 0789753251
    • ASIN: 0789753251
    • ISBN: 0789753251
    • Brand: Pearson IT Certification
    • Manufacturer: Pearson IT Certification

  • Think Bigger: Developing a Successful Big Data Strategy for Your Business

    Big data--the enormous amount of data that is created as virtually every movement, transaction, and choice we make becomes digitized--is revolutionizing business. Offering real-world insight and explanations, this book provides a roadmap for organizations looking to develop a profitable big data strategy...and reveals why it's not something they can leave to the I.T. department.Sharing best practices from companies that have implemented a big data strategy including Walmart, InterContinental Hotel Group, Walt Disney, and Shell, Think Bigger covers the most important big data trends affecting o... [Read More]

    • ASIN: B00HSUWM7Y
    • ASIN: B00HSUWM7Y
    • Manufacturer: AMACOM

  • Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

    Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. It explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive text for... [Read More]

    • ASIN: 1597496154
    • ASIN: 1597496154
    • ISBN: 1597496154
    • Brand: Syngress Publishing
    • Manufacturer: Syngress

  • HOW TO GET YOUR PRIVACY BACK

    Four Principles of Human Privacy1 Human Privacy is controlled by Technology, Law, and Social Contracts, but Human Social Contracts come first and rule.2 Unlike Poison, too little Technology or Law and uninformed Social Contracts, will kill you, but enough will save your life.3 Like Poison, the bad guys are always using more than enough Technology and Law, and confuse your Social Contracts, to kill you.Getting your Privacy back is the same problem as Getting your Lies back. Good lies protect your privacy, bad ones will kill you.How to Get your Privacy Back is a flight over the entire world of ... [Read More]

    • ASIN: B07CV2YSXS
    • ASIN: B07CV2YSXS
    • Manufacturer: Privust Publishing, LLC

  • Data Privacy Toolkit: best-practice templates, step-by-step work plans and maturity diagnostics

    The Toolkit contains the following practical and powerful enablers with new and updated Data Privacy specific requirements:Step 1 get your bearings resources: The quick edition of the Data Privacy Self Assessment book in PDF containing 49 requirements to perform a quickscan, get an overview and share with stakeholders, plus an example pre-filled Self-Assessment Excel Dashboard to get familiar with results generation. Step 2 set concrete goals resources: Featuring 700 new and updated case-based questions, organized into seven core areas of process design, this Self-Assessment will help you iden... [Read More]

    • ASIN: B077GDVQ12
    • UPC: 074528441379
    • ASIN: B077GDVQ12
    • Brand: The Art of Service
    • Manufacturer: The Art of Service

  • Detonate : Why - And How - Corporations Must Blow Up Best Practices (and Bring a Beginner's Mind) to Survive

    "This book explains how organizations built up bad habits, identifies which ones masquerade as "best practices," and suggests alternatives that can contribute to winning in the marketplace. With a focus on optimism and empowerment, it

    • UPC: 408349604

  • A Trainer's Guide to PowerPoint : Best Practices for Master Presenters

    A Trainer's Guide to PowerPoint: Best Practices for Master Presenters is Mike Parkinson's master class on the art of PowerPoint. Learn his award-winning PowerPoint process as he guides you through three phases of presentation development--discover,

    • UPC: 223507660

  • Implementing Diversity: Best Practices for Making Diversity Work in Your Organization

    This practical and provocative guide provides the strategies and tactics used by organizations committed to implementing diversity from the top down. Focusing on the necessity for a strategic change initiative, Loden discusses: how to position

    • UPC: 25455699

  • Building a World-Class Compliance Program : Best Practices and Strategies for Success

    Written by a long-standing practitioner in the field, this timely and critical work is your best source for understanding all the complex issues and requirements associated with corporate compliance. It provides clear guidance for those

    • UPC: 8041910

  • What Stays in Vegas : The World of Personal Data-Lifeblood of Big Business-and the End of Privacy as We Know It

    Looks at how Caesar's Entertainment in Las Vegas collects personal data and uses it to cater to their clients' every need, inspiring companies of all kinds to do likewise in order to grow their businesses

    • UPC: 37782652
    • Rating: 2.0

  • Consumer Privacy and Data Protection

    9781454897378

    • UPC: 751493114

  • Handbook for Strategic HR : Best Practices in Organization Development from the OD Network

    In recent years, a transformation has occurred within the role of human resources departments. HR professionals are being called upon to determine priorities, craft strategies, and shape the culture within the business. This comprehensive handbook

    • UPC: 20973946

  • Privacy and Big Data : The Players, Regulators, and Stakeholders

    "The players, regulators, and

    • UPC: 16645222
    • Rating: 5.0

  • The Million-Dollar Financial Advisor Team : Best Practices from Top Performing Teams

    David Mullen, Jr., whose financial advisor program at Merrill Lynch had a success rate twice the industry average, shows advisors how to effectively offer wealth and financial management services under one roof to better service

    • UPC: 829055553

  • Big Data in Practice - eBook

    The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data.Big data is on the tip of everyone's tongue. Everyone understands its power

    • UPC: 166858673
    • Rating: 5.0

  • Data Protection Impact Assessment: Best Practices

    8 Best Practices of Data Protection

    AWS re:Invent 2018: Data Protection Best Practices for AWS (DEM76)