Sponsored links


Valid XHTML 1.0!
Valid CSS!



Product: Book - Paperback
Title: Core Servlets and JavaServer Pages, Vol. 1: Core Technologies, Second Edition
Publisher: Prentice Hall PTR
Authors: Marty Hall, Larry Brown
Rating: 5/5
Customer opinion - 5 stars out of 5
This really is a good book.


I am new to J2EE and found this book useful. Very good examples and can be downloaded from the website mentioned in the book.



Product: Book - Hardcover
Title: Computer Graphics: Principles and Practice in C (2nd Edition)
Publisher: Addison-Wesley Professional
Authors: James D. Foley, Andries van Dam, Steven K. Feiner, John F. Hughes
Rating: 5/5
Customer opinion - 5 stars out of 5
A good use of my money


For someone new to the field of computer graphics, I was looking for a book that would provide me with a solid from-the-ground up discussion. This book meets and exceeds my expectations. The book is well structured and more than thorough enough for a newbie like myself. I like that the author explains not only how to do everything, but describes the various advantages and disadvantages of every technique, usually offering several different techniques to achieve the same result. I plan to read this book cover to cover and then again, there is so much good info.



Product: Book - Paperback
Title: Excel 2003 Formulas
Publisher: John Wiley & Sons
Authors: John Walkenbach
Rating: 5/5
Customer opinion - 5 stars out of 5
Walkenbach and Excel...a great combination!


Excel 2003 Formulas provides some amazing ways to really master Excel. Walkenbach's formulas are the best! He covers operators, naming techniques, debugging, auditing, developing custom VBA functions, array formulas, imported 1-2-3 files, etc. Oh, and the CD that comes with this one is load too!



Product: Book - Paperback
Title: Exploiting Software : How to Break Code
Publisher: Addison-Wesley Professional
Authors: Greg Hoglund, Gary McGraw
Rating: 5/5
Customer opinion - 5 stars out of 5
It rocks!


Yes, this is it! The book will rock the world of infosec! It is exclusive in so many different ways. Authors did write a bible of exploitation, conceptual, practical and very novel.
The book has great coverage of exploitation topics from basics onwards. Overall, it's an awesome book, perception changing and extremely enlightening (even if you are not into writing exploits for a living!). It is well written and easy to read (pretty much reads thru non-stop). Some items in the book might cause some controversy, which is undoubtfully good for marketing.
This is a very exciting book. Just about everything is unique: content, presentation, code, etc. Its not just up-to-date, its bleeding-edge, never-seen-in-public material. The book has nice organization and complex matters are presented well. I managed to enjoy even parts where I knew less than was needed to fully comprehend it. I especially liked the coverage of Windows rootkits and BIOS malware.
Anton Chuvakin, Ph.D., GCIA, GCIH is a Senior Security Analyst with a major security information management company. He is the author of the book "Security Warrior" (O'Reilly, 2004). His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. In his spare time, he maintains his security portal info-secure.org