Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 17 of 17 matches in All Departments
Mama's away one night, and her son can't sleep. He tries to relax by counting stars, but the more of them he sees, the more determined he is to count every single one. Then the boy finds that Daddy can't sleep either. Together, the two of them set off on an unforgettable all-night journey of discovery.
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.
Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S.E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately, humans generate software security. People collectively act through a particular and distinct set of methodologies, processes, and technologies that the authors have brought together into a newly designed, holistic, generic software development lifecycle facilitating software security at Agile, DevOps speed. —Eric. S. Yuan, Founder and CEO, Zoom Video Communications, Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. —Jennifer Sunshine Steffens, CEO of IOActive Both practical and strategic, Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical, but deeply human elements of agile ways of working. —Jorgen Hesselberg, author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. —George K Tsantes, CEO of Cyberphos, former partner at Accenture and Principal at EY Detailing the people, processes, and technical aspects of software security, Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed, managed, and exploited by humans. This book presents a step-by-step process for software security that uses today’s technology, operational, business, and development methods with a focus on best practice, proven activities, processes, tools, and metrics for any size or type of organization and development practice.
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.
"... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."-Dr. Dena Haritos Tsamitis. Carnegie Mellon University"... a must read for security specialists, software developers and software engineers. ... should be part of every security professional's library." -Dr. Larry Ponemon, Ponemon Institute"... the definitive how-to guide for software security professionals. Dr. Ransome, Anmol Misra, and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process. ...A must-have for anyone on the front lines of the Cyber War ..." -Cedric Leighton, Colonel, USAF (Ret.), Cedric Leighton Associates"Dr. Ransome, Anmol Misra, and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source! "-Eric S. Yuan, Zoom Video CommunicationsThere is much publicity regarding network security, but the real cyber Achilles' heel is insecure software. Millions of software vulnerabilities create a cyber house of cards, in which we conduct our digital lives. In response, security people build ever more elaborate cyber fortresses to protect this vulnerable software. Despite their efforts, cyber fortifications consistently fail to protect our digital treasures. Why? The security industry has failed to engage fully with the creative, innovative people who write software. Core Software Security expounds developer-centric software security, a holistic process to engage creativity for security. As long as software is developed by humans, it requires the human element to fix it. Developer-centric security is not only feasible but also cost effective and operationally relevant. The methodology builds security into software development, which lies at the heart of our cyber infrastructure. Whatever development method is employed, software must be secured at the source. Book Highlights: Supplies a practitioner's view of the SDL Considers Agile as a security enabler Covers the privacy elements in an SDL Outlines a holistic business-savvy SDL framework that includes people, process, and technology Highlights the key success factors, deliverables, and metrics for each phase of the SDL Examines cost efficiencies, optimized performance, and organizational structure of a developer-centric software security program and PSIRT Includes a chapter by noted security architect Brook Schoenfield who shares his insights and experiences in applying the book's SDL framework View the authors' website at http://www.androidinsecurity.com/
Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S.E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately, humans generate software security. People collectively act through a particular and distinct set of methodologies, processes, and technologies that the authors have brought together into a newly designed, holistic, generic software development lifecycle facilitating software security at Agile, DevOps speed. -Eric. S. Yuan, Founder and CEO, Zoom Video Communications, Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. -Jennifer Sunshine Steffens, CEO of IOActive Both practical and strategic, Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical, but deeply human elements of agile ways of working. -Jorgen Hesselberg, author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. -George K Tsantes, CEO of Cyberphos, former partner at Accenture and Principal at EY Detailing the people, processes, and technical aspects of software security, Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed, managed, and exploited by humans. This book presents a step-by-step process for software security that uses today's technology, operational, business, and development methods with a focus on best practice, proven activities, processes, tools, and metrics for any size or type of organization and development practice.
James Ransome's glorious art celebrates jazz icon Sonny Rollins and how he found an inspired spot to practice his saxophone when his neighbors complained. Sonny Rollins loved his saxophone. As a teenager, he was already playing with jazz stars and making a name for himself. But in 1959, at age twenty-nine, he took a break from performing-to work on being a better, not just famous, musician. Practicing in a city apartment didn't please the neighbors, so Sonny found a surprising alternative-the Williamsburg Bridge. There, with his head in the clouds and foghorns for company, Sonny could play to his heart's content and perfect his craft. It was a bold choice, for a bold young man and musician. Sonny's passion for music comes alive in jazzy text and vivid, evocative paintings of New York City. His story celebrates striving to be your very best self, an inspiration to music lovers young and old.
When a little girl in South Carolina finds a rope under a tree one summer, she has no idea it will become part of her family's history. But for three generations, that very rope is passed down, used for everything from jump rope games to tying suitcases onto a car for the big move north to New York City - and even for a family reunion, where that first little girl is now a grandmother. This rope, a simple but beloved possession, frames the family's story as we follow them on their journey north during the time of the Great Migration, when millions of African American families relocated from the rural South.
