"For some automation will usher in a labor-free utopia; for others it signals a disastrous age-to-come. Yet whether seen as dream or nightmare, automation, argues Munn, is ultimately a fable that rests on a set of triple fictions. There is the myth of full autonomy claiming that machines will soon take over production and supplant the human. But far from being self-acting, technical solutions are piecemeal; their support and maintenance reveals the immense human labor behind "autonomous" processes. There is the myth of universal automation with technologies framed as a desituated force sweeping across the globe and remaking society. But this fiction ignores the social, cultural, and geographical forces that shape technologies at a local level. And, there is the myth of automating everyone , the generic figure of "the human" at the heart of automation claims. But labor is socially stratified and so automation's fallout will be highly uneven, falling heavier on some (immigrants, people of color, women) than others. Munn moves from machine minders in China to warehouse pickers in the United States to explore the messy ways that new technologies do (and don't) reconfigure labor. Combining this rich array of human stories with insights from media, race, and cultural studies, Munn points to a more nuanced, localized, and racialized understanding of the "future of work.""-- Provided by publisher.
Contains everything students need to succeed as a business student and graduate, from essential study, presentation and leadership skills to practical advice on getting that all-important job after college.
Cracking the Sales Management Code is the first operating manual for sales management. In it you will discover: The five critical processes that drive sales performance How to choose the right processes for your own team The three levels of sales metrics you must collect Which metrics you can “manage” and which ones you can't How to prioritize conflicting sales objectives How to align seller activities with business results How to use CRM to improve the impact of coaching As Neil Rackham writes in the foreword: “There's an acute shortage of good books on the specifics of sales management. Cracking the Sales Management Code is about the practical specifics of sales management in the new era, and it fills a void.” Cracking the Sales Management Code fills that void by providing foundational knowledge about how the sales force works. It reveals the gears and levers that actually control sales results. It adds clarity to things that you intuitively know and provides insight into things that you don't. It will change the way you manage your sellers from day to day, as well as the results you get from year to year.
The Handy Accounting Answer Book can help anyone acquire the skills to start or run a business, plan for retirement, set money aside for a big purchase, establish everyday budgets, and improve their money management.
Find out about the concepts and assumptions behind the Generally Accepted Accounting Principles. Understand tax returns and maximize write-off. Manage retirement account statements and find ways to improve their results.
Marketing in Healthcare-Related Industries captures the concepts and complexities of marketing healthcare in today's environment. The book provides detailed conceptual and practical insights that will be of great benefit to healthcare scholars and practitioners. Topics on healthcare marketing have been carefully selected to provide wide coverage and are illustrated by mini-cases with a highly practical marketing tool kit for healthcare managers included.The healthcare sector in the 21st century face a multiplicity of challenges, which include changing disease patterns, more technology-driven health interventions, a more assertive and quality conscious clientele, as well as a rapidly growing for-profit segment of the industry.
Taking a positive approach, this brief distills years of research, teaching, and coaching into an integrated framework for negotiating genuinely. One of the most fundamental and challenging battlegrounds in our work lives, negotiation calls on us to compete and cooperate to do our jobs well and achieve extraordinary results. But, the biggest challenge in a negotiation is to be strategic while also being real. Author Shirli Kopelman argues that this duality is both possible and powerful. In Negotiating Genuinely, she teaches readers how to reconcile the disparate hats that they wear in everyday life—with families, friends, and colleagues—bringing one integral hat to the negotiation table.
Hellish daily commutes and the demands of jam-packed work schedules no longer make sense. But how can we realize that future in a way that benefits workers and companies alike? Warzel and Petersen illuminate the key values and questions that should be driving this conversation: trust, fairness, flexibility, inclusive workplaces, equity, and work-life balance. Above all, they argue that companies need to listen to their employee - and that this will promote, rather than impede, productivity and profitability. Working from home is about so much more than zoom meetings and hybrid schedules: it aims to reshape our entire relationship to the office. -- adapted from Amazon info
"Social Media Marketing deserves special kudos for its courage in tackling the new frontier of social media marketing. This textbook challenges its readers to grapple with the daunting task of understanding rapidly evolving social media and its users. The market leading and award winning text on social media marketing has been fully updated for this fourth edition. With a balance of essential theory and practical application, the text has been been thoroughly revised to reflect the latest developments in social media marketing research and practice. 11 new case studies have been added to the 'Case Zone', including TikTok, LEGO, Nespresso and Puma. A student-engaging case study now runs throughout the entire textbook looking at the US based company Kombucha 221 BC to help develop understanding of each chapter." -- provided by publisher.
