- Table View
- List View
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
by Hamza MegahedMaster Shellcode to leverage the buffer overflow concept Key Features Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit Learn to write and modify 64-bit shellcode along with kernel-level shellcode concepts A step-by-step guide that will take you from low-level security skills to covering loops with shellcode Book Description Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit. This book will teach you topics ranging from memory management and assembly to compiling and extracting shellcode and using syscalls and dynamically locating functions in memory. This book also covers techniques to compile 64-bit shellcode for Linux and Windows along with Metasploit shellcode tools. Lastly, this book will also show you to how to write your own exploits with intermediate techniques, using real-world scenarios. By the end of this book, you will have become an expert in shellcode and will understand how systems are compromised both at the operating system and network level. What you will learn Create an isolated lab to test and inject shellcodes (Windows and Linux). Understand both Windows and Linux behavior. Learn the assembly programming language. Create shellcode using assembly and Metasploit. Detect buffer overflows. Debug and reverse-engineer using tools such as GDB, edb, and Immunity (Windows and Linux). Exploit development and shellcodes injections (Windows & Linux). Prevent and protect against buffer overflows and heap corruption. Who this book is for This book is intended to be read by penetration testers, malware analysts, security researchers, forensic practitioners, exploit developers, C language programmers, software testers, and students in the security field. Readers should have a basic understanding of OS internals (Windows and Linux). Some knowledge of the C programming language is essential, and a familiarity with the Python language would be helpful.
Penetration Testing with the Bash shell
by Keith MakanAn easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.
Penetration Testing: A Hands-On Introduction to Hacking
by Georgia WeidmanPenetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.Learn how to:–Crack passwords and wireless network keys with brute-forcing and wordlists–Test web applications for vulnerabilities–Use the Metasploit Framework to launch exploits and write your own Metasploit modules–Automate social-engineering attacks–Bypass antivirus software–Turn access to one machine into total control of the enterprise in the post exploitation phaseYou’ll even explore writing your own exploits. Then it’s on to mobile hacking—Weidman’s particular area of research—with her tool, the Smartphone Pentest Framework.With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.
Penetration Testing: A Survival Guide
by Juned Ahmed Ansari Bo Weaver Wolf Halton Srinivasa Rao Kotipalli Mohammed A. ImranA complete pentesting guide facilitating smooth backtracking for working hackers About This Book • Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux • Gain a deep understanding of the flaws in web applications and exploit them in a practical manner • Pentest Android apps and perform various attacks in the real world using real case studies Who This Book Is For This course is for anyone who wants to learn about security. Basic knowledge of Android programming would be a plus. What You Will Learn • Exploit several common Windows network vulnerabilities • Recover lost files, investigate successful hacks, and discover hidden data in innocent-looking files • Expose vulnerabilities present in web servers and their applications using server-side attacks • Use SQL and cross-site scripting (XSS) attacks • Check for XSS flaws using the burp suite proxy • Acquaint yourself with the fundamental building blocks of Android Apps in the right way • Take a look at how your personal data can be stolen by malicious attackers • See how developers make mistakes that allow attackers to steal data from phones In Detail The need for penetration testers has grown well over what the IT industry ever anticipated. Running just a vulnerability scanner is no longer an effective method to determine whether a business is truly secure. This learning path will help you develop the most effective penetration testing skills to protect your Windows, web applications, and Android devices. The first module focuses on the Windows platform, which is one of the most common OSes, and managing its security spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Employs the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. In this module first,you'll be introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities so you can exploit a system remotely. You'll not only learn to penetrate in the machine, but will also learn to work with Windows privilege escalations. The second module will help you get to grips with the tools used in Kali Linux 2.0 that relate to web application hacking. You will get to know about scripting and input validation flaws, AJAX, and security issues related to AJAX. You will also use an automated technique called fuzzing so you can identify flaws in a web application. Finally, you'll understand the web application vulnerabilities and the ways they can be exploited. In the last module, you'll get started with Android security. Android, being the platform with the largest consumer base, is the obvious primary target for attackers. You'll begin this journey with the absolute basics and will then slowly gear up to the concepts of Android rooting, application security assessments, malware, infecting APK files, and fuzzing. You'll gain the skills necessary to perform Android application vulnerability assessments and to create an Android pentesting lab. This Learning Path is a blend of content from the following Packt products: • Kali Linux 2: Windows Penetration Testing by Wolf Halton and Bo Weaver • Web Penetration Testing with Kali Linux, Second Edition by Juned Ahmed Ansari • Hacking Android by Srinivasa Rao Kotipalli and Mohammed A. Imran Style and approach This course uses easy-to-understand yet professional language for explaining concepts to test your network's security.