God spoke in my heart a new name which fits me like a new dress made just for me. . . . I think with a name like Sojourner Truth a body has some respect at last. Here is the celebrated story of how former slave Isabella Baumfree transformed herself into the preacher and orator Sojourner Truth, one of the most inspiring and important figures of the abolitionist and women's rights movements. Written in the fiery and eloquent voice of Sojourner Truth herself, this moving portrait will captivate readers just as Sojourner's words enthralled her listeners. Award-winning author Ann Turner and Coretta Scott King Award-winning illustrator James Ransome have created a poignant tribute to this champion of civil rights and equality for all. Brave, determined, and deeply spiritual, Sojourner Truth and her legacy are a continuing source of inspiration for generations to come.
Sarah Jean's Uncle Jed was the only black barber in the county. He had a kind heart and a warm smile. And he had a dream. Living in the segregated South of the 1920's, where most people were sharecroppers. Uncle Jed had to travel all over the county to cut his customers' hair. He lived for the day when he could open his very own barbershop. But it was a long time, and many setbacks, from five-year-old Sarah Jean's emergency operation to the bank failures of the Great Depression, before the joyful day when Uncle Jed opened his shiny new shop -- and twirled a now grown-up Sarah Jean around in the barber chair. With James Ransome's richly colored paintings brimming with life, this is a stirring story of dreams long deferred and finally realized.
Sunday afternoons are special for Sarah and Susan because that's when they visit Aunt Flossie -- she has a memorable collection of hats, each with a special story.
First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats. -Dr. Dena Haritos Tsamitis. Carnegie Mellon University In the wake of cloud computing and mobile apps, the issue of software security has never been more important than today. This book is a must read for security specialists, software developers and software engineers. The authors do a brilliant job providing common sense approaches to achieving a strong software security posture and should be part of every security professional's library. -Dr. Larry Ponemon, Ponemon Institute Finally, the definitive how-to guide for software security professionals. Dr. Ransome, Anmol Misra, and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process.In an age of ubiquitous malware, this volume shows how inadequate traditional network security models are and why security needs to be software and developer-centric if it is to be relevant. A must-have for anyone on the front lines of the Cyber War - especially software developers and those who work with them. -Cedric Leighton, Colonel, USAF (Ret.), Cedric Leighton Associates When it comes to software security, people usually think that the solution is to hire a security expert to help you fix a security issue or a hacker to identify vulnerabilities in the software. This is typically a stop gap and workaround. Neither of these addresses the root cause of software security. At its root, the cause lies within the source code developed by software developers. Therefore, security should be developer-centric, focused on the secure development of the source code. Dr. Ransome, Anmol Misra, and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source -Eric S. Yuan.Zoom Video Communications About the Book: There is much publicity regarding network security, but the real cyber Achilles' heel is insecure software. Millions of software vulnerabilities create a cyber house of cards, in which we conduct our digital lives. In response, security people build ever more elaborate cyber fortresses to protect this vulnerable software. Despite their efforts, cyber fortifications consistently fail to protect our digital treasures. Why? The security industry has failed to engage fully with the creative, innovative people who write software. Core Software Security expounds developer-centric software security, a holistic process to engage creativity for security. As long as software is developed by humans, it requires the human element to fix it. Developer-centric security is not only feasible but also cost effective and operationally relevant. The methodology builds security into software development, which lies at the heart of our cyber infrastructure. Whatever development method is employed, software must be secured at the source.Book Highlights: Supplies a practitioner's view of the SDL Considers Agile as a security enabler Covers the privacy elements in an SDL Outlines a holistic business-savvy SDL framework that includes people, process, and technology Highlights the key success factors, deliverables, and metrics for each phase of the SDL Examines cost efficiencies, optimized performance, and organizational structure of a developer-centric software security program and PSIRT Includes a chapter by noted security architect Brook Schoenfield who shares his insights and experiences in applying the book's SDL framework
Finding sustainability for pastoral presence in corporate for-profit healthcare can be a challenge for pastoral care directors. In the midst of corporate acquistions, mid-level managers often become the stabilizing element for staff as corporate shuffling takes place. In this book, many culture challenges stemming from corporate acquisitions have been addressed and solutions explored as the author shares his extensive experience setting the sails of sustainability for pastoral care and presence in corporate run healtchare.This book is a must read for corporate or not-for-profit hospital CEO's, COO's, CNO's, ECO's, Director's of Pastoral Care, staff Chaplains, mid-level health care managers and hospital employees.
Illus. in full color. As a seamstress in the Big House, Clara dreams of a reunion with her Momma, who lives on another plantation--and even of running away to freedom. Then she overhears two slaves talking about the Underground Railroad. In a flash of inspiration, Clara sees how she can use the cloth in her scrap bag to make a map of the land--a freedom quilt--that no master will ever suspect.
|
You may like...
Israel and the Nations - The History of…
Frederick Fyvie Bruce
Paperback
|