Sponsored links


Valid XHTML 1.0!
Valid CSS!



Product: Book - Hardcover
Title: How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life (Revised Edition)
Publisher: Thomas Dunne Books
Authors: J.J. Luna
Rating: 5/5
Customer opinion - 5 stars out of 5
The answer to your post September 11th Concerns:


I own both of J.J. Luna's "How to be Invisible" books, the original and the newly revised edition for 2004. J.J. Luna is an excellent privacy consultant and he keeps up on his trade providing you with correct and current information on protecting your personal privacy.
More info is available @ www.pcpitbull.com with feedback and advice. I have personally written Mr. Luna and one of his accomplices, "Senorita" with questions and suggestions and they have always responded in a quick and courteous manner. I believe this illustrates Mr. Luna's commitment to his readers; something most privacy advocates avoid so that no one can call their bluff.
In "How to be Invisible" the 2004 revision, Mr. Luna does more than just fill the gaps of his old book. He makes it a point to provide the reader with an overall sense of comfort in following his practices, holding your hand through the hard parts and sending you in the right direction to continue on living a private life.
In the beginning of the new book J.J. admits that the events of September 11th 2001 and the subsequent security measures enforced, changed or eradicated a large portion of the first rendition. The changes themselves though, were not very substantial. The theme is the same, the details are a little more detailed and overall I found this new revision to be more informative and helpful than the first. Mr. Luna filled the needed gaps and provided the missing links that every revision attempts to do, and he succeeded. The end result is an easy to follow, informative and moving guide to living a more private life.
Protecting your privacy is not something you should be ashamed of, it does not make you a zealot, it gives you the personal protection that you deserve in today's society. Mr. Luna's book gives you all the information you need to start sewing your modern security blanket. If you value your life and the life of your family, you owe it to yourself and to them to become informed. Start here!



Product: Book - Hardcover
Title: Implementing the Capability Maturity Model
Publisher: Wiley
Authors: James R. Persse
Rating: 4/5
Customer opinion - 4 stars out of 5
good book for process engineers


The author of this excellent book give a realistic roadmap to achieving CMM levels 2 and 3, which are major hurdles in capability maturity, especially level 2 from a culture-shock point of view.
What makes this book realistic is the way you're lead through the important steps, with a complete focus on what it takes instead of theory. The book starts off with an obligatory overview of the CMM, but quickly segues into the steps needed to attain level 2 (repeatable), which are creating the structures, processes, training program and policies. While each of these are important, I especially like the inclusion of policies because they are necessary to codify goals and are frequently overlooked. This section also includes subcontractor management, which is important for aligning those with whom you are using on projects with your own organizational capabilities. This makes sense because if your organization is repeatable and your subcontractor(s) aren't, then you either need to go shopping for more compatible subcontractors, or get dragged back into ad hoc approaches.
The same approach to graduating to level 3 is used, with slight changes. In the section that covers level 3 the first topic is about focusing on organizational process improvement, followed by an in-depth chapter on defining organization processes. These reflect the key changes between level 2's repeatable goals and level 3's focus on defined processes. After these are clearly and completely explained the same formula - structures, processes, training program and policies - is addressed for level 3.
Following the steps to get to levels 2 and 3, the next section is centered on implementation and assessment. This section prepares you for the assessment process itself, and offers excellent advice on how to get through it. Additional information of value is provided in appendices B (Annotated Level 2 Preassessment Questionnaire) and C (Samples of Level 2 Policies), both of which are provided in PDF format from the book's associated web site.
One key question that needs to be answered: Which is better, this book or CMM Implementation Guide: Choreographing Software Process Improvement by Kim Caputo? My opinion is that both books are equally important and both should be read because they cover two different aspects of attaining CMM levels 2 and above. This book concerns itself with the nuts and bolts of processes, where Caputo's book is more focused on organizational change. I recommend both books, and think that they nicely complement each other.



Product: Book - Paperback
Title: The Inmates Are Running the Asylum : Why High Tech Products Drive Us Crazy and How to Restore the Sanity (2nd Edition)
Publisher: Sams
Authors: Alan Cooper
Rating: 1/5
Customer opinion - 1 stars out of 5
Like reading a typical computer manual...


I'm a professional UI designer, and Cooper's book seemed to come right out of my very own experiences. He has successfully carried out his own recipe for good UI design (providing power and pleasure) in his writing. This book is funny, yet real and practical. Humor in storytelling often delivers the most truth with the least effort in the most memorable form.
He goes out on some long limbs, and that is precisely what impresses me the most about his writing. He has the courage to present his often contrarian, polemic ideas as what they are: Opinions, or theories, based on experience. Theories are judged by their usefulness, and his are useful.
No, all programmers are not guilty. Yes, MBAs have also screwed up products. At least Cooper targets a real, known issue and has drawn attention to it without biting off too much. His anecdotes are memorable fables of the software design industry, which I already find myself dropping in conversations.



Product: Book - Paperback
Title: Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Publisher: Wiley
Authors: Bruce Schneier
Rating: 5/5
Customer opinion - 5 stars out of 5
a chance to look at algorithm and C code


This book is an bsolute must read for anyone dealing with security. It covers almost everything in the field, and gives a deep insight, plus the correct way to think. If you need details on a specific topic, you'll find a way to that too, the book has a 1600+ list of references.