Найти книгу
Войти

Задан пустой поисковый запрос

Не нашли книгу? Нажмите, чтобы добавить
Результаты поиска

Courtney Redman

Invisible Decisions: The Cost of Undefined Authority

Most law firms assume authority exists. It doesn't, it's assumed. And that assumption is quietly costing them every single day. Invisible Decisions: The Cost of Undefined Authority examines the operational dynamics that managing partners rarely see but consistently feel: workflows that stall without explanation, decisions that keep climbing to the top, leadership time disappearing into questions that should have been answered two levels down, and clients who sense disorganization without being able to name why. Courtney Redman, founder of Legacy Contracts LLC, introduces the concept of decision gravity, the way unclear authority causes every unresolved question to naturally collapse toward whoever is perceived as being in control. For most law firms, that's the managing partner. The result is a leadership team stretched across billable hours and administrative friction simultaneously, while capable team members wait rather than act, not out of disengagement, but because the system never told them where their authority begins and ends. This book walks law firm managing partners and small firm owners through five interconnected areas: the difference between formal and operational decisions, the gap between responsibility, ownership, and authority, how decision gravity forms and what it actually costs, the hidden ways undefined authority leaks revenue and erodes client trust, and a clear, practical framework for making authority visible, one workflow at a time. This is not a theory book. It's a structural one. By the time you finish, you'll have the language to name what's been invisible in your firm and a concrete starting point for redesigning it. If you've sensed that something in your firm's operations isn't working but haven't been able to name it, this book is where that changes.

Lee Brotherston, Amanda Berlin

Defensive Security Handbook

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks. Learn fundamentals of starting or redesigning an InfoSec program Create a base set of policies, standards, and procedures Plan and design incident response, disaster recovery, compliance, and physical security Bolster Microsoft and Unix systems, network infrastructure, and password management Use segmentation practices and designs to compartmentalize your network Explore automated process and tools for vulnerability management Securely develop code to reduce exploitable errors Understand basic penetration testing concepts through purple teaming Delve into IDS, IPS, SOC, logging, and monitoring

Scott G. Leibowitz, Brooke Abbruzzese, Paul R. Adamus, Larry E. Hughes, Jeffrey T. Irish, Corvallis Environmental Research Laboratory, United States. Environmental Protection Agency. Office of Research and Development

A Synoptic Approach to Cumulative Impact Assessment