Author: Victor Assad
Publisher: Archway Publishing
ISBN: 1480876690
Category : Business & Economics
Languages : en
Pages : 373
Book Description
Praise for Hack Recruiting "It is a brilliant piece of work. A must-read for those of us in global corporations, or companies of any size really, that seek to act NOW." --Julia Martensen, Head of HR Strategy and Innovation at DB Schenker. "Victor Assad uncovers longstanding empirical research from I/O psychologists on how to best match job candidates to jobs and the best of today's digital technology. He sees a world (that is emerging today) in which AI ontologies (which are identifying information and relationships about today's global and diverse workforces) will make significant improvements for matching candidates to jobs while reducing recruiting cycle times, costs and selection biases. Victor points out that HR now has the digital tools it needs to dramatically transform recruiting and the role of the recruiter. HR can now build strategic talent pools, improve the employee experience, and digitally collect insightful analytics that will open up a new era of understanding on what truly drives employee performance and innovation." --Angela Hood, Founder and CEO of ThisWay Global. "Must read book if you are a recruiter or talent acquisition head. It goes over best practices and hacks each step of recruiting." --Sandeep Purwar, Founder/CEO, Bevov
Hack Recruiting
Author: Victor Assad
Publisher: Archway Publishing
ISBN: 1480876690
Category : Business & Economics
Languages : en
Pages : 373
Book Description
Praise for Hack Recruiting "It is a brilliant piece of work. A must-read for those of us in global corporations, or companies of any size really, that seek to act NOW." --Julia Martensen, Head of HR Strategy and Innovation at DB Schenker. "Victor Assad uncovers longstanding empirical research from I/O psychologists on how to best match job candidates to jobs and the best of today's digital technology. He sees a world (that is emerging today) in which AI ontologies (which are identifying information and relationships about today's global and diverse workforces) will make significant improvements for matching candidates to jobs while reducing recruiting cycle times, costs and selection biases. Victor points out that HR now has the digital tools it needs to dramatically transform recruiting and the role of the recruiter. HR can now build strategic talent pools, improve the employee experience, and digitally collect insightful analytics that will open up a new era of understanding on what truly drives employee performance and innovation." --Angela Hood, Founder and CEO of ThisWay Global. "Must read book if you are a recruiter or talent acquisition head. It goes over best practices and hacks each step of recruiting." --Sandeep Purwar, Founder/CEO, Bevov
Publisher: Archway Publishing
ISBN: 1480876690
Category : Business & Economics
Languages : en
Pages : 373
Book Description
Praise for Hack Recruiting "It is a brilliant piece of work. A must-read for those of us in global corporations, or companies of any size really, that seek to act NOW." --Julia Martensen, Head of HR Strategy and Innovation at DB Schenker. "Victor Assad uncovers longstanding empirical research from I/O psychologists on how to best match job candidates to jobs and the best of today's digital technology. He sees a world (that is emerging today) in which AI ontologies (which are identifying information and relationships about today's global and diverse workforces) will make significant improvements for matching candidates to jobs while reducing recruiting cycle times, costs and selection biases. Victor points out that HR now has the digital tools it needs to dramatically transform recruiting and the role of the recruiter. HR can now build strategic talent pools, improve the employee experience, and digitally collect insightful analytics that will open up a new era of understanding on what truly drives employee performance and innovation." --Angela Hood, Founder and CEO of ThisWay Global. "Must read book if you are a recruiter or talent acquisition head. It goes over best practices and hacks each step of recruiting." --Sandeep Purwar, Founder/CEO, Bevov
HACK THE JOB
Author: MADHUKAR RAJ
Publisher: Notion Press
ISBN: 1642490628
Category : Self-Help
Languages : en
Pages : 421
Book Description
One of the simple hacks shared in this book helped the author move from a $22,000 a year job to a $65,000 a year job in one month. Just one hack was worth $43,000! While such results are not typical or guaranteed, one of these hacks may be just what you need to kick start, boost, salvage or secure your career. Employment has turned into a high-speed roller coaster ride for employees over the last couple of years. And job automation is snatching away their safety restraints midway exposing them to the real threat of a dangerous plunge. Employees have to throw away the old rulebook and instead hack their way to success and security in a lopsided battle for jobs against intelligent machines in what is predicted to be an unprecedentedly competitive future. Over 2100 years of collective experiences of employees around the world are bundled into this comprehensive yet practical hack book! This indispensable book arms you with powerful hacks that you can apply to: Gain clarity on the fundamental reasons why you work or want a job Find your first or next dream job by confidently clearing interviews Transform your current job into a dream job by bridging the gap Become the master key that can unlock any type of Boss Recognize what your organization really expects from its employees Gain insight into what happens behind the scenes in management Determine if it’s time to consider a job or career change Ace your performance appraisals to receive the highest rating Get elevated to higher positions quickly Obtain the maximum hike percentages and bonuses Salvage and boost a stagnating career Minimize your chances of being fired or laid off Bounce back quickly from a job loss situation Adopt the right strategy to ride the job automation wave Minimize stress and achieve a better work-personal life balance Deal with a mid-life or mid-career crisis “If an employee will read only one book in an entire lifetime, it has to be this one!”
