Best Selling Books by James Ransome

James Ransome is the author of The Bell Rang (2019), My Teacher (2012), Core Software Security (2018), Building in Security at Agile Speed (2021), Cybertax (2023).

15 results found

The Bell Rang

release date: Jan 15, 2019
The Bell Rang
Recipient of a Coretta Scott King Illustrator Honor Award A Kirkus Reviews Best Picture Book of 2019 A young slave girl witnesses the heartbreak and hopefulness of her family and their plantation community when her brother escapes for freedom in this brilliantly conceived picture book by Coretta Scott King Award winner James E. Ransome. Every single morning, the overseer of the plantation rings the bell. Daddy gathers wood. Mama cooks. Ben and the other slaves go out to work. Each day is the same. Full of grueling work and sweltering heat. Every day, except one, when the bell rings and Ben is nowhere to be found. Because Ben ran. Yet, despite their fear and sadness, his family remains hopeful that maybe, just maybe, he made it North. That he is free. An ode to hope and a powerful tribute to the courage of those who ran for freedom, The Bell Rang is a stunning reminder that our past can never be forgotten.

My Teacher

release date: Jan 01, 2012
My Teacher
A great teacher is the best gift of all, according to the narrator of this warm look inside an urban classroom. Full color.

Core Software Security

release date: Oct 03, 2018
Core Software Security
"... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."—Dr. Dena Haritos Tsamitis. Carnegie Mellon University"... a must read for security specialists, software developers and software engineers. ... should be part of every security professional’s library." —Dr. Larry Ponemon, Ponemon Institute"... the definitive how-to guide for software security professionals. Dr. Ransome, Anmol Misra, and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process. ...A must-have for anyone on the front lines of the Cyber War ..." —Cedric Leighton, Colonel, USAF (Ret.), Cedric Leighton Associates"Dr. Ransome, Anmol Misra, and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source! "—Eric S. Yuan, Zoom Video CommunicationsThere is much publicity regarding network security, but the real cyber Achilles’ heel is insecure software. Millions of software vulnerabilities create a cyber house of cards, in which we conduct our digital lives. In response, security people build ever more elaborate cyber fortresses to protect this vulnerable software. Despite their efforts, cyber fortifications consistently fail to protect our digital treasures. Why? The security industry has failed to engage fully with the creative, innovative people who write software. Core Software Security expounds developer-centric software security, a holistic process to engage creativity for security. As long as software is developed by humans, it requires the human element to fix it. Developer-centric security is not only feasible but also cost effective and operationally relevant. The methodology builds security into software development, which lies at the heart of our cyber infrastructure. Whatever development method is employed, software must be secured at the source. Book Highlights: Supplies a practitioner''s view of the SDL Considers Agile as a security enabler Covers the privacy elements in an SDL Outlines a holistic business-savvy SDL framework that includes people, process, and technology Highlights the key success factors, deliverables, and metrics for each phase of the SDL Examines cost efficiencies, optimized performance, and organizational structure of a developer-centric software security program and PSIRT Includes a chapter by noted security architect Brook Schoenfield who shares his insights and experiences in applying the book’s SDL framework View the authors'' website at http://www.androidinsecurity.com/

Building in Security at Agile Speed

release date: Apr 20, 2021
Building in Security at Agile Speed
Today''s high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S.E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately, humans generate software security. People collectively act through a particular and distinct set of methodologies, processes, and technologies that the authors have brought together into a newly designed, holistic, generic software development lifecycle facilitating software security at Agile, DevOps speed. —Eric. S. Yuan, Founder and CEO, Zoom Video Communications, Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. —Jennifer Sunshine Steffens, CEO of IOActive Both practical and strategic, Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical, but deeply human elements of agile ways of working. —Jorgen Hesselberg, author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. —George K Tsantes, CEO of Cyberphos, former partner at Accenture and Principal at EY Detailing the people, processes, and technical aspects of software security, Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed, managed, and exploited by humans. This book presents a step-by-step process for software security that uses today’s technology, operational, business, and development methods with a focus on best practice, proven activities, processes, tools, and metrics for any size or type of organization and development practice.

Cybertax

release date: Apr 20, 2023
Cybertax
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax—Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non–cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C’s for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leaderships’ attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.

A Place for Us

release date: Aug 05, 2025
A Place for Us
A poignant wordless picture book about a homeless boy and his mom, by Children''s Literature Legacy Award winner James Ransome When a little boy''s mom picks him up from school, his day seems a lot like any other kid''s. He and his mom go out for some fast food and then head to the library. But when they stay there till closing time, and then go to the park, we learn more. Through the lens of Ransome’s evocative illustrations we see that they ate out because they don''t have a kitchen to cook in. They went to the library because they don''t have a quiet space to do homework. And at night, they settle in to sleep on a bench in a city park because they don''t have a home. The next morning, they are awakened by the rising sun, Mom’s bag is full of clean clothes, and there’s a fountain for washing up--and finally they are ready for the walk to school. His classmates may or may not know about his living situation, but what shines throughout the story is the deep love he and his mom have for each other.

New Red Bike!

release date: Jan 01, 2011
New Red Bike!
Tom enjoys the thrill of riding his brand new bicycle, and then shares it with a friend.

Do Like Kyla

Do Like Kyla
A little girl imitates her big sister Kyla all day, until in the evening Kyla imitates her.

Glossary for Computer Information Systems

release date: Jan 01, 1990

杰德爷爷的理发店

release date: Jan 01, 2012
15 results found


  • Aboutread.com makes it one-click away to discover great books from local library by linking books/movies to your library catalog search.

  • Copyright © 2025 Aboutread.com