|
|
Managing the Matrix. The Secret to Surviving and Thriving in Your Organization
Автор: Dawn Metcalfe
Год издания:
A comprehensive guide to excelling in a complex matrix organization Debra was not in a good mood as she entered Johann’s office for their third meeting. One of her colleagues had just been promoted and, although the guy who got it was good, she didn’t think he was any better than her. Well, except at one thing, he was always playing politics – sucking up to the more senior guys and volunteering to be on any committee going. Debra knew the type – went to the same school, belonged to the same club – she didn’t have a hope against the kind of connections he had so she might as well give up. It seemed doing a good job just wasn’t enough around here. Debra and Johann work in an environment with multiple and complex reporting lines – in other words, a matrix. There’s room to “slip between the cracks” – if a person wants to take advantage of confusion over who is managing performance; or if they can’t make the necessary transition to self-management. Communication can be difficult even when there is an apparently shared language. Read how Johann and Debra work together to identify the skills needed to succeed in a matrix, and how using Emotional Intelligence (EI) can develop specific behaviours you can incorporate in your daily job. The result will help reduce stress and increase your chances of success. Dawn Metcalfe, Managing Director of PDS, based in Dubai, uses her experience as a coach and trainer to give us a behind the curtain look at how mentoring can help an individual develop the skills they need to survive and thrive in today’s complex work environments.
Cyber Threat!. How to Manage the Growing Risk of Cyber Attacks
Автор: MacDonnell Ulsch
Год издания:
Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information. Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include: The information at risk The true extent of the threat The potential consequences across sectors The multifaceted approach to defense The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe.
Attacks on the Press. The New Face of Censorship
Автор: Committee to Protect Journalists
Год издания:
The latest, definitive assessment of the state of free press around the world Attacks on the Press is a comprehensive, annual account of press conditions worldwide, focusing this year on the new face of censorship perpetrated by governments and non-state actors. Compiled by the Committee to Protect Journalists (CPJ), the 2017 edition documents new dangers and threats to journalists and to the free and independent media. The risks are a combination of familiar censorship tactics applied in novel ways, and the exertion of pressure through unconventional means or at unprecedented levels. These censorship efforts range from withholding advertising to online trolling, website blocking to physical harassment, imprisonment to the murder of journalists. In the Americas, governments and non-state actors use new, sometimes subtle ways to limit journalists' ability to investigate wrongdoing. In Europe, authorities deploy intelligence services to intimidate the press in the name of national security. In Asia, governments block access to information online, and in some cases, punish those who manage to get around the obstacles. And throughout the world, terror groups are using the threat of targeted murder to compel journalists to refrain from covering crucial stories or otherwise self-censor. Attacks on the Press documents how these new forms of censorship are perpetrated and provides journalists with guidance on how to work around them, when possible, and how to ensure their own safety as well as the safety of their sources and people with whom they work. The book enables readers to: Examine the state of free media around the world Learn which nations violate press freedom with impunity Discover the most dangerous beats and regions Delve inside specific, increasingly complex challenges CPJ's mission is to defend the rights of journalists to report the news without fear of reprisal. Attacks on the Press provides a platform for direct advocacy with governments and the diplomatic community, for giving voice to journalists globally, and for ensuring that those journalists have a seat in discussions at the United Nations, the Organization of American States, the European Union, the African Union, and others.
Wireshark for Security Professionals. Using Wireshark and the Metasploit Framework
Автор: Jessey Bullock
Год издания:
Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark’s features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book’s final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: Master the basics of Wireshark Explore the virtual w4sp-lab environment that mimics a real-world network Gain experience using the Debian-based Kali OS among other systems Understand the technical details behind network attacks Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark.
Чтобы скачать книгу, отключите блокировку рекламы. Спасибо!