Publisher: Notion Press
ISBN: 1642490628
Category : Self-Help
Languages : en
Pages : 421
Book Description
One of the simple hacks shared in this book helped the author move from a $22,000 a year job to a $65,000 a year job in one month. Just one hack was worth $43,000! While such results are not typical or guaranteed, one of these hacks may be just what you need to kick start, boost, salvage or secure your career. Employment has turned into a high-speed roller coaster ride for employees over the last couple of years. And job automation is snatching away their safety restraints midway exposing them to the real threat of a dangerous plunge. Employees have to throw away the old rulebook and instead hack their way to success and security in a lopsided battle for jobs against intelligent machines in what is predicted to be an unprecedentedly competitive future. Over 2100 years of collective experiences of employees around the world are bundled into this comprehensive yet practical hack book! This indispensable book arms you with powerful hacks that you can apply to: Gain clarity on the fundamental reasons why you work or want a job Find your first or next dream job by confidently clearing interviews Transform your current job into a dream job by bridging the gap Become the master key that can unlock any type of Boss Recognize what your organization really expects from its employees Gain insight into what happens behind the scenes in management Determine if it’s time to consider a job or career change Ace your performance appraisals to receive the highest rating Get elevated to higher positions quickly Obtain the maximum hike percentages and bonuses Salvage and boost a stagnating career Minimize your chances of being fired or laid off Bounce back quickly from a job loss situation Adopt the right strategy to ride the job automation wave Minimize stress and achieve a better work-personal life balance Deal with a mid-life or mid-career crisis “If an employee will read only one book in an entire lifetime, it has to be this one!”
The Essential Guide for Hiring and Getting Hired
Author: Lou Adler
Publisher:
ISBN: 9780988957411
Category : Employee selection
Languages : en
Pages : 270
Book Description
Publisher:
ISBN: 9780988957411
Category : Employee selection
Languages : en
Pages : 270
Book Description
High Growth Handbook
Author: Elad Gil
Publisher: Stripe Press
ISBN: 1953953379
Category : Business & Economics
Languages : en
Pages : 396
Book Description
High Growth Handbook is the playbook for growing your startup into a global brand. Global technology executive, serial entrepreneur, and angel investor Elad Gil has worked with high-growth tech companies including Airbnb, Twitter, Google, Stripe, and Square as they’ve grown from small companies into global enterprises. Across all of these breakout companies, Gil has identified a set of common patterns and created an accessible playbook for scaling high-growth startups, which he has now codified in High Growth Handbook. In this definitive guide, Gil covers key topics, including: · The role of the CEO · Managing a board · Recruiting and overseeing an executive team · Mergers and acquisitions · Initial public offerings · Late-stage funding. Informed by interviews with some of the biggest names in Silicon Valley, including Reid Hoffman (LinkedIn), Marc Andreessen (Andreessen Horowitz), and Aaron Levie (Box), High Growth Handbook presents crystal-clear guidance for navigating the most complex challenges that confront leaders and operators in high-growth startups.
Publisher: Stripe Press
ISBN: 1953953379
Category : Business & Economics
Languages : en
Pages : 396
Book Description
High Growth Handbook is the playbook for growing your startup into a global brand. Global technology executive, serial entrepreneur, and angel investor Elad Gil has worked with high-growth tech companies including Airbnb, Twitter, Google, Stripe, and Square as they’ve grown from small companies into global enterprises. Across all of these breakout companies, Gil has identified a set of common patterns and created an accessible playbook for scaling high-growth startups, which he has now codified in High Growth Handbook. In this definitive guide, Gil covers key topics, including: · The role of the CEO · Managing a board · Recruiting and overseeing an executive team · Mergers and acquisitions · Initial public offerings · Late-stage funding. Informed by interviews with some of the biggest names in Silicon Valley, including Reid Hoffman (LinkedIn), Marc Andreessen (Andreessen Horowitz), and Aaron Levie (Box), High Growth Handbook presents crystal-clear guidance for navigating the most complex challenges that confront leaders and operators in high-growth startups.
Learn Ethical Hacking from Scratch
Author: Zaid Sabih
Publisher: Packt Publishing Ltd
ISBN: 1788624785
Category : Computers
Languages : en
Pages : 549
Book Description
Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book Description This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You’ll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the book, you will be able to pick up web application hacking techniques. You'll see how to discover, exploit, and prevent a number of website vulnerabilities, such as XSS and SQL injections. The attacks covered are practical techniques that work against real systems and are purely for educational purposes. At the end of each section, you will learn how to detect, prevent, and secure systems from these attacks. What you will learn Understand ethical hacking and the different fields and types of hackers Set up a penetration testing lab to practice safe and legal hacking Explore Linux basics, commands, and how to interact with the terminal Access password-protected networks and spy on connected clients Use server and client-side attacks to hack and control remote computers Control a hacked system remotely and use it to hack other systems Discover, exploit, and prevent a number of web application vulnerabilities such as XSS and SQL injections Who this book is for Learning Ethical Hacking from Scratch is for anyone interested in learning how to hack and test the security of systems like professional hackers and security experts.
Publisher: Packt Publishing Ltd
ISBN: 1788624785
Category : Computers
Languages : en
Pages : 549
Book Description
Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book Description This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You’ll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the book, you will be able to pick up web application hacking techniques. You'll see how to discover, exploit, and prevent a number of website vulnerabilities, such as XSS and SQL injections. The attacks covered are practical techniques that work against real systems and are purely for educational purposes. At the end of each section, you will learn how to detect, prevent, and secure systems from these attacks. What you will learn Understand ethical hacking and the different fields and types of hackers Set up a penetration testing lab to practice safe and legal hacking Explore Linux basics, commands, and how to interact with the terminal Access password-protected networks and spy on connected clients Use server and client-side attacks to hack and control remote computers Control a hacked system remotely and use it to hack other systems Discover, exploit, and prevent a number of web application vulnerabilities such as XSS and SQL injections Who this book is for Learning Ethical Hacking from Scratch is for anyone interested in learning how to hack and test the security of systems like professional hackers and security experts.
Hackers & Painters
Author: Paul Graham
Publisher: "O'Reilly Media, Inc."
ISBN: 0596006624
Category : Computers
Languages : en
Pages : 272
Book Description
The author examines issues such as the rightness of web-based applications, the programming language renaissance, spam filtering, the Open Source Movement, Internet startups and more. He also tells important stories about the kinds of people behind technical innovations, revealing their character and their craft.
Publisher: "O'Reilly Media, Inc."
ISBN: 0596006624
Category : Computers
Languages : en
Pages : 272
Book Description
The author examines issues such as the rightness of web-based applications, the programming language renaissance, spam filtering, the Open Source Movement, Internet startups and more. He also tells important stories about the kinds of people behind technical innovations, revealing their character and their craft.
Linux Basics for Hackers
Author: OccupyTheWeb
Publisher: No Starch Press
ISBN: 159327856X
Category : Computers
Languages : en
Pages : 248
Book Description
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment. First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password cracker Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?
Publisher: No Starch Press
ISBN: 159327856X
Category : Computers
Languages : en
Pages : 248
Book Description
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment. First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password cracker Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?
Hacking Growth
Author: Sean Ellis
Publisher: Crown Currency
ISBN: 0451497228
Category : Business & Economics
Languages : en
Pages : 322
Book Description
The definitive playbook by the pioneers of Growth Hacking, one of the hottest business methodologies in Silicon Valley and beyond. It seems hard to believe today, but there was a time when Airbnb was the best-kept secret of travel hackers and couch surfers, Pinterest was a niche web site frequented only by bakers and crafters, LinkedIn was an exclusive network for C-suite executives and top-level recruiters, Facebook was MySpace’s sorry step-brother, and Uber was a scrappy upstart that didn’t stand a chance against the Goliath that was New York City Yellow Cabs. So how did these companies grow from these humble beginnings into the powerhouses they are today? Contrary to popular belief, they didn’t explode to massive worldwide popularity simply by building a great product then crossing their fingers and hoping it would catch on. There was a studied, carefully implemented methodology behind these companies’ extraordinary rise. That methodology is called Growth Hacking, and it’s practitioners include not just today’s hottest start-ups, but also companies like IBM, Walmart, and Microsoft as well as the millions of entrepreneurs, marketers, managers and executives who make up the community of Growth Hackers. Think of the Growth Hacking methodology as doing for market-share growth what Lean Start-Up did for product development, and Scrum did for productivity. It involves cross-functional teams and rapid-tempo testing and iteration that focuses customers: attaining them, retaining them, engaging them, and motivating them to come back and buy more. An accessible and practical toolkit that teams and companies in all industries can use to increase their customer base and market share, this book walks readers through the process of creating and executing their own custom-made growth hacking strategy. It is a must read for any marketer, entrepreneur, innovator or manger looking to replace wasteful big bets and "spaghetti-on-the-wall" approaches with more consistent, replicable, cost-effective, and data-driven results.