Penetrationstests erfolgreich umsetzen: Praxisleitfaden - Regulatorik - KI-Einflüsse (KI – Best Practice in Industrie, Dienstleistung und Verwaltung)
by Stephen Fedtke Horst Speichert Bernhard C. Witt Nina WagnerDieses Buch ist ein Praxisleitfaden für Verantwortliche in Unternehmen, die Pentests erfolgreich umsetzen wollen. Dabei werden aktuelle regulatorische Anforderungen und Herausforderungen ebenso beleuchtet wie die unterstützende Wirkung der KI. Professionelle Dienstleister decken durch Pentests Schwachstellen in Komponenten auf, damit Betroffene diese proaktiv beheben können. Dabei werden Vorgehen und Methoden echter Angreifer angewendet. Die Autoren geben praxisnahe Tipps zum Vorgehen, beginnend bei der Planung erster Pentests bis zur Nachbereitung. Es wird in sämtlichen Phasen aufgezeigt, wie für alle Seiten ein optimaler Nutzen aus Pentest-Projekten gezogen wird, bei gleichzeitig rechtlich sicheren Rahmenbedingungen.
Pentaho 3.2 Data Integration: Beginner's Guide
by Maria Carina RoldanAs part of Packt's Beginner's Guide, this book focuses on teaching by example. The book walks you through every aspect of PDI, giving step-by-step instructions in a friendly style, allowing you to learn in front of your computer, playing with the tool. The extensive use of drawings and screenshots make the process of learning PDI easy. Throughout the book numerous tips and helpful hints are provided that you will not find anywhere else. The book provides short, practical examples and also builds from scratch a small datamart intended to reinforce the learned concepts and to teach you the basics of data warehousing. This book is for software developers, database administrators, IT students, and everyone involved or interested in developing ETL solutions, or, more generally, doing any kind of data manipulation. If you have never used PDI before, this will be a perfect book to start with. You will find this book is a good starting point if you are a database administrator, data warehouse designer, architect, or any person who is responsible for data warehouse projects and need to load data into them. You don't need to have any prior data warehouse or database experience to read this book. Fundamental database and data warehouse technical terms and concepts are explained in easy-to-understand language.
Pentaho 5.0 Reporting By Example Beginner's Guide
by Dario R. Bernabeu Mariano Garcia MattioWritten in a friendly, example driven Beginner’s Guide format, there are plenty of step-by-step instructions to get you started fast! Pentaho 5.0 By Example: Beginner's Guide is the ideal companion for a wide-variety of developers. Whether you are new to the world of Business Intelligence reporting, or an experienced BI analyst, this book will guide you through the creation of your first reports in Pentaho. We assume some knowledge of the SQL language and database systems.
Pentaho Analytics for MongoDB
by Bo BorlandThis is an easy-to-follow guide on the key integration points between Pentaho and MongoDB. This book employs a practical approach designed to have Pentaho configured to talk to MongoDB early on so that you see rapid results. This book is intended for business analysts, data architects, and developers new to either Pentaho or MongoDB who want to be able to deliver a complete solution for storing, processing, and visualizing data. It's assumed that you will already have experience defining data requirements needed to support business processes and exposure to database modeling, SQL query, and reporting techniques.
