The Boundaryless Career: A New Employment Principle for a New Organizational Era
Organizational restructuring and global, hypercompetition have revolutionized careers and destroyed the traditional blueprint for advancement and career success. This book details the new forms work takes in the new organizational era where worker mobility has become critical to the well-being and learning of both people and firms.The Boundaryless Career approaches the new principle of the boundaryless career in five directions. The first section helps the reader explore the nature of boundarlyess careers by highlighting some of their essential elements. The second section turns to competitive advantage and the role of workers' knowledge. The thirs section concentrates on the role of the social structure in the organizing of work. The fourth section turns to focus on how boundaryless careers affect personal development and growth. The fifth section addresses the demands boundaryless careers create for schools, communities, and other social institutions. Introductory and concluding chapters by the editors offer frameworks for conceptualizing careers now and in the future.The Boundarly Career provides a conceptual map of new career and employment forms to the prospective benefit of people making career choices, companies re-crafting human resource practices, schools and universities re-considering their roles, and policy-makers concerned with regional or national competitiveness. It will be essential reading for scholars in a range of social science disciplines spanning themes of economics, management, education, organizational behavior, and the psychology and sociology of work. It will also appeal broadly to free thinkers interested in the changing nature of careers and employment as both people and firms tackle the realities of increasingly open markets and global competition.
Snort IDS and IPS Toolkit (Jay Beale's Open Source Security)
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.The book will begin with a discussion of packet inspection and the progression from intrusion detection to intrusion prevention. The authors provide examples of packet inspection methods including: protocol standards compliance, protocol anomaly detection, application control, and signature matching. In addition, application-level vulnerabilities including Binary Code in HTTP headers, HTTP/HTTPS Tunneling, URL Directory Traversal, Cross-Site Scripting, and SQL Injection will also be analyzed. Next, a brief chapter on installing and configuring Snort will highlight various methods for fine tuning your installation to optimize Snort performance including hardware/OS selection, finding and eliminating bottlenecks, and benchmarking and testing your deployment. A special chapter also details how to use Barnyard to improve the overall performance of Snort. Next, best practices will be presented allowing readers to enhance the performance of Snort for even the largest and most complex networks. The next chapter reveals the inner workings of Snort by analyzing the source code. The next several chapters will detail how to write, modify, and fine-tune basic to advanced rules and pre-processors.The last part of the book contains several chapters on active response, intrusion prevention, and using Snort's most advanced capabilities for everything from forensics and incident handling to building and analyzing honey pots.