Sponsored links


Valid XHTML 1.0!
Valid CSS!



Product: Book - Hardcover
Title: Understanding and Deploying LDAP Directory Services (2nd Edition)
Publisher: Addison-Wesley Professional
Authors: Timothy A. Howes, Mark C. Smith, Gordon S. Good, Tim Howes
Rating: 1/5
Customer opinion - 1 stars out of 5
Non technical book


LDAP and LDAP implementation explained in plain English. A big book with as much information as you could possibly need. It makes a handy reference guide or can be read from start-to-finish. It won't make you an LDAP guru overnight, but maybe in a couple of days.



Product: Book - Hardcover
Title: Software Architecture in Practice, Second Edition
Publisher: Addison-Wesley Professional
Authors: Len Bass, Paul Clements, Rick Kazman
Rating: 5/5
Customer opinion - 5 stars out of 5
A Bible for Software Architects


Being a Software Architect, I can certainly appreciate the work that the authors of this book (L. Bass, P. Clements, R Kazman) have put into this book. Software Architecture in Practice is probably the best book that I have read on the theory and practice of architecture design and software engineering. There is no fair way for me to review this book as it is PACKED with useful information from beginning to the very end. It has a combination of high-level architectural concepts tailored with best software engineering practices. It is not a complete book on software engineering, but it wasn't meant to be - it's meant to cover a very specific topic in software engineering and it does so extremely well. It is a text in which the concepts architecting software applications, evaluating architectures thru various methods, and case studies of major leaps in software architecture have been very well described; depicted and well evaluated. The book is written from an architect's point of view, and it shows how an architect or a group of architects can make or break an organization, and what they need to do in order to be successful. The authors of this book explain why simply architecting something is not good enough and lots of work needs to be done before and after the architectural phase to ensure the quality and the success of the project. This aspect of the book is simply priceless.
The author start by describing software architecture as:
"The Software Architecture of a program or computing system is the structure or structures of the system, which compromise software elements, the externally visible properties of those elements, and the relationships between them."
Throughout the book, the author used this definition to describe various aspects of architecture. One of the methods/techniques that the author uses is called the Architecture Business Cycle (ABC). ABC is method of realizing the "things" that influence the architect and in-turn the architecture - known as the circle of influences. This concept, ABC, is used for all the case studies mentioned in this book: · A case study on a system that have extreme safety requirements - the Air traffic control.· A case study on a system with high level of distribution of its subsystems - A flight simulator · A case study in which it was essential for the organization to be able to share documents instantaneously.· A case study on an organization where one architecture lead to a product line of applications· A case study on the need to standardization of architectural approaches across organizations and the community - J2EE and the EJB.
For each case study, the authors depict its ABC and give the reader the reason, business reason, that this project got started to begin with. The reader then walks thru a series of decision-making steps that led to the architecture that was finally chosen. The drivers of the project, the business reason, the architect[s], and the organization are all linked and the authors go into a GREAT DETAIL on how this link can influence the final design.
Architecture Tradeoff Analysis Method or ATAM is a new topic that is added to the second edition of the book. ATAM is a structured method of evaluating architectures.
"It results in a list of risks that the architecture will not meet its business goals"
The authors start by describing the roles and responsibilities of people involved in ATAM, and the output artifacts that ATAM will produce when completed:
· A Concise presentation of the Architecture· Articulation of the business goals· Quality requirements in terms of collection of scenarios· Mapping of architectural decisions to quality requirements· A set of identified sensitivity and tradeoff points· A set of risks and non-risks· A set of risk themes.
The process of ATAM is depicted next in which there are a total of 4 phases:
1) Partnership and preparation: the key project decision makers informally meet to work out the details of the ATAM process. 2) Evaluation phase - the long evaluation process of the architecture with the same project decision makers as in previous phase3) Evaluation phase, continued - this time the stakeholders are present4) Follow up - the stakeholders and the evaluation team meets again to follow up.
The process is described very well and examples forms are shown in the book that can be used for your evaluation process. The great thing about this chapter and how it's written is the way that the ATAM process is presented. It is almost like a checklist that the architects need to follow. Very easy to read and follow. The inputs of every phase are clearly identified, and the description of the output is depicted rather clearly. The chapter ends with yet another case study that shows the "theory" just presented. The authors close the chapters by having the following comments about this book:· ATAM is not an evaluation of Requirements, but only the architecture· ATAM is not a code evaluation· ATAM does not actually involved system testing· ATAM is not a practice instrument, but identifies possible areas of risk within the architecture. The ATAM is followed by another very well written topic on CBAM (Cost Benefit Analysis Method). This chapter is also new in this edition, but I will leave the details of this chapter for the reader. I like the ATAM method more than the CBAM, because it seems simpler to me. All and all, the authors in this book did a fantastic job in writing this book. This book is packed with useful information for architects, project leads, and even technical managers.



Product: Book - Paperback
Title: Programming PHP
Publisher: O'Reilly
Authors: Rasmus Lerdorf, Kevin Tatroe
Rating: 4/5
Customer opinion - 4 stars out of 5
good stuff


easy to read and very illuminating on the working of PHP, however, I was hoping for more dirty details and advanced examples. Basically a thicker book would have made me happy



Product: Book - Paperback
Title: Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition (Hacking Exposed)
Publisher: McGraw-Hill Osborne Media
Authors: Stuart McClure, Joel Scambray, George Kurtz
Rating: 5/5
Customer opinion - 5 stars out of 5
Extreme Hacking Guide


This is book is a really good book, if your seeking knowledge on how to protect your computer, in the past I had malicious hackers perform many attacks on my computer, some DoS, some just TCP port probes, I now no longer have to worry about such attacks! thanks to the authors.