Pentaho Analytics for MongoDB Cookbook
by Harris Ward Joel LatinoOver 50 recipes to learn how to use Pentaho Analytics and MongoDB to create powerful analysis and reporting solutions About This Book * Create reports and stunning dashboards with MongoDB data * Accelerate data access and maximize productivity with unique features of Pentaho for MongoDB * A step-by-step recipe-based guide for making full use of Pentaho suite tools with MongoDB Who This Book Is For This book is intended for data architects and developers with a basic level of knowledge of MongoDB. Familiarity with Pentaho is not expected. What You Will Learn * Extract, load, and transform data from MongoDB collections to other datasources * Design Pentaho Reports using different types of connections for MongoDB * Create a OLAP mondrian schema for MongoDB * Explore your MongoDB data using Pentaho Analyzer * Utilize the drag and drop web interface to create dashboards * Use Kettle Thin JDBC with MongoDB for analysis * Integrate advanced dashboards with MondoDB using different types of connections * Publish and run a report on Pentaho BI server using a web interface In Detail MongoDB is an open source, schemaless NoSQL database system. Pentaho as a famous open source Analysis tool provides high performance, high availability, and easy scalability for large sets of data. The variant features in Pentaho for MongoDB are designed to empower organizations to be more agile and scalable and also enables applications to have better flexibility, faster performance, and lower costs. Whether you are brand new to online learning or a seasoned expert, this book will provide you with the skills you need to create turnkey analytic solutions that deliver insight and drive value for your organization. The book will begin by taking you through Pentaho Data Integration and how it works with MongoDB. You will then be taken through the Kettle Thin JDBC Driver for enabling a Java application to interact with a database. This will be followed by exploration of a MongoDB collection using Pentaho Instant view and creating reports with MongoDB as a datasource using Pentaho Report Designer. The book will then teach you how to explore and visualize your data in Pentaho BI Server using Pentaho Analyzer. You will then learn how to create advanced dashboards with your data. The book concludes by highlighting contributions of the Pentaho Community. Style and approach A comprehensive, recipe-based guide to take complete advantage of the Pentaho Analytics for MongoDB.
Pentaho Business Analytics Cookbook
by Sergio RamazzinaThis practical guide contains a wide variety of recipes, taking you through all the topics you need to quickly familiarize yourself with Pentaho and extend your Pentaho skillset. If you are involved in daily activities using Pentaho Business Analytics platform, this is the book for you. It is a good companion to get you quickly acquainted with everything you need to increase your productivity with the platform. We assume basic familiarity with Pentaho, data warehouse design and SQL, HTML, and XML.
Pentaho Data Integration 4 Cookbook
by Adrian Sergio PulvirentiThis book has step-by-step instructions to solve data manipulation problems using PDI in the form of recipes. It has plenty of well-organized tips, screenshots, tables, and examples to aid quick and easy understanding.If you are a software developer or anyone involved or interested in developing ETL solutions, or in general, doing any kind of data manipulation, this book is for you. It does not cover PDI basics, SQL basics, or database concepts. You are expected to have a basic understanding of the PDI tool, SQL language, and databases.
Pentaho Data Integration Beginner's Guide, Second Edition
by María Carina RoldanThis book focuses on teaching you by example. The book walks you through every aspect of Pentaho Data Integration, giving systematic instructions in a friendly style, allowing you to learn in front of your computer, playing with the tool. The extensive use of drawings and screenshots make the process of learning Pentaho Data Integration easy. Throughout the book, numerous tips and helpful hints are provided that you will not find anywhere else.This book is a must-have for software developers, database administrators, IT students, and everyone involved or interested in developing ETL solutions, or, more generally, doing any kind of data manipulation. Those who have never used Pentaho Data Integration will benefit most from the book, but those who have, they will also find it useful.This book is also a good starting point for database administrators, data warehouse designers, architects, or anyone who is responsible for data warehouse projects and needs to load data into them.
