Hack Recruiting


Book Description

Praise for Hack Recruiting "It is a brilliant piece of work. A must-read for those of us in global corporations, or companies of any size really, that seek to act NOW." --Julia Martensen, Head of HR Strategy and Innovation at DB Schenker. "Victor Assad uncovers longstanding empirical research from I/O psychologists on how to best match job candidates to jobs and the best of today's digital technology. He sees a world (that is emerging today) in which AI ontologies (which are identifying information and relationships about today's global and diverse workforces) will make significant improvements for matching candidates to jobs while reducing recruiting cycle times, costs and selection biases. Victor points out that HR now has the digital tools it needs to dramatically transform recruiting and the role of the recruiter. HR can now build strategic talent pools, improve the employee experience, and digitally collect insightful analytics that will open up a new era of understanding on what truly drives employee performance and innovation." --Angela Hood, Founder and CEO of ThisWay Global. "Must read book if you are a recruiter or talent acquisition head. It goes over best practices and hacks each step of recruiting." --Sandeep Purwar, Founder/CEO, Bevov




Hack Your Hiring


Book Description

If you are currently struggling with getting people to find and apply for your open positions, or effectively evaluating and hiring those who do apply, you may think it's a problem with job-seekers or the job market. After struggling as a startup executive and becoming frustrated, Shaun P. Martin found that blaming the market and factors outside his control is little more than a convenient excuse. Poor hiring results are just symptoms of a bigger problem: A broken recruiting machine. That's the bad news. The good news is that fixing the machine is a lot easier than you think, and it's all within your control as a leader. Hack Your Hiring will give you the tools and strategies you need to identify, evaluate and close the A+ Talent your organization needs to grow and thrive.




HACK THE JOB


Book Description

One of the simple hacks shared in this book helped the author move from a $22,000 a year job to a $65,000 a year job in one month. Just one hack was worth $43,000! While such results are not typical or guaranteed, one of these hacks may be just what you need to kick start, boost, salvage or secure your career. Employment has turned into a high-speed roller coaster ride for employees over the last couple of years. And job automation is snatching away their safety restraints midway exposing them to the real threat of a dangerous plunge. Employees have to throw away the old rulebook and instead hack their way to success and security in a lopsided battle for jobs against intelligent machines in what is predicted to be an unprecedentedly competitive future. Over 2100 years of collective experiences of employees around the world are bundled into this comprehensive yet practical hack book! This indispensable book arms you with powerful hacks that you can apply to: Gain clarity on the fundamental reasons why you work or want a job Find your first or next dream job by confidently clearing interviews Transform your current job into a dream job by bridging the gap Become the master key that can unlock any type of Boss Recognize what your organization really expects from its employees Gain insight into what happens behind the scenes in management Determine if it’s time to consider a job or career change Ace your performance appraisals to receive the highest rating Get elevated to higher positions quickly Obtain the maximum hike percentages and bonuses Salvage and boost a stagnating career Minimize your chances of being fired or laid off Bounce back quickly from a job loss situation Adopt the right strategy to ride the job automation wave Minimize stress and achieve a better work-personal life balance Deal with a mid-life or mid-career crisis “If an employee will read only one book in an entire lifetime, it has to be this one!”




Hacking Growth


Book Description

The definitive playbook by the pioneers of Growth Hacking, one of the hottest business methodologies in Silicon Valley and beyond. It seems hard to believe today, but there was a time when Airbnb was the best-kept secret of travel hackers and couch surfers, Pinterest was a niche web site frequented only by bakers and crafters, LinkedIn was an exclusive network for C-suite executives and top-level recruiters, Facebook was MySpace’s sorry step-brother, and Uber was a scrappy upstart that didn’t stand a chance against the Goliath that was New York City Yellow Cabs. So how did these companies grow from these humble beginnings into the powerhouses they are today? Contrary to popular belief, they didn’t explode to massive worldwide popularity simply by building a great product then crossing their fingers and hoping it would catch on. There was a studied, carefully implemented methodology behind these companies’ extraordinary rise. That methodology is called Growth Hacking, and it’s practitioners include not just today’s hottest start-ups, but also companies like IBM, Walmart, and Microsoft as well as the millions of entrepreneurs, marketers, managers and executives who make up the community of Growth Hackers. Think of the Growth Hacking methodology as doing for market-share growth what Lean Start-Up did for product development, and Scrum did for productivity. It involves cross-functional teams and rapid-tempo testing and iteration that focuses customers: attaining them, retaining them, engaging them, and motivating them to come back and buy more. An accessible and practical toolkit that teams and companies in all industries can use to increase their customer base and market share, this book walks readers through the process of creating and executing their own custom-made growth hacking strategy. It is a must read for any marketer, entrepreneur, innovator or manger looking to replace wasteful big bets and "spaghetti-on-the-wall" approaches with more consistent, replicable, cost-effective, and data-driven results.




High Growth Handbook


Book Description

High Growth Handbook is the playbook for growing your startup into a global brand. Global technology executive, serial entrepreneur, and angel investor Elad Gil has worked with high-growth tech companies including Airbnb, Twitter, Google, Stripe, and Square as they’ve grown from small companies into global enterprises. Across all of these breakout companies, Gil has identified a set of common patterns and created an accessible playbook for scaling high-growth startups, which he has now codified in High Growth Handbook. In this definitive guide, Gil covers key topics, including: · The role of the CEO · Managing a board · Recruiting and overseeing an executive team · Mergers and acquisitions · Initial public offerings · Late-stage funding. Informed by interviews with some of the biggest names in Silicon Valley, including Reid Hoffman (LinkedIn), Marc Andreessen (Andreessen Horowitz), and Aaron Levie (Box), High Growth Handbook presents crystal-clear guidance for navigating the most complex challenges that confront leaders and operators in high-growth startups.




Linux Basics for Hackers


Book Description

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment. First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password cracker Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?




Hackers & Painters


Book Description

The author examines issues such as the rightness of web-based applications, the programming language renaissance, spam filtering, the Open Source Movement, Internet startups and more. He also tells important stories about the kinds of people behind technical innovations, revealing their character and their craft.







Hacking Your Education


Book Description

It’s no secret that college doesn’t prepare students for the real world. Student loan debt recently eclipsed credit card debt for the first time in history and now tops one trillion dollars. And the throngs of unemployed graduates chasing the same jobs makes us wonder whether there’s a better way to “make it” in today’s marketplace. There is—and Dale Stephens is proof of that. In Hacking Your Education, Stephens speaks to a new culture of “hackademics” who think college diplomas are antiquated. Stephens shows how he and dozens of others have hacked their education, and how you can, too. You don’t need to be a genius or especially motivated to succeed outside school. The real requirements are much simpler: curiosity, confidence, and grit. Hacking Your Education offers valuable advice to current students as well as those who decided to skip college. Stephens teaches you to create opportunities for yourself and design your curriculum—inside or outside the classroom. Whether your dream is to travel the world, build a startup, or climb the corporate ladder, Stephens proves you can do it now, rather than waiting for life to start after “graduation” day.




The Pentester BluePrint


Book Description

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties