The Fox Herder's Guide

The Fox Herder's Guide

The Fox Herder's Guide

The Fox Herder's Guide

eBook

$3.99 

Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

History is littered with the bones of institutions killed by change, either because they let events run over them, or because they misjudged what was happening to them. When you look closely at those institutions that have changed successfully, it is often clear that somewhere, somehow, somebody did their homework. That´s the subject of this book: how to do your homework in a way that both motivates and informs rational institutional change. (From the Foreword)

This book will teach you how to tackle an important problem, get it right, and make a difference. Here's what you'll learn:

— The attributes of mind needed to get it right.

— What you need to know and do as a team leader.

— How to determine the resources your team will need.

— How to uncover the things that may bite you, before they bite.

— The kind of infrastructure that supports effective teams.

— How to plan your work and track progress.

— Organized ways to cut through today's ocean of misinformation, disinformation, and spin and arrive at the truth.

— A structured method for deciding what change must happen.

— How to capture your results in an effective, readable document.

— How to give presentations that will carry the day.

Plus you get almost a hundred references to useful books, articles, and Web pages.

This book is not based on academic theory or pop psychology. It is based on almost 50 years of experience in the trenches of high technology and embodies the lessons I learned the hard way, from victories and defeats, elation and heartache, success and failure. If it were a college course it would be called "Real World 101."

Product Details

BN ID: 2940012858467
Publisher: Bitsmasher Press LLC
Publication date: 07/08/2011
Sold by: Barnes & Noble
Format: eBook
File size: 3 MB

About the Author

Earl Boebert wrote his first computer program in 1958 as an undergraduate at Stanford. In 1961 he and another student automated the halftime card stunts for football games, the earliest known application of computing to pixel graphics.
After graduating he became an Electronic Data Processing Officer in the United States Air Force, where he was awarded the Air Force Commendation Medal for his efforts in converting systems from assembly to high−level programming languages.
He then joined Honeywell, where he engaged in new systems development, managed a group that produced security enhancements for the Multics system, and engaged in the design and verification of software for the Saab JA37B, the Mark 48 torpedo, and the Space Shuttle main engine controller. He led the engineering of several advanced electronic security systems, rose to the grade of Senior Research Fellow and won Honeywell's highest award for technical achievement. His course on systems engineering and project management was given to over 3,000 students in 13 countries.
He then became technical founder and Chief Scientist of Secure Computing Corporation where he led the creation of the Sidewinder security server and other security products.
His final position before retirement was as a Senior Scientist for Sandia National Laboratories, where he engaged in a variety of high technology projects.
He is the holder or co-holder of 13 patents in computer and communications security.
He has served on National Research Council committees that produced the following reports:
1991: Computers at Risk: Computing in the Information Age
1997: For the Record: Protecting Electronic Health Information
1999: Trust in Cyberspace
2003: Information Technology for Counterterrorism: Immediate Actions and Future Possibilities
2004: A Review of the FBI´s Trilogy Information Technology Modernization Program
2008: Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment
2010: Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy
2010: Risk-Based Approaches for Securing the DOE Nuclear Weapons Complex.
He also participated in the workshops "Cyber-Attack" and "Insider Threat" and has acted as a reviewer for many National Research Council reports.
From the B&N Reads Blog

Customer Reviews