Secrets and Leaks


Book Description

Secrets and Leaks examines the complex relationships among executive power, national security, and secrecy. State secrecy is vital for national security, but it can also be used to conceal wrongdoing. How then can we ensure that this power is used responsibly? Typically, the onus is put on lawmakers and judges, who are expected to oversee the executive. Yet because these actors lack access to the relevant information and the ability to determine the harm likely to be caused by its disclosure, they often defer to the executive's claims about the need for secrecy. As a result, potential abuses are more often exposed by unauthorized disclosures published in the press. But should such disclosures, which violate the law, be condoned? Drawing on several cases, Rahul Sagar argues that though whistleblowing can be morally justified, the fear of retaliation usually prompts officials to act anonymously--that is, to "leak" information. As a result, it becomes difficult for the public to discern when an unauthorized disclosure is intended to further partisan interests. Because such disclosures are the only credible means of checking the executive, Sagar writes, they must be tolerated, and, at times, even celebrated. However, the public should treat such disclosures skeptically and subject irresponsible journalism to concerted criticism.







Mismanagement, “Jumpers,” and Morality


Book Description

This book is a longitudinal multi-site anthropological study of automatic cotton gin plants, exposing the roots of amoral corporate leadership and explaining recent business scandals by managers’ low-moral choices while advancing to top-level jobs. It shows the latest state of knowledge on the topic and will be of interest to management and leadership scholars of all social sciences and for historians, and especially for co-operative scholars. It addresses the topics with regard to sociology and management studies and will be of interest to researchers, academics, and students in the fields of trust, leadership, management, and organisation control.




Joan's Greatest Administrative Secrets Revealed


Book Description

In this book, Joan Burge, the pioneer of administrative excellence exposes the game-changing truths and unwritten rules you need to know in order to maximize your potential. Joan shares never before revealed career stories and life lessons that will teach you how to master your craft and triumph in today's business environment.




Bad Blood


Book Description

NATIONAL BESTSELLER • The gripping story of Elizabeth Holmes and Theranos—one of the biggest corporate frauds in history—a tale of ambition and hubris set amid the bold promises of Silicon Valley, rigorously reported by the prize-winning journalist. With a new Afterword covering her trial and sentencing, bringing the story to a close. “Chilling ... Reads like a thriller ... Carreyrou tells [the Theranos story] virtually to perfection.” —The New York Times Book Review In 2014, Theranos founder and CEO Elizabeth Holmes was widely seen as the next Steve Jobs: a brilliant Stanford dropout whose startup “unicorn” promised to revolutionize the medical industry with its breakthrough device, which performed the whole range of laboratory tests from a single drop of blood. Backed by investors such as Larry Ellison and Tim Draper, Theranos sold shares in a fundraising round that valued the company at more than $9 billion, putting Holmes’s worth at an estimated $4.5 billion. There was just one problem: The technology didn’t work. Erroneous results put patients in danger, leading to misdiagnoses and unnecessary treatments. All the while, Holmes and her partner, Sunny Balwani, worked to silence anyone who voiced misgivings—from journalists to their own employees.




The President's Book of Secrets


Book Description

Every president has had a unique and complicated relationship with the intelligence community. While some have been coolly distant, even adversarial, others have found their intelligence agencies to be among the most valuable instruments of policy and power. Since John F. Kennedy's presidency, this relationship has been distilled into a personalized daily report: a short summary of what the intelligence apparatus considers the most crucial information for the president to know that day about global threats and opportunities. This top-secret document is known as the President's Daily Brief, or, within national security circles, simply "the Book." Presidents have spent anywhere from a few moments (Richard Nixon) to a healthy part of their day (George W. Bush) consumed by its contents; some (Bill Clinton and George H. W. Bush) consider it far and away the most important document they saw on a regular basis while commander in chief. The details of most PDBs are highly classified, and will remain so for many years. But the process by which the intelligence community develops and presents the Book is a fascinating look into the operation of power at the highest levels. David Priess, a former intelligence officer and daily briefer, has interviewed every living president and vice president as well as more than one hundred others intimately involved with the production and delivery of the president's book of secrets. He offers an unprecedented window into the decision making of every president from Kennedy to Obama, with many character-rich stories revealed here for the first time.




Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition


Book Description

Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization’s security posture using the proven defense strategies in this thoroughly updated guide. Hacking ExposedTM Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker’s latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology. • Learn how malware infects, survives, and propagates across an enterprise • See how hackers develop malicious code and target vulnerable systems • Detect, neutralize, and remove user-mode and kernel-mode rootkits • Use hypervisors and honeypots to uncover and kill virtual rootkits • Defend against keylogging, redirect, click fraud, and identity theft • Block spear phishing, client-side, and embedded-code exploits • Effectively deploy the latest antivirus, pop-up blocker, and firewall software • Identify and stop malicious processes using IPS solutions