Information Technology


The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
The Pragmatic Programmer: From Journeyman to Master
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations
The Mythical Man-Month: Essays on Software Engineering
Clean Code: A Handbook of Agile Software Craftsmanship
The Unicorn Project
The Information: A History, a Theory, a Flood
Code Complete: A Practical Handbook of Software Construction
Accelerate: Building and Scaling High Performing Technology Organizations
Code: The Hidden Language of Computer Hardware and Software
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007)
Refactoring: Improving the Design of Existing Code
Pro Git (Expert's Voice in Software Development)
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Roger Spitz
We must teach data literacy to our students, lest they emerge illiterate in our accelerating info-ruption.
Roger Spitz, Disrupt With Impact: Achieve Business Success in an Unpredictable World

How can one identify the true owner of a cyber risk? When everyone is responsible, no one is responsible. This is an undisputed fact. To the best of my knowledge, organizations often rely on frameworks such as RACI matrices (Responsible, Accountable, Consulted, Informed) to formally assign ownership. From another perspective, however, the “true owner” of a cyber threat is its creator. And here is where the truth may reside. Whether it is hackers, insiders, corporate culture, a lack of CISO e ...more
Ludmila Morozova-Buss

More quotes...
Technical books for review Hello friends! Join us, and review our latest books on IT and applied technologies. To grab yo…more
24 members, last active 14 years ago
Agape Book Club Business and Leadership Book Club Monthly Business Book Review, Discussion, Author Interviews, B…more
2 members, last active 7 years ago
This is the place to find, discuss, and review cybersecurity and privacy related books. These ar…more
3 members, last active one year ago
Read about Information Technology A community for book lovers to share, discuss, and discover amazing reads. Whether you enjoy fic…more
1 member, last active 4 months ago