Pentaho Data Integration Cookbook Second Edition
by Alex ArbucklePentaho Data Integration Cookbook Second Edition is written in a cookbook format, presenting examples in the style of recipes.This allows you to go directly to your topic of interest, or follow topics throughout a chapter to gain a thorough in-depth knowledge.Pentaho Data Integration Cookbook Second Edition is designed for developers who are familiar with the basics of Kettle but who wish to move up to the next level.It is also aimed at advanced users that want to learn how to use the new features of PDI as well as and best practices for working with Kettle.
Pentaho Data Integration Quick Start Guide: Create ETL processes using Pentaho
by María Carina RoldánGet productive quickly with Pentaho Data IntegrationKey FeaturesTake away the pain of starting with a complex and powerful systemSimplify your data transformation and integration workExplore, transform, and validate your data with Pentaho Data IntegrationBook DescriptionPentaho Data Integration(PDI) is an intuitive and graphical environment packed with drag and drop design and powerful Extract-Transform-Load (ETL) capabilities. Given its power and flexibility, initial attempts to use the Pentaho Data Integration tool can be difficult or confusing. This book is the ideal solution.This book reduces your learning curve with PDI. It provides the guidance needed to make you productive, covering the main features of Pentaho Data Integration. It demonstrates the interactive features of the graphical designer, and takes you through the main ETL capabilities that the tool offers.By the end of the book, you will be able to use PDI for extracting, transforming, and loading the types of data you encounter on a daily basis.What you will learnDesign, preview and run transformations in SpoonRun transformations using the Pan utilityUnderstand how to obtain data from different types of files Connect to a database and explore it using the database explorerUnderstand how to transform data in a variety of waysUnderstand how to insert data into database tablesDesign and run jobs for sequencing tasks and sending emailsCombine the execution of jobs and transformationsWho this book is forThis book is for software developers, business intelligence analysts, and others involved or interested in developing ETL solutions, or more generally, doing any kind of data manipulation.
Pentaho Kettle Solutions
by Jos Van Dongen Matt Casters Roland BoumanA complete guide to Pentaho Kettle, the Pentaho Data lntegration toolset for ETLThis practical book is a complete guide to installing, configuring, and managing Pentaho Kettle. If you're a database administrator or developer, you'll first get up to speed on Kettle basics and how to apply Kettle to create ETL solutions--before progressing to specialized concepts such as clustering, extensibility, and data vault models. Learn how to design and build every phase of an ETL solution.Shows developers and database administrators how to use the open-source Pentaho Kettle for enterprise-level ETL processes (Extracting, Transforming, and Loading data)Assumes no prior knowledge of Kettle or ETL, and brings beginners thoroughly up to speed at their own paceExplains how to get Kettle solutions up and running, then follows the 34 ETL subsystems model, as created by the Kimball Group, to explore the entire ETL lifecycle, including all aspects of data warehousing with KettleGoes beyond routine tasks to explore how to extend Kettle and scale Kettle solutions using a distributed "cloud"Get the most out of Pentaho Kettle and your data warehousing with this detailed guide--from simple single table data migration to complex multisystem clustered data integration tasks.
Pentaho Reporting 3.5 for Java Developers
by Will GormanThis hands-on tutorial, filled with exercises and examples, introduces the reader to a variety of concepts within Pentaho Reporting. With screenshots that show you how reports look at design time as well as how they should look when rendered as PDF, Excel, or HTML, this book also contains complete example source code that you can copy and paste into your environment to get up and running quickly. This book is primarily written for Java developers who want to assemble custom reporting solutions with Pentaho Reporting. Their main interest is in the technical details of creating reports and they want to see how to solve common report problems with a minimum of fuss; they do not need an overview of BI or the importance of reporting. Secondary audiences of this book are IT professionals who need to install a reporting solution in their environment, and want to learn advanced concepts within Pentaho Reporting such as sub-reports, cross-tabs, data source configuration, and metadata-based reporting.
