|
Showing 1 - 11 of
11 matches in All Departments
In his new book H3 LEADERSHIP: Be Humble. Stay Hungry. Always
Hustle., Brad Lomenick shares his hard-earned insights from more
than two decades of work alongside thought-leaders such as Jim
Collins and Malcom Gladwell, Fortune 500 CEOs and start-up
entrepreneurs. He categorizes 20 essential leadership habits
organized into three distinct filters he calls "the 3 Hs": Humble
(Who am I?), Hungry (Where do I want to go?) and Hustle (How will I
get there?). These powerful words describe the leader who is
willing to work hard, get it done, and make sure it's not about him
or her; the leader who knows that influence is about developing the
right habits for success. Lomenick provides a simple but effective
guide on how to lead well in whatever capacity the reader may be
in.
Scripture's greatest stories and most compelling characters come to
life in this sweeping new novel by Roma Downey and Mark
Burnett.
Beginning with the creation of man and ending with the revelation
of a new world, readers will revel in this epic saga of warriors,
rebels, poets, and kings, all called upon by God to reveal His
enduring love for mankind. Ultimately, God's plan is fulfilled in
the story of Jesus the Messiah, whose life, death and resurrection
brings salvation to one and all.
A STORY OF GOD AND ALL OF US is a companion to "The Bible," the
epic ten-hour mini-series produced by the authors and televised
around the world.
In Midas Touch, Donald Trump and Robert Kiyosaki ask the question:
What's an entrepreneur's most important job? The answer: creating
high-quality, stable jobs. And in today's marketplace, "jobs" are
in high demand -- and so are the skills and the innovation and
vision of entrepreneurs. In a world of high unemployment and an
economy that needs new jobs to recover, who isn't hungry for a
solution, something that will speed economic recovery? Many look to
the government, but it's becoming more and more obvious that
governments can't create real jobs. Trump and Kiyosaki believe that
only one group can bring our world back to prosperity:
Entrepreneurs. And, especially, entrepreneurs with the Midas Touch.
This book is for people who are thinking of starting a business or
who already have one and want to grow it. Midas Touch teaches how
to leverage five key components that can impact success in
business: Strength of character F.O.C.U.S. Brand Relationships
Little things...that really count
The patterns we cultivate shape the person we each become. Be
Humble. Stay Hungry. Always Hustle. These powerful words describe
the leader who is willing to work hard, get it done, and make sure
it's not about him or her; the leader who knows that influence is
about developing the right habits for success. Brad Lomenick,
former president of Catalyst, shares his hard-earned insights from
more than two decades of work alongside thought-leaders such as Jim
Collins and Malcom Gladwell, Fortune 500 CEOs and start-up
entrepreneurs. Operating within the framework of three core
character qualities - humble, hungry, hustle - Lomenick identifies
20 essential leadership habits that help readers embody those
qualities, including: Staying open and sharing the real you with
others Owning your convictions and sticking to your principles
Developing an appetite for what's next Pursuing innovation by
staying current, creative, and engaged Demanding excellence by
setting standards that scare you Fostering collaboration with
colleagues and competitors Offering practical steps to embrace
these habits, H3 Leadership provides a simple but effective guide
on how to lead well in whatever capacity the reader may be in.
|
Wakefield Stories (Paperback)
John Casey; Photographs by Mark Burnett
|
R409
R334
Discovery Miles 3 340
Save R75 (18%)
|
Ships in 10 - 15 working days
|
User passwords are the keys to the network kingdom, yet most users
choose overly simplistic passwords (like password) that anyone
could guess, while system administrators demand impossible to
remember passwords littered with obscure characters and random
numerals.
Every computer user must face the problems of password security.
According to a recent British study, passwords are usually obvious:
around 50 percent of computer users select passwords based on names
of a family member, spouse, partner, or a pet. Many users face the
problem of selecting strong passwords that meet corporate security
requirements. Too often, systems reject user-selected passwords
because they are not long enough or otherwise do not meet
complexity requirements. This book teaches users how to select
passwords that always meet complexity requirements.
A typical computer user must remember dozens of passwords and they
are told to make them all unique and never write them down. For
most users, the solution is easy passwords that follow simple
patterns. This book teaches users how to select strong passwords
they can easily remember.
