- Table View
- List View
In Hacking Happiness, futurist and contributing Mashable writer John C. Havens introduces you to your "quantified self"--your digital identity represented by gigabytes of data produced from tracking your activities on your smartphone and computer. Harvested by megacorporations such as Google, Facebook, and Amazon, Havens argues that companies gather this data because of its immense economic value, encouraging a culture of "sharing" as they hoard the information based on our lives for private monetary gain. But there's an alternative to this digital dystopia. Emerging technologies will help us reclaim this valuable data for ourselves, so we can directly profit from the insights linked to our quantified selves. At the same time, sensors in smartphones and wearable devices will help us track our emotions to improve our well-being based on the science of positive psychology. Havens proposes that these trends will lead to new economic policies that redefine the meaning of "wealth," allowing governments to create policy focused on purpose rather than productivity. An issues book highlighting the benefits of an examined life in the digital world, this timely work takes the trepidation out of the technological renaissance and illustrates how the fruits of the Information Age can improve our lives for a happier humanity.
It's the ultimate challenge: breaking into the Ivy League. The hack: To get one deadbeat, fully unqualified slacker into the most prestigious school in the country. The crew: Eric Roth -- the good guy, the voice of reason. Max Kim -- the player who made the bet in the first place. Schwartz -- the kid genius already on the inside...of Harvard, that is. Lexi -- the beauty-queen valedictorian who insists on getting in the game. The plan: Use only the most undetectable schemes and techno-brilliant skills. Don't break the Hacker's Code. Don't get distracted. Don't get caught. Take down someone who deserves it. The stakes: A lot higher than they think. They've got the players, the plot, and soon -- the prize. It's go time.
Hacking Leadership is Mike Myatt's latest leadership book written for leaders at every level. Leadership isn't broken, but how it's currently being practiced certainly is. Everyone has blind spots. The purpose of Hacking Leadership is to equip leaders at every level with an actionable framework to identify blind spots and close leadership gaps. The bulk of the book is based on actionable, topical leadership and management hacks to bridge eleven gaps every business needs to cross in order to create a culture of leadership: leadership, purpose, future, mediocrity, culture, talent, knowledge, innovation, expectation, complexity, and failure. Each chapter: Gives readers specific techniques to identify, understand, and most importantly, implement individual, team and organizational leadership hacks.Addresses blind spots and leverage points most leaders and managers haven't thought about, which left unaddressed, will adversely impact growth, development, and performance. All leaders have blind-spots (gaps), which often go undetected for years or decades, and sadly, even when identified the methods for dealing with them are outdated and ineffective - they need to be hacked.Showcases case studies from the author's consulting practice, serving as a confidant with more than 150 public company CEOs. Some of those corporate clients include: AT&T, Bank of America, Deloitte, EMC, Humana, IBM, JP Morgan Chase, Merrill Lynch, PepsiCo, and other leading global brands. Hacking Leadership offers a fresh perspective that makes it easy for leaders to create a roadmap to identify, refine, develop, and achieve their leadership potential--and to create a more effective business that is financially solvent and professionally desirable.
Apply software-inspired management concepts to accelerate modern marketing In many ways, modern marketing has more in common with the software profession than it does with classic marketing management. As surprising as that may sound, it's the natural result of the world going digital. Marketing must move faster, adapt more quickly to market feedback, and manage an increasingly complex set of customer experience touchpoints. All of these challenges are shaped by the dynamics of software--from the growing number of technologies in our own organizations to the global forces of the Internet at large. But you can turn that to your advantage. And you don't need to be technical to do it. Hacking Marketing will show you how to conquer those challenges by adapting successful management frameworks from the software industry to the practice of marketing for any business in a digital world. You'll learn about agile and lean management methodologies, innovation techniques used by high-growth technology companies that any organization can apply, pragmatic approaches for scaling up marketing in a fragmented and constantly shifting environment, and strategies to unleash the full potential of talent in a digital age. Marketing responsibilities and tactics have changed dramatically over the past decade. This book now updates marketing management to better serve this rapidly evolving discipline. Increase the tempo of marketing's responsiveness without chaos or burnout Design "continuous" marketing programs and campaigns that constantly evolve Drive growth with more marketing experiments while actually reducing risk Architect marketing capabilities in layers to better scale and adapt to change Balance strategic focus with the ability to harness emergent opportunities As a marketer and a manager, Hacking Marketing will expand your mental models for how to lead marketing in a digital world where everything--including marketing--flows with the speed and adaptability of software.
