Author: Bill Jensen
Publisher: Penguin
ISBN: 1101443499
Category : Business & Economics
Languages : en
Pages : 257
Book Description
Why work harder than you have to? One manager kept his senior execs happy by secretly hacking into the company's database to give them the reports they needed in one third of the time. Hacking is a powerful solution to every stupid procedure, tool, rule, and process we are forced to endure at the office. Benevolent hackers are saving business from itself. It would be so much easier to do great work if not for lingering bureaucracies, outdated technologies, and deeply irrational rules and procedures. These things are killing us. Frustrating? Hell, yes. But take heart-there's an army of heroes coming to the rescue. Today's top performers are taking matters into their own hands: bypassing sacred structures, using forbidden tools, and ignoring silly corporate edicts. In other words, they are hacking work to increase their efficiency and job satisfaction. Consultant Bill Jensen teamed up with hacker Josh Klein to expose the cheat codes that enable people to work smarter instead of harder. Once employees learn how to hack their work, they accomplish more in less time. They cut through red tape and circumvent stupid rules. For instance, Elizabeth's bosses wouldn't sign off on her plan to improve customer service. So she made videotapes of customers complaining about what needed fixing and posted them on YouTube. Within days, public outcry forced senior management to reverse its decision. Hacking Work reveals powerful technological and social hacks and shows readers how to apply them to sidestep bureaucratic boundaries and busywork. It's about making the system work for you, not the other way around, so you can take control of your workload, increase your productivity, and help your company succeed-in spite of itself.
Hacking Work
Author: Bill Jensen
Publisher: Penguin
ISBN: 1101443499
Category : Business & Economics
Languages : en
Pages : 257
Book Description
Why work harder than you have to? One manager kept his senior execs happy by secretly hacking into the company's database to give them the reports they needed in one third of the time. Hacking is a powerful solution to every stupid procedure, tool, rule, and process we are forced to endure at the office. Benevolent hackers are saving business from itself. It would be so much easier to do great work if not for lingering bureaucracies, outdated technologies, and deeply irrational rules and procedures. These things are killing us. Frustrating? Hell, yes. But take heart-there's an army of heroes coming to the rescue. Today's top performers are taking matters into their own hands: bypassing sacred structures, using forbidden tools, and ignoring silly corporate edicts. In other words, they are hacking work to increase their efficiency and job satisfaction. Consultant Bill Jensen teamed up with hacker Josh Klein to expose the cheat codes that enable people to work smarter instead of harder. Once employees learn how to hack their work, they accomplish more in less time. They cut through red tape and circumvent stupid rules. For instance, Elizabeth's bosses wouldn't sign off on her plan to improve customer service. So she made videotapes of customers complaining about what needed fixing and posted them on YouTube. Within days, public outcry forced senior management to reverse its decision. Hacking Work reveals powerful technological and social hacks and shows readers how to apply them to sidestep bureaucratic boundaries and busywork. It's about making the system work for you, not the other way around, so you can take control of your workload, increase your productivity, and help your company succeed-in spite of itself.
Publisher: Penguin
ISBN: 1101443499
Category : Business & Economics
Languages : en
Pages : 257
Book Description
Why work harder than you have to? One manager kept his senior execs happy by secretly hacking into the company's database to give them the reports they needed in one third of the time. Hacking is a powerful solution to every stupid procedure, tool, rule, and process we are forced to endure at the office. Benevolent hackers are saving business from itself. It would be so much easier to do great work if not for lingering bureaucracies, outdated technologies, and deeply irrational rules and procedures. These things are killing us. Frustrating? Hell, yes. But take heart-there's an army of heroes coming to the rescue. Today's top performers are taking matters into their own hands: bypassing sacred structures, using forbidden tools, and ignoring silly corporate edicts. In other words, they are hacking work to increase their efficiency and job satisfaction. Consultant Bill Jensen teamed up with hacker Josh Klein to expose the cheat codes that enable people to work smarter instead of harder. Once employees learn how to hack their work, they accomplish more in less time. They cut through red tape and circumvent stupid rules. For instance, Elizabeth's bosses wouldn't sign off on her plan to improve customer service. So she made videotapes of customers complaining about what needed fixing and posted them on YouTube. Within days, public outcry forced senior management to reverse its decision. Hacking Work reveals powerful technological and social hacks and shows readers how to apply them to sidestep bureaucratic boundaries and busywork. It's about making the system work for you, not the other way around, so you can take control of your workload, increase your productivity, and help your company succeed-in spite of itself.