Pentaho Solutions
by Jos Van Dongen Ronald BoumanYour all-in-one resource for using Pentaho with MySQL for Business Intelligence and Data Warehousing Open-source Pentaho provides business intelligence (BI) and data warehousing solutions at a fraction of the cost of proprietary solutions. Now you can take advantage of Pentaho for your business needs with this practical guide written by two major participants in the Pentaho community. The book covers all components of the Pentaho BI Suite. You'll learn to install, use, and maintain Pentaho-and find plenty of background discussion that will bring you thoroughly up to speed on BI and Pentaho concepts. Of all available open source BI products, Pentaho offers the most comprehensive toolset and is the fastest growing open source product suite Explains how to build and load a data warehouse with Pentaho Kettle for data integration/ETL, manually create JFree (pentaho reporting services) reports using direct SQL queries, and create Mondrian (Pentaho analysis services) cubes and attach them to a JPivot cube browser Review deploying reports, cubes and metadata to the Pentaho platform in order to distribute BI solutions to end-users Shows how to set up scheduling, subscription and automatic distribution The companion Web site provides complete source code examples, sample data, and links to related resources.
Pentaho for Big Data Analytics
by Manoj R Patil Feris ThiaThe book is a practical guide, full of step-by-step examples that are easy to follow and implement.This book is for developers, system administrators, and business intelligence professionals looking to learn how to get more out of their data through Pentaho. In order to best engage with the examples, some knowledge of Java will be required.
Pentesting APIs: A practical guide to discovering, fingerprinting, and exploiting APIs
by Maurício HarleyLearn the essential steps to successfully identify and leverage API endpoints with a sequenced and structured approachKey FeaturesGain detailed insights into vulnerabilities and attack vectors for RESTful and GraphQL APIsFollow practical advice and best practices for securing APIs against potential threatsExplore essential security topics, potential vulnerabilities, common attack vectors, and the overall API security landscapePurchase of the print or Kindle book includes a free PDF eBookBook DescriptionUnderstanding API security is crucial as APIs form the backbone of modern interconnected applications, making them prime targets for cyberattacks. Drawing on nearly 30 years of cybersecurity experience and an extensive background in network security and forensic analysis, this book provides the knowledge and tools to strengthen your API security practices and protect against cyber threats comprehensively. This book begins by establishing a foundational understanding of APIs, particularly focusing on REST and GraphQL, emphasizing their critical role and potential security vulnerabilities. It guides you through setting up a penetration testing environment to ensure the practical application of concepts. You’ll learn reconnaissance techniques, information-gathering strategies, and the discovery of API vulnerabilities. Authentication and authorization testing are thoroughly explored, covering mechanisms, weaknesses, and methods to bypass security controls. By comprehensively addressing these aspects, the book equips you to understand, identify, and mitigate risks, strengthening API security and effectively minimizing potential attack surfaces. By the end of this book, you’ll have developed practical skills to identify, exploit, and secure APIs against various vulnerabilities and attacks.What you will learnGet an introduction to APIs and their relationship with securitySet up an effective pentesting lab for API intrusionConduct API reconnaissance and information gathering in the discovery phaseExecute basic attacks such as injection, exception handling, and DoSPerform advanced attacks, including data exposure and business logic abuseBenefit from expert security recommendations to protect APIs against attacksWho this book is forThis book is for security engineers, particularly those focused on application security, as well as security analysts, application owners, web developers, pentesters, and all curious enthusiasts who want to learn about APIs, effective testing methods for their robustness, and how to protect them against cyber attacks. Basic knowledge of web development, familiarity with API concepts, and a foundational understanding of cybersecurity principles will help you get started with this book.