Programmable matter is probably not the next technological revolution, nor even perhaps the one after that. But it's coming, and when it does, it will change our lives as much as any invention ever has. Imagine being able to program matter itself-to change it, with the click of a cursor, from hard to soft, from paper to stone, from fluorescent to super-reflective to invisible. Supported by organizations ranging from Levi Strauss and IBM to the Defense Department, solid-state physicists in renowned laboratories are working to make it a reality. In this dazzling investigation, Wil McCarthy visits the laboratories and talks with the researchers who are developing this extraordinary technology, describes how they are learning to control it, and tells us where all this will lead. The possibilities are truly astonishing.
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them. Learn how "inside out" techniques can poke holes into protected networks Understand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate data Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited Prevent attacks against the mobile workforce and their devices containing valuable data Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations
On May 21, 2010, Daniel J. Cohen and Tom Scheinfeldt posted the following provocative questions online: "Can an algorithm edit a journal? Can a library exist without books? Can students build and manage their own learning management platforms? Can a conference be held without a program? Can Twitter replace a scholarly society?" As recently as the mid-2000s, questions like these would have been unthinkable. But today serious scholars are asking whether the institutions of the academy as they have existed for decades, even centuries, aren't becoming obsolete. Every aspect of scholarly infrastructure is being questioned, and even more importantly, being hacked. Sympathetic scholars of traditionally disparate disciplines are canceling their association memberships and building their own networks on Facebook and Twitter. Journals are being compiled automatically from self-published blog posts. Newly minted PhDs are forgoing the tenure track for alternative academic careers that blur the lines between research, teaching, and service. Graduate students are looking beyond the categories of the traditional CV and building expansive professional identities and popular followings through social media. Educational technologists are "punking" established technology vendors by rolling out their own open source infrastructure. Here, in Hacking the Academy, Daniel J. Cohen and Tom Scheinfeldt have gathered a sampling of the answers to their initial questions from scores of engaged academics who care deeply about higher education. These are the responses from a wide array of scholars, presenting their thoughts and approaches with a vibrant intensity, as they explore and contribute to ongoing efforts to rebuild scholarly infrastructure for a new millennium.
How does anonymity enable free speech - and how is it a threat? "I think anonymity on the Internet has to go away," famously said by Randi Zuckerberg (sister of Mark), has become the policy for some, while the Stop Online Piracy Act mobilized millions to write Congress in protest. Identity Wars is a broad look at how anonymity influences politics, activism, religion, and art. Stryker presents a strong defense of anonymity and explores some of the tools and organizations relating to this issue, especially as it has evolved with the ubiquity of the Internet. Cogent and compelling, his examination of online identities, both false and real, is an essential read for the social-networking age.
This book is a tutorial packed with ready-to-use hacks that give solutions for common problems faced by Vim users in their everyday life. Every chapter covers a set of recipes, each of which follows a systematic approach with a self-contained description of the task it covers, how to use it, and what you gain by using it. The minimum version of Vim required for each hack is clearly indicated. If you are a Vim user who wants to get more out of this legendary text editor, this book is for you. It focuses on making life easier for intermediate to experienced Vim users.