If you've ever spent hours renaming files or updating hundreds of spreadsheet cells, you know how tedious tasks like these can be. But what if you could have your computer do them for you. In this fully revised second edition of the best-selling classic Automate the Boring Stuff with Python, you'll learn how to use Python to write programs that do in minutes what would take you hours to do by hand--no prior programming experience required. You'll learn the basics Python and explore Python's rich library of modules for performing specific tasks, like scraping data off websites, reading PDF and Word documents, and automating clicking and typing tasks. Step-by-step instructions walk you through each program, and updated practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks.
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone—not just techies—to become informed and empowered on the subject of cybersecurity.In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book.You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur.Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully.
This book reviews and explains the technologies that underlie offensive and defensive cyber operations, which are practiced by a range of cyber actors including state actors, criminal enterprises, activists, and individuals. It explains the processes and technologies that enable the full spectrum of cyber operations. Readers will learn how to use basic tools for cyber security and pen-testing, and also be able to quantitatively assess cyber risk to systems and environments and discern and categorize malicious activity. The book provides key concepts of information age conflict technical basics/fundamentals needed to understand more specific remedies and activities associated with all aspects of cyber operations. It explains techniques associated with offensive cyber operations, with careful distinctions made between cyber ISR, cyber exploitation, and cyber attack. It explores defensive cyber operations and includes case studies that provide practical information, making this book useful for both novice and advanced information warfare practitioners
Call Number: QA76.9.A43 T83 2021 EP Campus/BP Campus
Publication Date: 2021-01-25
"An introduction to algorithms for beginning coders that teaches readers a variety of common computer science algorithms, such as searching and sorting and optimization, as well as newer algorithms like those used in machine learning"-- Provided by publisher
Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks.
The Internet of Things (IoT) can be defined as any network of things capable of generating, storing and exchanging data, and in some cases acting on it. This new form of seamless connectivity has many applications: smart cities, smart grids for energy management, intelligent transport, environmental monitoring, healthcare systems, etc. and EU policymakers were quick to realize that machine-to-machine communication and the IoT were going to be vital to economic development. It was also clear that the security of such systems would be of paramount importance and, following the European Commission's Cybersecurity Strategy of the European Union in 2013, the EU's Horizon 2020 programme was set up to explore available options and possible approaches to addressing the security and privacy issues of the IoT. This book presents 10 papers which have emerged from the research of the Horizon 2020 and CHIST-ERA programmes, and which address a wide cross-section of projects ranging from the secure management of personal data and the specific challenges of the IoT with respect to the GDPR, through access control within a highly dynamic IoT environment and increasing trust with distributed ledger technologies, to new cryptographic approaches as a counter-measure for side-channel attacks and the vulnerabilities of IoT-based ambient assisted living systems.
Hospitals, medical practices and healthcare organizations are implementing new technologies at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of data security and privacy issues, fines, damage to their reputations, with serious potential consequences for the patients. Electronic Health Record systems (EHRs) consist of clinical notes, patient listings, lab results, imaging results and screening tests. EHRs are growing in complexity over time and requiring increasing amounts of data storage.
This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You'll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.You'll also learn: - Key concepts in cryptography, such as computational security, attacker models, and forward secrecy - The strengths and limitations of the TLS protocol behind HTTPS secure websites - Quantum computation and post-quantum cryptography - About various vulnerabilities by examining numerous code examples and use cases - How to choose the best algorithm or protocol and ask vendors the right questionsEach chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you're a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.