Sponsored links


Valid XHTML 1.0!
Valid CSS!



Product: Book - Paperback
Title: Eclipse: Building Commercial-Quality Plug-ins (Eclipse Series)
Publisher: Addison-Wesley Professional
Authors: Eric Clayberg, Dan Rubel
Rating: 5/5
Customer opinion - 5 stars out of 5
great book for serious Eclipse developers


This is a great book for serious Eclipse developers. I saw these guys speak at an Eclipse gathering in Portland last November, and when I heard they were writing a book I immediately lobbied to be an official reviewer. (I wanted to know what they knew as fast as possible...)
The online resource for this book at qualityeclipse.com is also a useful source for Eclipse tools and information.



Product: Book - Paperback
Title: SSH, The Secure Shell: The Definitive Guide
Publisher: O'Reilly
Authors: Daniel J. Barrett, Richard Silverman
Rating: 4/5
Customer opinion - 4 stars out of 5
Truly definitive and essential for Unix or Linux owners


SSH has quickly become the tool of choice for remotely administering a Unix (or for that matter) Linux computer, replacing telnet, rsh and ftp. This is for good reason, these tools can easily become security holes and it is much easier to keep one tool well maintinaed and secure than a number.
SSH gives improved security, both at login and of the data transmitted between computers. SSH offers both security and privacy, rare things online today. It allows secure communications between computers. SSH allows users to authenticate themselves to remote hosts. After authentication, users can securely execute commands on a remote machine. SSH fills in for the security deficiencies that are inherent in earlier methods. SSH was developed in response to the vulnerability to attack in earlier remote login and control methods. Some of these vulnerabilities include password and protocol sniffing, spoofing, eavesdropping and connection hijacking. Simply, it is the protocol of choice for secure communications between two computers across internet connections.
Administering and running SSH can be a pain. As the book points out it is a simple concept with complex parts. It took me a good three or four hours for my first connection to a remote computer and another two to get SSH logins working on my computer. This book was an excellent assist throughout.
It covers the three varieties of SSH (SSH 1, SSH2 and Open SSH), giving the differences and benefits of the versions. The book also shows how SSH can be used to secure other protocols, such as POP, SMTP, IMAP, and others.
It also gives detailed explanations of what SSH secures against and, perhaps more importantly, what it doesn't secure against. It explains the key technology and how you can integrate your SSH connections into a Public Key Infrastructure.
I also found the Troubleshooting and Quick Reference sections extremely useful, worth the price of the book on their own.
It does all this in a straight forward and well written manner, covering all the details without treating you like a dummy. The book is extremely well structured and formatted, introducing topics in a methodical way.
I had no need for the sections on various ports of SSH to Windows or the Macintosh prior to OS X, but they read well and seem to cover the topic as well as the other sections. So far I've used SSH assisted this book to connect between my Macintosh running OS X and a Linux host, between a Linux computer and a Linux host and a Linux computer and my OS X Macintosh running as host. While their were minor problems with each of these they were quickly sorted out using the information and troubleshooting sections of this book.
In conclusion, SSH is not a simple topic and this book covers it superbly. I would recommmend it to anyone using or administering SSH. It's one flaw is that it can be a little heavy and hard to understand, though not overly so. I have therefore given it only four stars.



Product: Book - Paperback
Title: Head First Servlets & JSP
Publisher: O'Reilly
Authors: Bryan Basham, Kathy Sierra, Bert Bates
Rating: 3/5
Customer opinion - 3 stars out of 5
Not my style


This book is cute but they went too far. Its a bit silly and inefficient. I tried reading a few chapters and sent it back. Its also much bulkier than it should be; there's a lot of wasted space. However if you like this type of book, give it a try. I'm sure it is accurate and that is certainly a plus!



Product: Book - Paperback
Title: ASP.NET Unleashed, Second Edition
Publisher: Sams
Authors: Stephen Walther
Rating: 5/5
Customer opinion - 5 stars out of 5
Pretty much the best and most in-depth ASP.NET book out


Who I wouldn't recommend this book for: very, very advanced ASP.NET programmers. Whom I would: everyone else. Yes, it really is that good. The code examples are useful, very readable, and not skimped on at all; plus, every piece of code (covering everything from tracing to inheritance to custom server controls to error handling to...) is included in both VB.NET and C# on the accompanying CD-Rom. I have about 20-25 ASP.NET books and this is the most useful. It's a big book, but not foreboding and dense by any means; if you're reading this review, chances are you'd benefit from this book.