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
by Matt BurroughA comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple.Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies. You'll start by learning how to approach a cloud-focused penetration test and how to obtain the proper permissions to execute it; then, you'll learn to perform reconnaissance on an Azure subscription, gain access to Azure Storage accounts, and dig into Azure's Infrastructure as a Service (IaaS).You'll also learn how to:- Uncover weaknesses in virtual machine settings that enable you to acquire passwords, binaries, code, and settings files- Use PowerShell commands to find IP addresses, administrative users, and resource details- Find security issues related to multi-factor authentication and management certificates- Penetrate networks by enumerating firewall rules- Investigate specialized services like Azure Key Vault, Azure Web Apps, and Azure Automation- View logs and security events to find out when you've been caughtPacked with sample pentesting scripts, practical advice for completing security assessments, and tips that explain how companies can configure Azure to foil common attacks, Pentesting Azure Applications is a clear overview of how to effectively perform cloud-focused security tests and provide accurate findings and recommendations.
Pentesting Industrial Control Systems: An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
by Paul SmithDiscover modern tactics, techniques, and procedures for pentesting industrial control systemsKey FeaturesBecome well-versed with offensive ways of defending your industrial control systemsLearn about industrial network protocols, threat hunting, Active Directory compromises, SQL injection, and much moreBuild offensive and defensive skills to combat industrial cyber threatsBook DescriptionThe industrial cybersecurity domain has grown significantly in recent years. To completely secure critical infrastructure, red teams must be employed to continuously test and exploit the security integrity of a company's people, processes, and products. This pentesting book takes a slightly different approach than most by helping you to gain hands-on experience with equipment that you'll come across in the field. This will enable you to understand how industrial equipment interacts and operates within an operational environment.You'll start by getting to grips with the basics of industrial processes, and then see how to create and break the process, along with gathering open source intel to create a threat landscape for your potential customer. As you advance, you'll find out how to install and utilize offensive techniques used by professional hackers. Throughout the book, you'll explore industrial equipment, port and service discovery, pivoting, and much more, before finally launching attacks against systems in an industrial network.By the end of this penetration testing book, you'll not only understand how to analyze and navigate the intricacies of an industrial control system (ICS), but you'll also have developed essential offensive and defensive skills to proactively protect industrial networks from modern cyberattacks.What you will learnSet up a starter-kit ICS lab with both physical and virtual equipmentPerform open source intel-gathering pre-engagement to help map your attack landscapeGet to grips with the Standard Operating Procedures (SOPs) for penetration testing on industrial equipmentUnderstand the principles of traffic spanning and the importance of listening to customer networksGain fundamental knowledge of ICS communicationConnect physical operational technology to engineering workstations and supervisory control and data acquisition (SCADA) softwareGet hands-on with directory scanning tools to map web-based SCADA solutionsWho this book is forIf you are an ethical hacker, penetration tester, automation engineer, or IT security professional looking to maintain and secure industrial networks from adversaries, this book is for you. A basic understanding of cybersecurity and recent cyber events will help you get the most out of this book.
People Analytics: Data to Decisions (Management for Professionals)
by Rahul GhatakThis book is an exploration of the people analytics possibility, bringing out both theoretical frameworks and detailed practical case studies from the author's experience in industry and business across both sides of the table, with an understanding of data science models and SMAC (Social, Mobile & Cloud) technologies underpinning it. It further explores and lays out a business case for why organizations need to invest behind this space and why HR functions and businesses need to embrace and adopt it. The book examines how people analytics makes a difference to business, describes stages of adoption and maturity models for its effective deployment in organizations and explores the journey from employee master data management and conversion to reporting and visualizations to dash-boarding and descriptive analytics, operational analytics to finally predictive modelling. The book provides insights on the impact of big data and social networks on HR and talent frameworks and the opportunity for HR to mine these networks with a view to culling out predictive insights for the business. It also describes in great detail the specific applications of people and talent analytics through case examples. The book discusses and makes the case for HR to be metric driven focused on business outcomes. It enumerates upon “lead” and “lag” indicators and the need to leverage relevant measurement systems. It provides an understanding of relevant statistical tools that could be deployed to mine key insights from the data to enable robust decision-making, and examines the power of “visual intelligence” and data representation that goes beyond traditional tools like Excel. This book is for HR practitioners who seek to challenge the status quo. It does so by helping them leverage a data and evidence based approach; asking the right questions and building new capabilities with a view towards leading change and driving transformation both in their domain, the wider business and the larger organization. The book is also useful for HRM students to gain a deep understanding of “people analytics” as a critical sub-domain within HR. “HR is not just about people but now also about Tech, Data and Analytics. Upgrading numerical/analytics skills in order to have greater impact on the business, is the new wave of HR, which Rahul helps address via his own rich experience.”- Gurprriet Siingh, Managing Director, Russell Reynolds Associates, Mumbai, India. “This book would help HR & Leadership Teams find a way of discarding perceptions and uncovering truth by embracing data patterns as opposed to just continuing with incremental changes to how it has always been. This is particularly so of successful organizations.”- Vikas Gupta, Divisional Chief Executive Officer, Education and Stationery Products Business, ITC Limited, Gurugram, India.
