5 Evolutions for Sustainable Weight Loss

5 Evolutions for Sustainable Weight Loss
ISBN: 9781505297362 (softcover first printing 2014) in e-book form by Dr. Tommy Voris, The Anti-Diet Doctor.

This is a book describing a step by step program for substantial weight loss and its maintenance. The method concentrates on how to “evolve your mind to transform your body” to accomplish the objective. It is divided into five evolutionary stages entitled Power, Emotions, Belief, Fear and Cravings. Extensive explanations and examples are provided to support each division, and myriad suggestions are set forth that will allow the reader to accomplish her/his desired effect. Included are numerous examples of how the author developed the system from his own personal struggles as well as with thoughts he gleaned from mentors and friends. It also is replete with pertinent quotations from Socrates and Einstein to contemporaries such as Tiger Woods, Michael Jordan, Muhammed Ali and others. Additionally, the making of lists pertinent to each activity addressed by the subject along with simple reasons for the logic for doing so is a most viable suggestion.

Discussion: This is another in the growing number of self- help or ‘how-to’ volumes appearing in the last few years. Ostensibly set forth to provide a weight loss and maintenance program primarily for women, it certainly presents viable suggestions equally pertinent to men. Also as set forth, the program goes beyond simple weight control and can be applied to one’s total life. Specifically, the methodology relies heavily on modifying the individual’s strongly ingrained mental patterns by use of introspective analysis and intensive self-evaluation to understand the reasons for the faulty activity and to remedy it by gradual development of counter actions and self-discipline along with large amounts of positive thinking. The repetitive making of lists and their review would appear to be a most helpful suggestion.

Conclusion: Presentation of this material seems somewhat unusual in that it has been authored by other than a therapist trained in the usual mental disciplines per se. However, and perhaps because of this, its ‘homey’ touch with countless personal references certainly could provide an empathy that should make it most effective with certain readers. The author has seized the essence of the importance of what is required to effect change as well as championing the extensive power provided by positive thinking – both difficult for most to acquire/maintain without sustained assistance. There is much redundancy in the book which is largely excusable. The author lectures widely and it is a common practice for emphasis employed by all lecturers, but difficult (annoying?) for reading.

4* A most viable program for certain readers; some reservations.

 

No More Magic Wands

No More Magic Wands

Dec 16, 2016John H. ManholdAll Reviews, Business, Non Fiction, Political, Reference, Self-Help, Social Issues

No More Magic Wands ISBN: 9781533538923, an e-book by George Finney.

The book begins with a statement heard almost ad nauseam: “Security is everyone’s job.” This follows with another truism: “That’s what we say as security professionals. But we don’t always act like we believe it. It really does take everyone working in concert to make an organization truly secure. Why, then, do we do so little to enable those outside the cybersecurity field to do their part of the universal security job?” The author continues to enumerate the perfunctory band aids usually provided and then provides a summary statement: “If security is everyone’s job, everyone needs the right tools to actually do the job. Not some of the tools. Not a little of the information. All of it.” He then proceeds to provide the reader with all of the tools AND information required to establish a secure cyber site.

Discussion: First, the material is presented by a man whose credits would appear to make him eminently qualified to furnish information to secure a cyber network. Second, he has set forth chapters that describe in detail the necessities to obtain/maintain cybersecurity, chapter summaries, important takeaway points, open-ended questions and a final summation of the presentation. Third, and perhaps most importantly for presentation of a subject most people just ‘wish would go away’, he has used quite adroitly simple stories in a parable like manner as a lead into each point or series of points he wished to establish for each chapter. AND he has managed to do so in a quite inoffensively effective manner.

Conclusion: The author has delivered/emphasized the importance of a significant number of tools/activities and their interaction for the proper function of a cybersecurity system. This is especially well-worthwhile and a most timely contribution, not only for those intimately involved, but provides a better understanding for the populace of the extent of the problems existing in the international hacking about which the media so endlessly is bombarding today’s population.

5* Cybersecurity, its problems and solutions, cleverly presented.