This is a cookbook packed with ready-to-use hacks that give solutions for some of the commonest problems users of the Vim editor encounter during their daily use. Each recipe follows a systematic approach with a self-contained description of the task it covers, how to use it, and what you gain by using it. The reader can read any of the hacks in this book without having to read any of the other hacks "where necessary they include cross-references to other relevant hacks. The minimum version of Vim required for each hack is clearly indicated. This is a cookbook packed with ready-to-use hacks that give solutions for some of the commonest problems users of the Vim editor encounter during their daily use. Each recipe follows a systematic approach with a self-contained description of the task it covers, how to use it, and what you gain by using it. The reader can read any of the hacks in this book without having to read any of the other hacks "where necessary they include cross-references to other relevant hacks. The minimum version of Vim required for each hack is clearly indicated.
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more. Provides a holistic approach to OSINT and Web recon, showing you how to fit all the data together into actionable intelligence Focuses on hands-on tools such as TOR, i2p, Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, FOCA, EXIF, Metagoofil, MAT, and many more Covers key technical topics such as metadata searching, advanced browsers and power searching, online anonymity, Darkweb / Deepweb, Social Network Analysis (SNA), and how to manage, analyze, and visualize the data you gather Includes hands-on technical examples and case studies, as well as a Python chapter that shows you how to create your own information-gathering tools and modify existing APIs
Vista is the most radical revamping of Windows since 1995. However, along with all the fantastic improvements, there are a couple of things that likely drive you up the wall. Don't worry, though-just join forces with author Steve Sinchak and you'll end up feeling as though Microsoft designed Vista just for you! He shows you how to tweak logon screen settings, build custom Sidebar gadgets, personalize Aero Glass with themes and visual styles, turn your PC into an HDTV media center, fine-tune your firewall, and more.
Become a cyber-hero - know the common wireless weaknesses"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."--Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) ProgramWireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.Discover how to:Perform ethical hacks without compromising a systemCombat denial of service and WEP attacksUnderstand how invaders thinkRecognize the effects of different hacksProtect against war drivers and rogue devices
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security. Provides detailed explanations of the complete penetration testing lifecycle Complete linkage of the Kali information, resources and distribution downloads Hands-on exercises reinforce topics
Why work harder than you have to? One manager kept his senior execs happy by secretly hacking into the company's database, providing them the reports they needed in one-third the time. Hacking is a powerful solution to every stupid procedure, tool, rule, and process we are forced to endure. Benevolent hackers are saving business from itself. It would be so much easier to do great work if not for lingering bureaucracies, outdated technologies, and deeply irrational rules and procedures. These things are killing us. Frustrating? Hell, yes. But take heart-there's an army of heroes coming to the rescue. Today's top performers are taking matters into their own hands: bypassing sacred structures, using forbidden tools, and ignoring silly corporate edicts. In other words, they are hacking work to increase their efficiency and job satisfaction. Consultant Bill Jensen teamed up with hacker Josh Klein to expose the cheat codes that enable people to work smarter instead of harder. Once employees learn how to hack their work, they accomplish more in less time. They cut through red tape and circumvent stupid rules. It's about making the system work for you, so you can take control of your workload, increase your productivity, and help your company succeed-in spite of itself.
In his provocative new book, Dale J. Stephens explains why a college diploma isn't necessary for success.
At the age of nine, Hope Daniels walked into Stoke Newington Police Station with her little brothers and asked to be taken into care. Home life was intolerable: both of Hope's parents were alcoholics and her mum was a prostitute. The year was 1983. As London emerged into a new era of wealth and opportunity, the Daniels children lived in desperate poverty, neglected and barely nourished. Hounded by vigilante neighbours and vulnerable to the drunken behaviour of her parents' friends, Hope had to draw on her inner strength. Hackney Child is Hope's gripping story of physical and emotional survival - and the lifeline given to her by the support of professionals working in the care system. Despite all the challenges she faced, Hope never lost compassion for her parents, particularly her alcoholic father. Her experiences make essential reading and show that, with the right help, the least fortunate children have the potential not only to recover but to thrive.