* Examines the password problem from the perspective of the
administrator trying to secure their network
* Author Mark Burnett has accumulated and analyzed over 1,000,000
user passwords and through his research has discovered what works,
what doesn't work, and how many people probably have dogs named
Spot
* Throughout the book, Burnett sprinkles interesting and humorous
password ranging from the Top 20 dog names to the number of
references to the King James Bible in passwords
HIGHLIGHT
Written by Microsoft's Log Parser developer, this is the first book
available on Microsoft's popular yet undocumented log parser tool.
The book and accompanying Web site contain hundreds of customized,
working scripts and templates that system administrators will find
invaluable for analyzing the log files from Windows Server, Snort
IDS, ISA Server, IIS Server, Exchange Server, and other products.
System administrators running Windows, Unix, and Linux networks
manage anywhere from 1 to thousands of operating systems (Windows,
Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and
hardware devices (firewalls, routers, etc.) that generate
incredibly long and detailed log files of all activity on the
particular application or device. This book will teach
administrators how to use Microsoft's Log Parser to data mine all
of the information available within these countless logs. The book
teaches readers how all queries within Log Parser work (for
example: a Log Parser query to an Exchange log may provide
information on the origin of spam, viruses, etc.). Also, Log Parser
is completely scriptable and customizable so the book and
accompanying Web site will provide the reader with hundreds of
original, working scripts that will automate these tasks and
provide formatted charts and reports detailing the results of the
queries.
* Written by Microsoft's sole developer of Log Parser, this is the
first book available on the powerful yet completely undocumented
product that ships with Microsoft's IIS, Windows Advanced Server
2003, and is available as a free download from the
Microsoft Web site.
* The book and accompanying Web site contain dozens of original,
working Log Parser scripts and templates for Windows Server, ISA
Server, Snort IDS, Exchange Server, IIS, and more
* This book and accompanying scripts will save system
administrators countless hours by scripting and automating the most
common to the most complex log analysis tasks.
Hacker Code will have over 400 pages of dedicated exploit,
vulnerability, and tool code with corresponding instruction. Unlike
other security and programming books that dedicate hundreds of
pages to architecture and theory based flaws and exploits, HC1 will
dive right into deep code analysis. Previously undisclosed security
research in combination with superior programming techniques from
Foundstone and other respected organizations will be included in
both the Local and Remote Code sections of the book.
The book will be accompanied with a FREE COMPANION CD containing
both commented and uncommented versions of the source code examples
presented throughout the book. In addition to the book source code,
the CD will also contain a copy of the author-developed Hacker Code
Library v1.0. The Hacker Code Library will include multiple attack
classes and functions that can be utilized to quickly create
security programs and scripts. These classes and functions will
simplify exploit and vulnerability tool development to an extent
never before possible with publicly available software.
* Learn to quickly create security tools that ease the burden of
software testing and network administration
* Find out about key security issues regarding vulnerabilities,
exploits, programming flaws, and secure code development
* Discover the differences in numerous types of web-based attacks
so that developers can create proper quality assurance testing
procedures and tools
* Learn to automate quality assurance, management, and development
tasks and procedures for testing systems and applications
* Learn to write complex Snort rules based solely upon traffic
generated by network tools and exploits
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security. Topics include: Physical & File System Security, Password Security, Malicious Code, Windows 2000 Network Security Architecture and Professional Protocols, Web Server Security, Denial of Service Attacks, Intrusion Detection, Hacking Secure Code in Windows 2000.
THE STORY OF GOD AND US is a sweeping narrative that dramatizes
some of the most important events and characters in the Bible. The
book provides enriching detail, dialog and descriptions about the
Bible's most fascinating stories. All are historically and
theologically accurate. A ten-hour miniseries on the History
Channel will be based on the story, and the script has been
reviewed by a number of Christian church leaders and seminarians
for authenticity. The book will be released one month prior to the
debut of the television series. Many prominent biblical characters
will be dramatized in the story: Moses, David, Daniel, John the
Baptist and of course, Jesus. The book will reveal the prophetic
significance of the empires that occupied Israel: (Egyptians,
Babylonians, Persians and Romans) and how these figured into
biblical prophecy, especially concerning the Messiah.
|
You may like...
Morgan
Kate Mara, Jennifer Jason Leigh, …
Blu-ray disc
(1)
R70
Discovery Miles 700
|