Goodreads helps you keep track of books you want to read.
Start by marking “No More Magic Wands” as Want to Read:
No More Magic Wands
Enlarge cover
Rate this book
Clear rating
Open Preview

No More Magic Wands

3.50  ·  Rating details ·  18 ratings  ·  14 reviews
Once upon a time there was a company that made magic wands, but when they were hacked all the magic in the world couldn't prevent their data from being stolen. If that company had a chance for a clean start, what would they have done differently? The unlikely hero isn't a security guy. She's a business elf who makes it her mission to change the way her company does busines ...more
Paperback
Published September 10th 2016 by Createspace Independent Publishing Platform
More Details... Edit Details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about No More Magic Wands, please sign up.

Be the first to ask a question about No More Magic Wands

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

Showing 1-48
Average rating 3.50  · 
Rating details
 ·  18 ratings  ·  14 reviews


More filters
 | 
Sort order
Joseph Spuckler
Oct 23, 2016 rated it really liked it
No More Magic Wands by George Finney is a book on cyber security for all level of readers. Finney is the Information Security Officer (ISO) and Director of Digital Interests for Southern Methodist University. He works in a variety of areas at SMU including facilitating IT Security and Compliance, increasing Regulatory Awareness, streamlining the IT Contracts process, as well as advocacy for Open Source software and processes. Finney earned his law degree from Southern Methodist University.

No Mo
...more
Cheryl
May 06, 2017 rated it it was amazing
I work in the health industry where cybersecurity is very important. Although, it should be important to everyone, no matter your job. As Mr. Finney states "Security is everyone's job". If you take measures to keep your information secure then, there is less of a chance of it falling into the wrong hands. The harder it is for a hacker or thief to work to access your information, the better chance that they will move to a easier target.

Everything in this book is very relevant to today's world. W
...more
Noelle Walsh
Sep 13, 2017 rated it liked it
Shelves: first-reads
This was a good book. It's cyber security meets a fairy tale that every reader can have no trouble reading. It's a fun read and anyone can enjoy this regardless of reading level.


*won as a GoodReads Giveaway*
Gayle Pace
May 30, 2017 rated it it was amazing
Shelves: cyber-security
MY THOUGHTS
What do you do when your data is stolen? Cyber Security is a major concern and the author puts a little fun into this serious subject as he gives information on the subject. Information the normal person can understand. It doesn't matter how good a security system you have, it's all in the people involved. It takes humans to operate the computers, the alarms, the intel, everything. Whenever there are people involved, mistakes are made, whether by accident or by purpose. Thee author s
...more
Ian Miller
Dec 13, 2016 rated it it was amazing
This is a delightful book, nominally about information and internet security, but as much as anything about how to manage people working for you, because as Finney points out, security is maximized when everyone in the company is doing their best to maintain it. Finney seems to be taken by Aesop, because this book illustrates the points more or less one by one by means of a sequence of fables, starting with the elf Honest Evergreen going into business making magic wands. Such a valuable commodit ...more
Lorrie
So I won this book some time ago as a Goodreads giveaway. It finally made it to the top of a pile, so I read it.

My initial thoughts about this book, before I've even read any of the content mind you, is that the author needs to lay off the ASCII. Holy shit... The title and every chapter title has all the characters in some ASCII symbol instead of just plain Roman letters. It's hard to read for one, but for two, it doesn't say hacker. It says griefer -- someone who will happily gank or corpse cam
...more
Dawn
Sep 17, 2017 rated it liked it
I chose to read this book after receiving a free copy from the author. All opinions in this review are my own and completely unbiased.

For most of us, the subject of cybersecurity is boring and technical but George Finney has written this book for those of us who aren't so technical. This isn't a reference book on cybersecurity. This is a book that anyone can read and understand. It contains stories of a magic world with elves and fairies and a business of magic wands and relates it to the busine
...more
Laura
Sep 06, 2017 rated it liked it
I will admit I was not immediately drawn into this book, but once I gave it a fair chance I could appreciate its message. The use of humor and pop culture references made it a quick, lighter read.
The book begins by telling us what we are going to learn. It is spelled out for us from the beginning so those of us slow to catch on have handholds to grasp from the beginning.
I actually read this book twice because once I got to the part I really felt I understood the story and the implications, I wan
...more
R Z
Aug 08, 2017 rated it liked it
Shelves: giveaway-wins
A look on how to improve (from top down, and vice versa) cyber security in your company. It was full of very helpful tips and summations of very real cyber problems, and I think it's an interesting, easy-to-understand handbook on how to deal with security and employees.