Hacking BlackBerry
Author: Glenn Bachmann
Publisher: John Wiley & Sons
ISBN:
Category : Computers
Languages : en
Pages : 320
Book Description
Provides information on getting the most ouf of a BlackBerry, covering such topics as searching the Web, playing games, connecting to a PC wirelessly, installing ringtones, and drawing sketches on the screen.
Publisher: John Wiley & Sons
ISBN:
Category : Computers
Languages : en
Pages : 320
Book Description
Provides information on getting the most ouf of a BlackBerry, covering such topics as searching the Web, playing games, connecting to a PC wirelessly, installing ringtones, and drawing sketches on the screen.
Corpselight
Author: Angela Slatter
Publisher: Jo Fletcher Books
ISBN: 1784294330
Category : Fiction
Languages : en
Pages : 375
Book Description
Watch out, Harry Dresden, Kinsey Milhone and Mercy Thompson: there's a new kick-ass guardian in town and Verity Fassbinder's taking no nonsense from anyone, not even the fox-spirit assassins who are invading Brisbane in this fast-paced sequel to VIGIL. Life in Brisbane is never simple for those who walk between the worlds. Verity's all about protecting her city, but right now that's mostly running surveillance and handling the less exciting cases for the Weyrd Council - after all, it's hard to chase the bad guys through the streets of Brisbane when you're really, really pregnant. 'Verity is the best thing about the book . . . she's a surly, straight-talking, Doc Marten-wearing punchbag who investigates Weyrd-related crime on behalf of the beleaguered "normal" police' (SFX) An insurance investigation sounds pretty harmless, even if it is for 'Unusual Happenstance'. That's not usually a clause Normals use - it covers all-purpose hauntings, angry genii loci, ectoplasmic home invasion, demonic possession, that sort of thing - but Susan Beckett's claimed three times in three months. Her house keeps getting inundated with mud, but she's still insisting she doesn't need or want help . . . until the dry-land drownings begin. V's first lead in takes her to Chinatown, where she is confronted by kitsune assassins. But when she suddenly goes into labour, it's clear the fox spirits are not going to be helpful. Corpselight, the sequel to Vigil, is the second book in the Verity Fassbinder series by award-winning author Angela Slatter. 'Simply put: Slatter can write! She forces us to recognise the monsters that are ourselves' Jack Dann, award-winning author.
Publisher: Jo Fletcher Books
ISBN: 1784294330
Category : Fiction
Languages : en
Pages : 375
Book Description
Watch out, Harry Dresden, Kinsey Milhone and Mercy Thompson: there's a new kick-ass guardian in town and Verity Fassbinder's taking no nonsense from anyone, not even the fox-spirit assassins who are invading Brisbane in this fast-paced sequel to VIGIL. Life in Brisbane is never simple for those who walk between the worlds. Verity's all about protecting her city, but right now that's mostly running surveillance and handling the less exciting cases for the Weyrd Council - after all, it's hard to chase the bad guys through the streets of Brisbane when you're really, really pregnant. 'Verity is the best thing about the book . . . she's a surly, straight-talking, Doc Marten-wearing punchbag who investigates Weyrd-related crime on behalf of the beleaguered "normal" police' (SFX) An insurance investigation sounds pretty harmless, even if it is for 'Unusual Happenstance'. That's not usually a clause Normals use - it covers all-purpose hauntings, angry genii loci, ectoplasmic home invasion, demonic possession, that sort of thing - but Susan Beckett's claimed three times in three months. Her house keeps getting inundated with mud, but she's still insisting she doesn't need or want help . . . until the dry-land drownings begin. V's first lead in takes her to Chinatown, where she is confronted by kitsune assassins. But when she suddenly goes into labour, it's clear the fox spirits are not going to be helpful. Corpselight, the sequel to Vigil, is the second book in the Verity Fassbinder series by award-winning author Angela Slatter. 'Simply put: Slatter can write! She forces us to recognise the monsters that are ourselves' Jack Dann, award-winning author.