Publisher: Crown Currency
ISBN: 0451497228
Category : Business & Economics
Languages : en
Pages : 322
Book Description
The definitive playbook by the pioneers of Growth Hacking, one of the hottest business methodologies in Silicon Valley and beyond. It seems hard to believe today, but there was a time when Airbnb was the best-kept secret of travel hackers and couch surfers, Pinterest was a niche web site frequented only by bakers and crafters, LinkedIn was an exclusive network for C-suite executives and top-level recruiters, Facebook was MySpace’s sorry step-brother, and Uber was a scrappy upstart that didn’t stand a chance against the Goliath that was New York City Yellow Cabs. So how did these companies grow from these humble beginnings into the powerhouses they are today? Contrary to popular belief, they didn’t explode to massive worldwide popularity simply by building a great product then crossing their fingers and hoping it would catch on. There was a studied, carefully implemented methodology behind these companies’ extraordinary rise. That methodology is called Growth Hacking, and it’s practitioners include not just today’s hottest start-ups, but also companies like IBM, Walmart, and Microsoft as well as the millions of entrepreneurs, marketers, managers and executives who make up the community of Growth Hackers. Think of the Growth Hacking methodology as doing for market-share growth what Lean Start-Up did for product development, and Scrum did for productivity. It involves cross-functional teams and rapid-tempo testing and iteration that focuses customers: attaining them, retaining them, engaging them, and motivating them to come back and buy more. An accessible and practical toolkit that teams and companies in all industries can use to increase their customer base and market share, this book walks readers through the process of creating and executing their own custom-made growth hacking strategy. It is a must read for any marketer, entrepreneur, innovator or manger looking to replace wasteful big bets and "spaghetti-on-the-wall" approaches with more consistent, replicable, cost-effective, and data-driven results.
Hacking Your Education
Author: Dale J. Stephens
Publisher: Penguin
ISBN: 1101619686
Category : Education
Languages : en
Pages : 210
Book Description
It’s no secret that college doesn’t prepare students for the real world. Student loan debt recently eclipsed credit card debt for the first time in history and now tops one trillion dollars. And the throngs of unemployed graduates chasing the same jobs makes us wonder whether there’s a better way to “make it” in today’s marketplace. There is—and Dale Stephens is proof of that. In Hacking Your Education, Stephens speaks to a new culture of “hackademics” who think college diplomas are antiquated. Stephens shows how he and dozens of others have hacked their education, and how you can, too. You don’t need to be a genius or especially motivated to succeed outside school. The real requirements are much simpler: curiosity, confidence, and grit. Hacking Your Education offers valuable advice to current students as well as those who decided to skip college. Stephens teaches you to create opportunities for yourself and design your curriculum—inside or outside the classroom. Whether your dream is to travel the world, build a startup, or climb the corporate ladder, Stephens proves you can do it now, rather than waiting for life to start after “graduation” day.
Publisher: Penguin
ISBN: 1101619686
Category : Education
Languages : en
Pages : 210
Book Description
It’s no secret that college doesn’t prepare students for the real world. Student loan debt recently eclipsed credit card debt for the first time in history and now tops one trillion dollars. And the throngs of unemployed graduates chasing the same jobs makes us wonder whether there’s a better way to “make it” in today’s marketplace. There is—and Dale Stephens is proof of that. In Hacking Your Education, Stephens speaks to a new culture of “hackademics” who think college diplomas are antiquated. Stephens shows how he and dozens of others have hacked their education, and how you can, too. You don’t need to be a genius or especially motivated to succeed outside school. The real requirements are much simpler: curiosity, confidence, and grit. Hacking Your Education offers valuable advice to current students as well as those who decided to skip college. Stephens teaches you to create opportunities for yourself and design your curriculum—inside or outside the classroom. Whether your dream is to travel the world, build a startup, or climb the corporate ladder, Stephens proves you can do it now, rather than waiting for life to start after “graduation” day.
The Pentester BluePrint
Author: Phillip L. Wylie
Publisher: John Wiley & Sons
ISBN: 1119684374
Category : Computers
Languages : en
Pages : 192
Book Description
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties
Publisher: John Wiley & Sons
ISBN: 1119684374
Category : Computers
Languages : en
Pages : 192
Book Description
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties