Hacking Work
Title | Hacking Work PDF eBook |
Author | Bill Jensen |
Publisher | Penguin |
Pages | 257 |
Release | 2010-09-23 |
Genre | Business & Economics |
ISBN | 1101443499 |
Why work harder than you have to? One manager kept his senior execs happy by secretly hacking into the company's database to give them the reports they needed in one third of the time. Hacking is a powerful solution to every stupid procedure, tool, rule, and process we are forced to endure at the office. Benevolent hackers are saving business from itself. It would be so much easier to do great work if not for lingering bureaucracies, outdated technologies, and deeply irrational rules and procedures. These things are killing us. Frustrating? Hell, yes. But take heart-there's an army of heroes coming to the rescue. Today's top performers are taking matters into their own hands: bypassing sacred structures, using forbidden tools, and ignoring silly corporate edicts. In other words, they are hacking work to increase their efficiency and job satisfaction. Consultant Bill Jensen teamed up with hacker Josh Klein to expose the cheat codes that enable people to work smarter instead of harder. Once employees learn how to hack their work, they accomplish more in less time. They cut through red tape and circumvent stupid rules. For instance, Elizabeth's bosses wouldn't sign off on her plan to improve customer service. So she made videotapes of customers complaining about what needed fixing and posted them on YouTube. Within days, public outcry forced senior management to reverse its decision. Hacking Work reveals powerful technological and social hacks and shows readers how to apply them to sidestep bureaucratic boundaries and busywork. It's about making the system work for you, not the other way around, so you can take control of your workload, increase your productivity, and help your company succeed-in spite of itself.
Boo to Billable Hours
Title | Boo to Billable Hours PDF eBook |
Author | John Derrick |
Publisher | |
Pages | 151 |
Release | 2007-09 |
Genre | Lawyers |
ISBN | 9780979777806 |
Hacking BlackBerry
Title | Hacking BlackBerry PDF eBook |
Author | Glenn Bachmann |
Publisher | John Wiley & Sons |
Pages | 320 |
Release | 2006-10-30 |
Genre | Computers |
ISBN |
Provides information on getting the most ouf of a BlackBerry, covering such topics as searching the Web, playing games, connecting to a PC wirelessly, installing ringtones, and drawing sketches on the screen.
The New Billable Hour
Title | The New Billable Hour PDF eBook |
Author | Ritu Goswamy |
Publisher | Morgan James Publishing |
Pages | 70 |
Release | 2019-02-05 |
Genre | Self-Help |
ISBN | 1642791288 |
The New Billable Hour is a practical guide for lawyers to gain control of their time, work, and life. In today’s demanding world, lawyers must learn how to increase productivity so that they can competently bill more hours, while still having a personal life. Lawyer and productivity consultant, Ritu Goswamy presents her unique system where lawyers learn: How to have more hours in the day to bill clients How to bill more hours in less time How to take back control of their time How to transform hours into wealth How to balance the priorities in their life Goswamy’s guide teaches lawyers how to bill more hours in less time by turning the traditional billable hour on its head. By following her steps and billing themselves one “new” billable hour per day, lawyers have more capacity to focus on their work, increase their billable time, and make more money.
Corpselight
Title | Corpselight PDF eBook |
Author | Angela Slatter |
Publisher | Quercus Publishing |
Pages | 400 |
Release | 2017-07-13 |
Genre | Fiction |
ISBN | 1784294330 |
Watch out, Harry Dresden, Kinsey Milhone and Mercy Thompson: there's a new kick-ass guardian in town and Verity Fassbinder's taking no nonsense from anyone, not even the fox-spirit assassins who are invading Brisbane in this fast-paced sequel to VIGIL. Life in Brisbane is never simple for those who walk between the worlds. Verity's all about protecting her city, but right now that's mostly running surveillance and handling the less exciting cases for the Weyrd Council - after all, it's hard to chase the bad guys through the streets of Brisbane when you're really, really pregnant. 'Verity is the best thing about the book . . . she's a surly, straight-talking, Doc Marten-wearing punchbag who investigates Weyrd-related crime on behalf of the beleaguered "normal" police' (SFX) An insurance investigation sounds pretty harmless, even if it is for 'Unusual Happenstance'. That's not usually a clause Normals use - it covers all-purpose hauntings, angry genii loci, ectoplasmic home invasion, demonic possession, that sort of thing - but Susan Beckett's claimed three times in three months. Her house keeps getting inundated with mud, but she's still insisting she doesn't need or want help . . . until the dry-land drownings begin. V's first lead in takes her to Chinatown, where she is confronted by kitsune assassins. But when she suddenly goes into labour, it's clear the fox spirits are not going to be helpful. Corpselight, the sequel to Vigil, is the second book in the Verity Fassbinder series by award-winning author Angela Slatter. 'Simply put: Slatter can write! She forces us to recognise the monsters that are ourselves' Jack Dann, award-winning author.
Beyond Contempt
Title | Beyond Contempt PDF eBook |
Author | Peter Jukes |
Publisher | Canbury Press |
Pages | 257 |
Release | 2015-02-20 |
Genre | Political Science |
ISBN | 0993040713 |
A factual account of the trial of Rupert Murdoch's newspaper journalists for phone hacking, corruption of officials, and conspiracy to pervert the course of justice. His favourite executive, Rebekah Brooks, editor of the News of the World and The Sun, was acquitted and her friend and colleague Andy Coulson jailed. This book covers every twist and turn of the case, which took place at the Old Bailey in London in 2013 and 2014. It includes a list of the charges, defendants and their counsel and previously unreported material.
Hacking Exposed Linux
Title | Hacking Exposed Linux PDF eBook |
Author | ISECOM |
Publisher | McGraw Hill Professional |
Pages | 650 |
Release | 2007-08-22 |
Genre | Computers |
ISBN | 0071596429 |
The Latest Linux Security Solutions This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. Secure Linux by using attacks and countermeasures from the latest OSSTMM research Follow attack techniques of PSTN, ISDN, and PSDN over Linux Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux Block Linux signal jamming, cloning, and eavesdropping attacks Apply Trusted Computing and cryptography tools for your best defense Fix vulnerabilities in DNS, SMTP, and Web 2.0 services Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits Find and repair errors in C code with static analysis and Hoare Logic