Schell combines her research with findings from other studies to map the strategies, personality predispositions, and mood-coping capabilities for making it to the top of the corporate ladder--and for staying there. Nearly 400 of today's corporate leaders reveal their secrets for success and the stress and personality and mood disorders that go along with it. The result is an authoritative insight into the people who made it in today's corporate world, and a bold reconfirmation that life at the top is not always worth coveting.
Schell's book is written for present-day corporate leaders...
Schell combines her research with findings from other studies to map the strategies, personality predispositions, and mood-coping capabilities for ...
Schell and Lanteigne provide a clear, objective, responsible, and readable analysis of the facts of stalking crimes against people in the workplace -- and a practical guide to protecting the organization against them. The authors have taken as their purpose the task of helping to reduce the potential for workplace and personal tragedies. They not only make people aware of the stalking cycle and the stages commonly found in stalking incidents, but they give ways to prevent the cycle from escalating into disaster. Their goal is to help organizations develop policies and strategies to...
Schell and Lanteigne provide a clear, objective, responsible, and readable analysis of the facts of stalking crimes against people in the workplace...
Hackers get a bad rap. Businesses, industries, and even society as a whole covet their skills, yet they are often misunderstood and frequently despised. Is their vilification justified? This is the first book to use previously validated psychological inventories to explore and profile the personalities and behavioral traits of more than 200 self-admitted hackers. Many of the profiled are at the top of their game, revered by both the good hackers (white hats) and their more malevolent peers (black hats).
While there are serious reasons to fear the darker elements of the hacker community,...
Hackers get a bad rap. Businesses, industries, and even society as a whole covet their skills, yet they are often misunderstood and frequently desp...
Today more than one billion people worldwide use the Internet for communication, shopping, business, and research. But in the last five years they have lost over $10 billion to malicious computer attacks alone. Is there a way to keep the benefits and avoid the problems?
"The Internet and Society: A Reference Handbook" explores both the positive aspects of the Internet and its darker side. Topically organized, it chronicles the background and history of the Internet, with a focus on the 1960s and beyond. Through analysis of the latest research in sociology, political science, economics,...
Today more than one billion people worldwide use the Internet for communication, shopping, business, and research. But in the last five years they ...
In an age when computer crime is growing at a exponential rate and on a global scale, industry and government leaders are increasingly reliant upon answers from the academic and IT Security fields in order to keep cyber crime in check, and be ahead of the "cyber criminal curve." Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications addresses various aspects of hacking and technology- driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions. Including findings from experts in Criminal Justice,...
In an age when computer crime is growing at a exponential rate and on a global scale, industry and government leaders are increasingly reliant upon an...
What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day.
Rather than presenting an overly technical discussion of the phenomenon of hacking, this work...
What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? ...
Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two sides of the debate in depth. On the one side are those who believe censorship, to a greater or lesser degree, is acceptable; on the other are those who play the critical role of information freedom fighters. In "Internet Censorship: A Reference Handbook," experts help readers understand these diverse views on Internet access and content viewing, revealing how both groups do what they do and why.
The handbook shares key events associated...
Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two...
The Internet has become for many people--especially students and young adults--an essential and intrinsic part of their lives. It makes information available to be shared worldwide, at any time; enables learning about any topic; and allows for instantaneous communication. And it provides endless entertainment as well. But the benefits of online access are accompanied by serious potential risks.
This book covers the key elements of Internet health and safety, including physical safety, information security, and the responsible use of technology. It begins with an introductory...
The Internet has become for many people--especially students and young adults--an essential and intrinsic part of their lives. It makes information...