People Analytics: Theory, Tools and Techniques
by Manish Gupta Pratyush Banerjee Jatin PandeyThis book addresses the topic of people analytics focusing especially on demystifying analytics for managers, from both statistical and computing points of view. It presents the evolution and the importance of people analytics in today’s workforce management and highlights the motivation for studying business analytics, shows the different levels of analytic maturity and discusses real world success stories of business analytics in action through case studies. The volume provides the readers with a step-by-step guide to analyze data and interpret the results for strategy formulation. Each chapter of the book includes a vignette, data-driven exercises provided in a companion website, and real-world case studies. The authors also introduce the readers to data visualization software Microsoft Power BI as well as elaborates on how to use Tableau Desktop.This book would be useful to the students of human resource management, organizational behaviour, marketing management, business research methods, applied psychology, social work and sociology. It would also serve as very good handbook for practicing business executives helping them to implement data analytics for effective decision making in all kinds of business situations around the world.
People Analytics: Using data-driven HR and Gen AI as a business asset
by Cole NapperHow can you use people analytics to drive business performance? Why does a data-driven approach to HR add value and how can you achieve this? What role should AI play in a people analytics function?People Analytics has the answers. It is a practical guide for all mid-career HR professionals which explains how data, analysis and effective use of artificial intelligence can drive business performance and be built into every role. It outlines every aspect of people analytics and explains how to use each element to add value in all parts of the business. There is also detailed discussion of the potential gains that can be made through the use of effective integration of people analytics and generative AI. This book offers guidance on how to build the data infrastructure for HR, the importance of high-quality data and step-by-step advice on how to analyse people data confidently so that you can improve business performance. There is also essential discussion of the ethics of using people analytics and artificial intelligence at work and real-world examples from companies including Toyota, PepsiCo, Lightcast, Booster and FedEx. Written by a leading voice in the people analytics space, this is essential reading for all HR professionals needing to understand the power of people analytics.
People Count: Contact-Tracing Apps and Public Health
by Susan LandauAn introduction to the technology of contact tracing and its usefulness for public health, considering questions of efficacy, equity, and privacy.How do you stop a pandemic before a vaccine arrives? Contact tracing is key, the first step in a process that has proven effective: trace, test, and isolate. Smartphones can collect some of the information required by contact tracers--not just where you've been but also who's been near you. Can we repurpose the tracking technology that we carry with us--devices with GPS, Wi-Fi, Bluetooth, and social media connectivity--to serve public health in a pandemic? In People Count, cybersecurity expert Susan Landau looks at some of the apps developed for contact tracing during the COVID-19 pandemic, finding that issues of effectiveness and equity intersect. Landau explains the effectiveness (or ineffectiveness) of a range of technological interventions, including dongles in Singapore that collect proximity information; India's biometric national identity system; Harvard University's experiment, TraceFi; and China's surveillance network. Other nations rejected China-style surveillance in favor of systems based on Bluetooth, GPS, and cell towers, but Landau explains the limitations of these technologies. She also reports that many current apps appear to be premised on a model of middle-class income and a job that can be done remotely. How can they be effective when low-income communities and front-line workers are the ones who are hit hardest by the virus? COVID-19 will not be our last pandemic; we need to get this essential method of infection control right.