Ubuntu
Author: Neal Krawetz
Publisher: John Wiley and Sons
ISBN: 1118080386
Category : Computers
Languages : en
Pages : 515
Book Description
Tune, tweak, and change the popular Ubuntu Linux operating system! Ubuntu is a community developed, Linux-based operating system that is perfect for laptops, desktops, and servers, and is used by millions of people around the world. This book provides you with practical hacks and tips that are not readily available online, in FAQ files, or any other Ubuntu book on the market so that you can customize your Ubuntu system for your specific needs. Bridging the gap between introductory information and overly technical coverage, this unique resource presents complex hacks and ways to extend them. You'll feast on numerous tips, hints, and little-known secrets for getting the most out of your Ubuntu system. Coverage includes: Hacking the Installation Selecting a Distribution Selecting the Ubuntu Version The 10-Step Boot Configuration Booting Variations and Troubleshooting Tweaking the BusyBox Upgrading Issues with Ubuntu Configuring GRUB Customizing the User Environment Configuring Devices Adapting Input Devices Managing Software Communicating Online Collaborating Tuning Processes Multitasking Applications Locking Down Ubuntu Advanced Networking Enabling Services If you're a power user hungry for cutting-edge hacks to intensify your Ubuntu system, then this is the book for you! Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Publisher: John Wiley and Sons
ISBN: 1118080386
Category : Computers
Languages : en
Pages : 515
Book Description
Tune, tweak, and change the popular Ubuntu Linux operating system! Ubuntu is a community developed, Linux-based operating system that is perfect for laptops, desktops, and servers, and is used by millions of people around the world. This book provides you with practical hacks and tips that are not readily available online, in FAQ files, or any other Ubuntu book on the market so that you can customize your Ubuntu system for your specific needs. Bridging the gap between introductory information and overly technical coverage, this unique resource presents complex hacks and ways to extend them. You'll feast on numerous tips, hints, and little-known secrets for getting the most out of your Ubuntu system. Coverage includes: Hacking the Installation Selecting a Distribution Selecting the Ubuntu Version The 10-Step Boot Configuration Booting Variations and Troubleshooting Tweaking the BusyBox Upgrading Issues with Ubuntu Configuring GRUB Customizing the User Environment Configuring Devices Adapting Input Devices Managing Software Communicating Online Collaborating Tuning Processes Multitasking Applications Locking Down Ubuntu Advanced Networking Enabling Services If you're a power user hungry for cutting-edge hacks to intensify your Ubuntu system, then this is the book for you! Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Hacking Exposed Linux
Author: ISECOM
Publisher: McGraw Hill Professional
ISBN: 0071596429
Category : Computers
Languages : en
Pages : 650
Book Description
The Latest Linux Security Solutions This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. Secure Linux by using attacks and countermeasures from the latest OSSTMM research Follow attack techniques of PSTN, ISDN, and PSDN over Linux Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux Block Linux signal jamming, cloning, and eavesdropping attacks Apply Trusted Computing and cryptography tools for your best defense Fix vulnerabilities in DNS, SMTP, and Web 2.0 services Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits Find and repair errors in C code with static analysis and Hoare Logic
Publisher: McGraw Hill Professional
ISBN: 0071596429
Category : Computers
Languages : en
Pages : 650
Book Description
The Latest Linux Security Solutions This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. Secure Linux by using attacks and countermeasures from the latest OSSTMM research Follow attack techniques of PSTN, ISDN, and PSDN over Linux Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux Block Linux signal jamming, cloning, and eavesdropping attacks Apply Trusted Computing and cryptography tools for your best defense Fix vulnerabilities in DNS, SMTP, and Web 2.0 services Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits Find and repair errors in C code with static analysis and Hoare Logic
Beyond Contempt
Author: Peter Jukes
Publisher: Canbury Press
ISBN: 0993040713
Category : Political Science
Languages : en
Pages : 257
Book Description
A factual account of the trial of Rupert Murdoch's newspaper journalists for phone hacking, corruption of officials, and conspiracy to pervert the course of justice. His favourite executive, Rebekah Brooks, editor of the News of the World and The Sun, was acquitted and her friend and colleague Andy Coulson jailed. This book covers every twist and turn of the case, which took place at the Old Bailey in London in 2013 and 2014. It includes a list of the charges, defendants and their counsel and previously unreported material.
Publisher: Canbury Press
ISBN: 0993040713
Category : Political Science
Languages : en
Pages : 257
Book Description
A factual account of the trial of Rupert Murdoch's newspaper journalists for phone hacking, corruption of officials, and conspiracy to pervert the course of justice. His favourite executive, Rebekah Brooks, editor of the News of the World and The Sun, was acquitted and her friend and colleague Andy Coulson jailed. This book covers every twist and turn of the case, which took place at the Old Bailey in London in 2013 and 2014. It includes a list of the charges, defendants and their counsel and previously unreported material.
