Sponsored links


Valid XHTML 1.0!
Valid CSS!



Product: Book - Paperback
Title: Visual Basic.NET How to Program, Second Edition
Publisher: Prentice Hall
Authors: Harvey M. Deitel, Paul J. Deitel, Tem R. Nieto
Rating: 4/5
Customer opinion - 4 stars out of 5
Too example driven for my liking but has ALOT of content


I like examples, but I feel this book goes a little overboard. I find the layout of the pages hard a little on the difficult side as well. I'm not quite sure what it is, but the combination of SO many examples and the layout just made me have to put this book down and look elsewhere initially.Sometimes I'm just looking for a textual summary of a topic, and not have to plough through the example to figure out what could have been said as text on the page (in addition to the example).
That being said I keep coming back to this book as a reference because it contains SO much information...it's just not that easy to read from cover to cover like osme others.Still, it does contain ALOT of information...if you can handle the format and like LOTS of example code then you'll probably be in heaven.
For me "Coding techniques for MS Visual Basic .NET" was alot more concise and easier to read, albeit not hitting quite the ammount of detail that this book goes into in topics such as threading etc.
So in summary, not a BAD book, The layout is not brilliant but it is very information rich.



Product: Book - Paperback
Title: The Tao of Network Security Monitoring : Beyond Intrusion Detection
Publisher: Addison-Wesley Professional
Authors: Richard Bejtlich
Rating: 5/5
Customer opinion - 5 stars out of 5
Excellent addition to your network security bookshelf...


If you want to take your network security monitoring to the next level, check out The Tao Of Network Security Monitoring by Richard Bejtlich. It does a good job covering new ground.

Chapter list: The Security Process; What Is Network Security Monitoring?; Deployment Considerations; The Reference Intrusion Model; Full Content Data; Additional Data Analysis; Session Data; Statistical Data; Alert Data: Bro and Prelude; Alert Data: NSM Using Sguil; Best Practices; Case Studies For Managers; Analyst Training Program; Discovering DSN; Harnessing The Power Of Session Data; Packet Monkey Heaven; Tools For Attacking Network Security Monitoring; Tactics For Attacking Network Security Monitoring; The Future Of Network Security Monitoring; Protocol Header Reference; Intellectual History Of Network Security Monitoring; Protocol Anomaly Detection; Index

A sign of a good book is when the author sets out their scope and target audience, and then doesn't stray from it. Bejtlich doesn't try to teach the reader every last thing about every package he can include. Rather, he defines the scope as open source monitoring tools that haven't been written about ad nauseam. Furthermore, there's no wasted space covering installation instructions. He figures you can read the documentation for that. So what you get is meaty information on how to conduct network security monitoring (NSM) using the different packages that are available.

Another nice portion of the book includes the case studies and the analyst training. This not only entertaining reading, but it also bridges the gap between just knowing about the subject to being able to practice those skills as part of your occupation. Very nice feature...

An excellent addition to your network security bookshelf...



Product: Book - Paperback
Title: Tricks of the Windows Game Programming Gurus
Publisher: Sams
Authors: Andre Lamothe
Rating: 5/5
Customer opinion - 5 stars out of 5
Tricks of the Windows Game Programming Gurus - AWESOME


Andre LaMothe is by far and away the best programming author I have read. Clear, concise examples and complete source code.
Very well done!
I can't wait for the 2nd volume!



Product: Book - Hardcover
Title: Graph Theory and Its Applications
Publisher: CRC Press
Authors: Jay Yellen, Jonathan L. Gross
Rating: 5/5
Customer opinion - 5 stars out of 5
A great link between math and computer sciences


Professors Gross and Yallen have written a great book on "practical" graph theory that can be used in math or computer sciences courses alike. The book is very well organized and its chapters can be read on almost any sequence, allowing instructors to skip sections or give special emphasis to certain more interesting subjects.
The text can be used in a one semester introductory graduate course in graph theory in a CS or math department, an advanced undergraduate seminar or as a reference book for an undergraduate course in discrete math.
Of special interest are the sections on Huffman trees and voltage graphs. The section on Hoffman trees is especially interesting to computer scientists. I believe this is the first book that devotes an entire section to the theoretical treatment of this very useful subject. Prof. Gross is a pioneer in voltage graphs and the treatment of this somewhat esoteric subject is lucid and complete.
Overall this textbook is excellent. The writing is clear and precise and the knowledge needed to read it is that of an advanced undergraduate student. However, the book could benefit from solutions to the exercises, or at least some selected exercises, some computer sciences oriented "practical" examples and projects and an instructor's manual.