Sponsored links

Valid XHTML 1.0!
Valid CSS!

Product: Book - Paperback
Title: Malware: Fighting Malicious Code
Publisher: Prentice Hall PTR
Authors: Ed Skoudis, Lenny Zeltser
Rating: 5/5
Customer opinion - 5 stars out of 5
Best available

This book provides the best review of malicious software that is presently available. If you need a comprehensive reference then this is the book for you. The author is a well-known and respected security analyst and this book provides solid information at a level suitable for the system administrator. Unlike so many books of this type, it is not a camouflaged endorsement of some vendor's products or a simplistic and alarmist text.

Topics covered include:
- viruses, with a brief history and description of the various types and their mechanisms;
- worms, again with a brief history and description of the various types and their mechanisms;
- mobile code, including browser scripts, ActiveX controls, Java applets and mobile code as it occurs in email clients and distributed applications. Given the increasing amount of mobile code, this is particularly valuable;
- backdoors, particularly Netcat and VNC but covering some others as well;
- trojans inlcuding wrappers, source poisoning and browser co-option;
- rootkits for Unix andWindows;
- kernel-mode rotkits for linux and Windows;
- possible modes, including BIOS and microcode attacks.

"Encyclopediac" is the only description I can give, but be warned that it's not for the general reader, or for newbies.

Product: Book - Paperback
Title: XSLT : Programmer's Reference (Programmer to Programmer)
Publisher: Wrox
Authors: Michael Kay
Rating: 5/5
Customer opinion - 5 stars out of 5
Great Online Support

This is a great book, as the other reviewers have noted. One thing that is particularly impressive is the fact that this book has great online support (as of June, 2001 anyway).
Just go to the website ... (mentioned in the book) and follow the links to join the newsgroup. You can follow the current discussion on XSLT issues and post your own questions, related to the book or not (quote page numbers and everything, if you like). Michael Kay himself answers many of the posts.
I've never seen an author so interested in following up with his readers and the issues they have with his book and the topic in general. I'm impressed!

Product: Book - Paperback
Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Publisher: Anchor
Rating: 5/5
Customer opinion - 5 stars out of 5
This book is a well-written history of cryptography.

I read Singh's Fermat's Enigma and loved it. This book is also great. The text describes in understandable terms the science of cryptography. Examples of what is being described are provided throughout the book. Singh has managed to create a fascinating account of the evolution of cryptology and he shows how significant historical events were effected by the use of codes. Despite the technical content of some of the material, Singh has created an easily readable absorbing book.

Product: Book - Hardcover
Title: The Art of Deception: Controlling the Human Element of Security
Publisher: Wiley
Authors: Kevin D. Mitnick, William L. Simon, Steve Wozniak
Rating: 3/5
Customer opinion - 3 stars out of 5
Make sure you don't get hacked

Don't support this con-man any more than you have to. Go to the library and read it there, or find a nice coffee/book shop and read it in-store. If you have to own it, buy the book used.
These strategies will help you reap the "benefit" of this book just as much as anyone else and the author and publisher only get paid once. Share the love!
In short, I don't believe in legitimizing Mitnick's criminal past by turning his exploits, stories and strategies into "advice" for those of us that should already know better. However if you're interested in the subject then you might as well read the book.