Sponsored links


Valid XHTML 1.0!
Valid CSS!



Product: Book - Paperback
Title: Security Warrior
Publisher: O'Reilly
Authors: Cyrus Peikari, Anton Chuvakin
Rating: 4/5
Customer opinion - 4 stars out of 5
Know Your Enemy


In today's interconnected word, it is a race between those who wish to exploit a system, and those who are working to defend it. Security Warrior presents a unique approach in that it not only explains the traps, but also goes in depth on how these traps and exploits actually work.
The author presents each chapter with information about specific exploits, then goes into the actual exploits themselves. The book is geared towards the security professional, and novice users could find the amount of information that is presented overwhelming and confusing. At the end of each chapter is a resource section that invites the read to continue learning about a particular pitfall by providing more books and online sources for information.
One of the caveats of this book is the fact that in the wrong hands it can actually be used against the very systems the author wanted to defend. The amount of technical detail is so great, that a skilled hacker or cracker could take this book and use it as a resource in his toolkit. It is the classic situation of you can't fix the problem without knowing what the problem is.
Don't pick up this book if you want an overview of general computer security; you will be lost in the information overload. Do pick this book up if you are a security administrator or systems administrator and want to take a proactive approach in securing your systems against attack.



Product: Book - Hardcover
Title: CCNA: Cisco Certified Network Associate Study Guide, Deluxe Edition
Publisher: Sybex Inc
Authors: Todd Lammle
Rating: 4/5
Customer opinion - 4 stars out of 5
Routing Protocols


I think is a complete reference to pass the Cisco's Exam and reviewing your concepts.You have virtual labs to configure different scenarios, and try many things. Nothing happen if you add a wrong line. And you can change easily everything.You will have the entire book in electronic format and many other sources to learn in your computer.But the exam version is not the last one. You can check in Cisco's site. However, the book is almoust complete.



Product: Book - Hardcover
Title: Patterns of Enterprise Application Architecture
Publisher: Addison-Wesley Professional
Authors: Martin Fowler
Rating: 5/5
Customer opinion - 5 stars out of 5
This is must-have book


This book is the masterpiece. As Martin Fowler's Refactorings, this book will be a handbook of many, many developers. It is strange that after reading reviews of this book, I've found that many people do not understand the whole idea behind this book. If you come from the J2EE world you might not agree with some of the patterns presented in this book. But only experience in the field will show how you were wrong. If you have really complex business logic, trying to implement it with entity beans is almost always impossible. If you spent weeks fighting with your appserver environment instead of concentrating on business use cases, you would understand the value of these patterns.



Product: Book - Paperback
Title: 802.11 Wireless Networks: The Definitive Guide (O'Reilly Networking)
Publisher: O'Reilly
Authors: Matthew Gast, Matthew S. Gast
Rating: 4/5
Customer opinion - 4 stars out of 5
It's pretty good!


I'm not sure what book two other [Amazon.com] reviewers were reading, but Matthew Gast's does not suffer from the flaws they state: it's a comprehensive book with a laser-beam focus, and they're criticizing a book this isn't. Why no Ethernet primer? Because it's a focused 802.11 book. Why no reporting of security flaws discovered in mid-2001? Because the book was being printed then -- but the book delves deeply into the security model underlying 802.11, which is what it's about.
I recommend this book highly for anyone who needs a protocol level on up view of 802.11 for planning, deploying, or understanding 802.11 networks. It's a constant reference guide for me, and it's never steered me wrong.
If you read the critical reviews carefully, the first (Kevin) complains about when it was published, and the second (anonymous) complains about the book but then admits he or she hasn't read other 802.11 books and doesn't explain whether he or she has relevant knowledge.
Because most systems deployed are 802.11b based, this book retains its utility. At some point, probably within the next six months, another edition will be needed to deal with the current draft 802.11g standard, the new WPA security protocol, and the coming 802.11i, h, e, and f protocols. But as long as you're dealing with 802.11b, this is the ultimate guide for network administrators and software developers.