With more than 100 million registered players, Minecraft has taken control of gamers all over the world. With Hacks for Minecrafters, you'll be able to take back that control! Only with the help found in Hacks for Minecrafters will you be able to craft your world exactly how you want it to look, all while discovering the hidden gems of the game.In this hacker's guide, you'll find expertise on:Mining-including diamonds and rare minerals!Farming-growing tricks, seed hacks, and the best tree-replanting techniques!Battle-for the best weapons and armor!Magic-top crafting hacks and book modifiers!You will never be stuck again! With more than one hundred full-color screenshots of in-game footage, you'll be able to carefully follow every tip with precision. It doesn't matter if you're playing on a PC, mobile device, or home console; with Hacks for Minecrafters, you'll be beating the game in no time. Every block has been accounted for, all living entities have been taken into consideration, and all modes of game-play are covered!
From the author of Hacks for Minecrafters and Hacks for Minecrafters: Master Builder comes the most encompassing guide ever to combat in the world of Minecraft!With more than 100 million registered Minecraft accounts and rights picked up by Warner Brothers for an action-adventure film in the style of The Lego Movie, Minecraft is on its way to becoming the next big children's brand. While there are several successful game guides on the market already, this book will be the first unofficial "hacker's" guide dedicated to combat and geared toward seven- to twelve-year-old Minecrafters.With Hacks for Minecrafters: Combat Edition, kids will learn how to defend their property and fight off hostile mobs and monsters like zombies, spiders, and skeletons! Other tips include:Updated enchanting for armor, weapons, and moreHow to deal with new behaviors for hostile mobsThe best ways to defeat new hostile mobs, such as killer bunnies, ocean-dwelling guardians, elder guardian mini-bosses, and the rare endermiteAnd much more!Packed with expert tips, cheats, and hacks on fighting all types of enemies and with over one hundred screenshots, Hacks for Minecrafters: Combat Edition shows exactly how the experts defend themselves and fight attackers, from cave spiders to creepers to zombie pigmen. In Minecraft, the risk of attack is ever-present, and players need to know how to build weapons, set traps, and escape to safety.
From the author of Hacks for Minecrafters comes the most encompassing guide ever to the many amazing builds you can create in Minecraft! With more than 100 million registered Minecraft accounts and rights picked up by Warner Brothers for an action-adventure film in the style of The LEGO Movie, Minecraft is on its way to becoming the next big children's brand. While there are several successful game guides on the market already, this book will be the first unofficial "hacker's" guide dedicated to building and geared toward seven- to twelve-year-old Minecrafters.With Hacks for Minecrafters: Master Builder, kids will learn how to build the coolest stuff, including an underwater house, a pirate ship, and a fortified castle! Other tips will help gamers:Find the best locationsChoose their favorite styleLearn how to get started with foundations and wallsBecome landscaping expertsLearn how to decorate their living roomAnd much more!Packed with expert tips, cheats, and hacks on planning all types of buildings and with over one hundred screenshots, Hacks for Minecrafters: Master Builder shows exactly how the experts bring their amazing structures to life, from designing realistic roofs and exteriors to planning crenellated castle battlements. Detailed step-by-step illustrated guides will let every kid follow along to build their very own awesome castles, bridges, and farms and add the decor and landscaping details that bring their creations to life.