Fraudulent Intention$
Author: Scott Hilsen
Publisher: AuthorHouse
ISBN: 1456737058
Category : Law
Languages : en
Pages : 363
Book Description
Based on the true story of a corporate deal gone bad and the internal investigation that exposed a shocking online fraud. For SouthPoint Bank, its purchase of Internet Connections, or ICon, was a risky way to boost its stock price, and the deal was rushed so that the Chairman of SouthPoint could stay in power. For ICon, being acquired by SouthPoint was its last chance to cash in on the Internet boom, but the President of ICon was looking for more than money he needed a way to escape a secret that ICon had been concealing through a conspiracy of fraud. After an insiders tip, SouthPoint launched a surprise internal investigation of ICon. When the investigators found a connection between ICon and the Russian Mafia, the investigation suddenly turned into a dangerous race against the clock to expose the fraud and to save SouthPoint from financial ruin. From Andorra in the Pyrenees Mountains to Antigua in the Caribbean Sea, Fraudulent Intention$ twists and turns around the shadowy world of online adult entertainment.
Publisher: AuthorHouse
ISBN: 1456737058
Category : Law
Languages : en
Pages : 363
Book Description
Based on the true story of a corporate deal gone bad and the internal investigation that exposed a shocking online fraud. For SouthPoint Bank, its purchase of Internet Connections, or ICon, was a risky way to boost its stock price, and the deal was rushed so that the Chairman of SouthPoint could stay in power. For ICon, being acquired by SouthPoint was its last chance to cash in on the Internet boom, but the President of ICon was looking for more than money he needed a way to escape a secret that ICon had been concealing through a conspiracy of fraud. After an insiders tip, SouthPoint launched a surprise internal investigation of ICon. When the investigators found a connection between ICon and the Russian Mafia, the investigation suddenly turned into a dangerous race against the clock to expose the fraud and to save SouthPoint from financial ruin. From Andorra in the Pyrenees Mountains to Antigua in the Caribbean Sea, Fraudulent Intention$ twists and turns around the shadowy world of online adult entertainment.
Boo to Billable Hours
Author: John Derrick
Publisher:
ISBN: 9780979777806
Category : Lawyers
Languages : en
Pages : 151
Book Description
Publisher:
ISBN: 9780979777806
Category : Lawyers
Languages : en
Pages : 151
Book Description
Hardwired
Author: Sally Chapman
Publisher: Worldwide Library
ISBN: 9780373262885
Category : Fiction
Languages : en
Pages : 308
Book Description
"Someone's hacking into NASA's computers-- and doing enough damage to threaten the upcoming shuttle mission ... the air of menace is tangible, as is the paranoia, fear and eerie whispers that the hacker is-- not of this world"--Note
Publisher: Worldwide Library
ISBN: 9780373262885
Category : Fiction
Languages : en
Pages : 308
Book Description
"Someone's hacking into NASA's computers-- and doing enough damage to threaten the upcoming shuttle mission ... the air of menace is tangible, as is the paranoia, fear and eerie whispers that the hacker is-- not of this world"--Note
No Shortcuts
Author: Max Smeets
Publisher: Oxford University Press
ISBN: 0197674526
Category : Political Science
Languages : en
Pages : 326
Book Description
Over the past decade, numerous states have declared cyberspace as a new domain of warfare, sought to develop a military cyber strategy and establish a cyber command. These developments have led to much policy talk and concern about the future of warfare as well as the digital vulnerability of society. No Shortcuts provides a level-headed view of where we are in the militarization of cyberspace. In this book, Max Smeets bridges the divide between technology and policy to assess the necessary building blocks for states to develop a military cyber capacity. Smeets argues that for many states, the barriers to entry into conflict in cyberspace are currently too high. Accompanied by a wide range of empirical examples, Smeets shows why governments abilities to develop military cyber capabilities might change over time and explains the limits of capability transfer by states and private actors.
Publisher: Oxford University Press
ISBN: 0197674526
Category : Political Science
Languages : en
Pages : 326
Book Description
Over the past decade, numerous states have declared cyberspace as a new domain of warfare, sought to develop a military cyber strategy and establish a cyber command. These developments have led to much policy talk and concern about the future of warfare as well as the digital vulnerability of society. No Shortcuts provides a level-headed view of where we are in the militarization of cyberspace. In this book, Max Smeets bridges the divide between technology and policy to assess the necessary building blocks for states to develop a military cyber capacity. Smeets argues that for many states, the barriers to entry into conflict in cyberspace are currently too high. Accompanied by a wide range of empirical examples, Smeets shows why governments abilities to develop military cyber capabilities might change over time and explains the limits of capability transfer by states and private actors.