Sponsored links


Valid XHTML 1.0!
Valid CSS!



Product: Book - Paperback
Title: Search Engine Optimization for Dummies
Publisher: For Dummies
Authors: Peter Kent
Rating: 4/5
Customer opinion - 4 stars out of 5
A Wealth of Information


This is a great book. Although I had done some good research on the subject over the last couple of years this book taught me a lot.

SEO is very dynamic subject and the author did a great job explaining the ins and outs of it.

The only complaint I had was that the author kept promoting a tool that can be downloaded for "free" from Alexa. This tool (Alexa Toolbar) has been a known source for adware and spyware for some time now. Needless to say I did not download this tool.

I recommend this book to anyone wanting to learn about search engine optimization.



Product: Book - Paperback
Title: Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Publisher: Addison-Wesley Professional
Authors: William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin
Rating: 4/5
Customer opinion - 4 stars out of 5
A timeless intro to Unix security


While written in 1994 (with a second edition coming soon), I feel that this book is nevertheless a must read for people who are first getting into Unix network security. Many of the concepts covered here such as firewall design, software exploits, and hacker methodology apply to today as much as it did then. In addition, knowing the network security scene then helps those who are unfamiliar with the history of network security better appreciate how far things have come.
In those days, such Unix tools as SSH, Pam, and PGP were not widespread (and not covered in this book much), and instead people were still relying on the r-tools, telnet, and archie. Readers will find this rather nostalgic, but the threats posed by use of these tools is surprisingly relevent. Password sniffing ftp connections is a threat just as it is now, RPC and NFS are still major security threats and so on.
One thing that I felt did detract from this book was the somewhat excessive coverage of the authors own modified tools. I feel that altering the Unix tools to fit their security needs was brilliant, and an inspiration to other network security folks, but nonetheless the book had more detail on this topic than I felt was necessary.
On the other hand, I really enjoyed the coverage of hacker methodology. The "Berferd" chapter was truly a fun thing to read. In this chapter, you read about a real incident involving an infamous hacker at the time as he tries to penetrate the AT&T network, and the back and forth battle between the authors and the hacker. Very compelling.
Other chapters also cover hacker methodology very well too. This I feel is what seperates this book from other books. Its not enough to learn about security, because if you don't understand the "thought process" and the way hackers probe the system, then security won't mean much.
In short, the dedication the authors feel towards network security really shows in this book. For such a small book, I feel I learned alot, and have developed a greater appreciation for the ongoing struggle to defend networks from wily hackers. This book is really worth reading.



Product: Book - Paperback
Title: Visual Basic 6 How to Program
Publisher: Prentice Hall
Authors: Harvey M. Deitel, Paul J. Deitel, Tem Nieto, T.R. Nieto
Rating: 1/5
Customer opinion - 1 stars out of 5
If you are a real beginner DON'T BUY IT!!!!!!!!!!!!!


I am not a programmer, but I wanted to learn how to program in Visual Basic. I took a class and we supposed to use this book. But, we didn't. Because it is not a book for beginner. May be it is OK for programmers who want to learn a new language, but if you are new to programming - stay away!!! Even teacher said it is an advance VB, and he was giving us a material from his book. If you want to buy a good intro to VB book - get a "An Introducton to programming using Visual Basic 5.0" third edition. ... excelent!



Product: Book - Hardcover
Title: Information Security Management Handbook, Fifth Edition
Publisher: Auerbach Publications
Authors:
Rating: 4/5
Customer opinion - 4 stars out of 5
An excellent starting point for the CISSP exam


If you are studying for the CISSP or the new SSCP test, a good foundation on which to build is the Information Security Management Handbook. [Full Disclosure: I wrote one of the articles in the book].
The benefit of the book is that it is very broad in scope. Readers will be able to get a handle on the CBK (Common Body of Knowledge), on which the CISSP exam is based. Nonetheless, the breadth of the CBK means that the Handbook can't be simply read over a long weekend. It takes a lot of time to assimilate the myriad information.
Given that there is no comprehensive study guide for the exam, anyone planning on sitting for the CISSP exam will find himself or herself referring to the Handbook fairly often.
The only downside to the book is that since there are so many authors involved with the content of the book, there is a lack of consistent verbiage in it.
But even for those that don't plan on sitting for the CISSP exam, they will find that the Handbook is a great security reference.