Have you had enough of George W. Bush and the Republican right? Are you sick and tired of the tax-cutting, environment-desecrating, secret-keeping, influence-peddling, war-mongering, free speech-hating hypocrites who occupy America's halls of power? If so, you have company -- James Carville. Like James Carville, America has been bruised and battered by the Republicans who are running our country and running it into the ground. The Bush administration has squandered a five-trillion-dollar surplus and created a five-trillion-dollar projected deficit. Their tax cut for the rich was supposed to create jobs -- but instead America has lost more than three million of them. This administration was supposed to bring honor and dignity to the White House but instead brought lies, leaks, secrecy, and fear. They promised to make the country stronger and safer but instead they've left us overstretched, isolated, and insecure. And Carville has had enough. In Had Enough? the legendary political adviser comes out of his corner swinging, taking on the Bush White House and the Republican leaders in Congress on every front -- from the economy to education to foreign affairs. But he doesn't just attack; he lays out constructive "had enough" solutions for healing the damage done by the Republicans and helping disheartened Democrats get back on their feet. In addition, he offers "Ten Rules for Progressives to Live By" and a new War Room mantra for a new era. Had Enough? is a rousing handbook for taking back the country, for fighting back the right wing, and for returning the power to the people.
The Globe and Mail bestseller, and #1 bestselling wine guide in British Columbia celebrates its 10th anniversary! James Nevison's annual, unpretentious guide for everyday wine is back, with the top 100 wallet-friendly wines for 2016. In this expertly selected collection, you will find the very best value for your money across white, rosé, red, sparkling and much more. Get the scoop on $10 wines that taste like they're $20, and $20 bottles that will blow you away! Had a Glass 2016 points wine drinkers in the right direction, towards a good bottle that won't break the bank. With Had a Glass 2016 in hand, you can navigate the wine aisles with confidence, guaranteed to find great-tasting, and great-value wines.
A Survivor's StoryIn Had I Known, the former host of Good Morning America, health advocate, international speaker, mother of seven, grandmother of two, and New York Times bestselling author Joan Lunden speaks candidly about her battle against breast cancer, her quest to learn about it and teach others, and the transformative effect it has had on her life.With a large extended family counting on her, giving up was not an option. After Joan announced her diagnosis of Stage 2 Triple Negative Breast Cancer on Good Morning America, people all over the country rallied around her as she went into warrior mode. Joan appeared on the cover of People magazine bald, showing the world her brave resolve and that breast cancer does not need to define you.Joan's illness has changed her in profoundly unexpected ways and has redefined her values--and, most of all, her health. Following a new clean and healthy way of eating, Joan became her own best advocate by taking control of her nutrition, which helped combat the adverse side effects of chemotherapy.Uncharacteristically vulnerable, irreverent, and straight from the heart, Had I Known is a deeply personal and powerful story of pain, persistence, and perseverance in which Joan openly evaluates her decision to go public with her battle, involving shaving her head, wig shopping, reconnecting with her viewers, rediscovering her purpose, and ultimately realizing that sometimes you have to look back to move forward.
The last place he expected to find lasting love was back in his hometown.... Slater knew tragedy from a young age, but with the support of his foster family, he turned his life around. Now, back from a stint in the Navy, he's packed up his motorcycle and returned to Red Hook to help to run the family restaurant--a job that comes with a tantalizing upside. Her name is Rocki. Flirty, sweet, and outgoing, Rocki brings in crowds as the lead singer of the house band. And although she's unable to resist the charms of this intense bad boy, she refuses to open her heart to him. Until a family crisis shatters Rocki's easygoing demeanor, exposing something from her past she'd always hoped would stay hidden. But Slater knows a thing or two about family secrets--and he sets out to prove to Rocki that their relationship could finally give them both a future worth believing in.
Back Cover: A gripping action-adventure story, full of political intrigue and suspense, with a brand-new perspective on a historical figure you may think you already know! BOTH A PALACE THRILLER AND A JEWISH WOMAN'S MEMOIR, Hadassah brings the age-old story of Esther to life. This historically accurate novel layered with fresh insights provides a fascinating twist on a pivotal time in religious history, and readers will find it bursting with page-turning drama. TOMMY TENNEY At the core of his in-depth research into the life of Esther and its setting in ancient Persia-contemporary Iraq and Iran-Tenney discovered a compelling heart-stopping tale. His storytelling gifts capture the power and beauty of the peasant girl who became queen.
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ���DAISY Text with Images���.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivonas Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.