The only thing wrong with it, and that's just because I was hoping for magical stories analogous to, but not heavy-handed, cyber issues; the stories were, ostensibly, analogies, but they became so muddled in places that they were
...more
Jenny T.
Sep 12, 2017 rated it it was ok
Shelves: first-reads
This is a free book from the Goodreads First Reads giveaways.
A corporate fable reminiscent of "Who Moved My Cheese?" that focuses on cybersecurity. This book shows that different parts are all involved in keeping a company safe and functioning. My takeaway is that communication and everyone's participation is required.
Peggy
Sep 12, 2017 rated it really liked it
Going into this book I first thought more of a child's book was pretty shocked once I realized that it was just the opposite. Even though it does seem as such, it truly isn't but the way it's written will help you understand and see things more clearly with a full understanding. Really appreciate the way this book was written. Pretty enjoyable as well!
Renee Smith
Sep 03, 2017 rated it really liked it
Shelves: won-books
I received a free copy from Goodreads for an honest review.
It seemed like Computer Security was what most of the stories were about. Each story had something for you to learn something From. I loved every story. Very good. Only complaint was it was to short :)
Tweets66
Sep 11, 2017 rated it really liked it
I found this book to be quite enlightening. It did not talk "down" to me and gave me lots of good information.
Pegboard
Dec 13, 2016 rated it really liked it
No More Magic Wands isn’t only unique in its topic, but also in how it is written. George Finney’s insight on Cybersecurity is very impressive, blending that with mystical elves, fairies, and witches to make this a fun book to read.
George uses an elf that produces magical wands as an example of real live businesses that produce a unique, but useful product to the public. Honest Evergreen gets complaints that his wands are faulty but further study shows that the wand was an inferior copy, or fra
...more
LostToABook
rated it liked it
Aug 26, 2017
Debbie
rated it did not like it
Nov 01, 2017
George Finney
rated it it was amazing
Jan 27, 2018
Kimberly Tate
rated it really liked it
Feb 22, 2017
Lvautier
marked it as to-read
Oct 23, 2016
Pao
marked it as to-read
Oct 23, 2016
Màiri  Smith
marked it as to-read
Oct 29, 2016
Jessie Rivas
marked it as to-read
Oct 31, 2016
Jennifer
marked it as to-read
May 06, 2017
Ninja
marked it as to-read
May 09, 2017
Linda May
marked it as to-read
May 19, 2017
Micielle
marked it as to-read
Jun 05, 2017
Suzanne Jackson
marked it as to-read
Jun 05, 2017
Erin Slaven
marked it as to-read
Jun 05, 2017
Pat
marked it as to-read
Jun 05, 2017
Jamie Piper
marked it as to-read
Jun 05, 2017
Frederick Rotzien
marked it as to-read
Jun 05, 2017
Hazel
marked it as to-read
Jun 05, 2017
SALLY WHITE
marked it as to-read
Jun 05, 2017
Melly Mel
marked it as to-read
Jun 05, 2017
Syndi Day
marked it as to-read
Jun 05, 2017
Bill
marked it as to-read
Jun 05, 2017
Paige
marked it as to-read
Jun 05, 2017
Sinead
marked it as to-read
Jun 05, 2017
Mary A.
marked it as to-read
Jun 05, 2017
Arnela
marked it as to-read
Jun 05, 2017
Betty
marked it as to-read
Jun 05, 2017
Kendra Epperson
marked it as to-read
Jun 05, 2017
Rhett Dobberstein
marked it as to-read
Jun 05, 2017
Julie
marked it as to-read
Jun 05, 2017
Wanda C
marked it as to-read
Jun 05, 2017
Nilay Mustafa
marked it as to-read
Jun 05, 2017
Dianne
marked it as to-read
Jun 05, 2017
Kathleen Hohler
marked it as to-read
Jun 05, 2017
There are no discussion topics on this book yet. Be the first to start one »

Readers also enjoyed

  • Nerds 2.0.1
  • Windows® Internals (PRO-Developer)
  • Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps
  • Cyber War Will Not Take Place
  • Blue Team Field Manual (BTFM)
  • Collaborative Intelligence: Using Teams to Solve Hard Problems
  • Future Games
  • The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen
  • Analyzing Intelligence: Origins, Obstacles, and Innovations
  • Introduction to Modern Cryptography: Principles and Protocols
  • Blue Team Handbook: A Condensed Field Guide for the Cyber Security Incident Responder
  • File System Forensic Analysis
  • Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer
  • The Coming Swarm: DDOS Actions, Hacktivism, and Civil Disobedience on the Internet
  • Deep State: Inside the Government Secrecy Industry
  • Rootkits: Subverting the Windows Kernel
  • Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
  • The Devil Inside the Beltway
See similar books…