Sponsored links

Valid XHTML 1.0!
Valid CSS!

Product: Book - Paperback
Title: Stealing the Network: How to Own a Continent
Publisher: Syngress
Authors: FX, Paul Craig, Joe Grand, Tim Mullen, Fyodor, Ryan Russell, Jay Beale
Rating: 5/5
Customer opinion - 5 stars out of 5
A book about REAL hacking

This is an amazing book about hacking. This will open your eyes to the world of hacking in the same way 'Hacking Exposed' did when it first came out. But different than HE, this doesn't jut tell you the how it tells you the why, and accomplishes this through an interesting fictional story. Anyone in the infosec world will recognize the tools and techniques used throughout the book as completely real and accurate. In many cases the authors of the book are the creators of the tools themselves--like the chapter Fyodor wrote which uses Nmap. I enjoy reading security books, but it's become incresingly difficult to find truly unique, original material. This book certainly fits the bill.

Product: Book - Paperback
Title: Sams Teach Yourself Java 2 in 21 Days (4th Edition) (Sams Teach Yourself)
Publisher: Sams
Authors: Rogers Cadenhead, Laura Lemay
Rating: 4/5
Customer opinion - 4 stars out of 5
A well-organised tutorial to get you up to speed in Java

I found most of the content in the negative reviews here bewildering. To take some examples:
"The code doesn't compile" - yes it does.
"They teach you deprecated code" - yes they do. This is because if you want to write applets, you have to use deprecated code. This is reiterated frequently throughout the applet section. They also teach you Java 2 code.
"They don't explain the examples" - yes they do, often giving line-by-line explanations. There are a couple of early examples that use yet-to-be-explained code, but they tell you this (it would be impossible to write functioning code with all you learned in day 1).
"They don't build on a foundation" - yes they do. The class concept is clearly explained, then the syntax, data types, then you move onto applet writing.
I suspect most of the negative contributors here are merely venting their frustration.
My only problem with this type of book is that it is unrealistically titled - you will only get through it in 21 days if you don't have a day job, don't take notes, and dont' revise.
Other than that, it was one of the better tutorials in this series.

Product: Book - Paperback
Title: OCP Oracle9i Database: New Features for Administrators Exam Guide
Publisher: Osborne/McGraw-Hill
Authors: Daniel Benjamin
Rating: 3/5
Customer opinion - 3 stars out of 5
Good enough to pass OCP

I was scared on seeing other reviews before taking the exam.Though the book has lot of errors, it is sufficient to pass the 9i new features exam.

Product: Book - Paperback
Title: The Tao of Network Security Monitoring : Beyond Intrusion Detection
Publisher: Addison-Wesley Professional
Authors: Richard Bejtlich
Rating: 5/5
Customer opinion - 5 stars out of 5
Advanced Security teachings

I'm not sure why, but my first review of this book was not posted. However, I feel that this book definitely warrants a second attempt. The Tao of Network Security is a definite must have for anyone serious about the field of network security. While the book is heavily BSD biased, the tools illustrated throughout the book are free and can be compiled on just about any platform. The author draws from his years of experience as a network security analyst for the Air Force and work as a forensic analyst for various network security operations. The author goes through various scenarios demonstrating different techniques for Intrusion detection using Open Source tools. He introduces Squil, a very robust front-end for Snort that is designed with the Security Analyst in mind. The author brings forth some very interesting points of view based on experience in network security. While the book is rather large, somewhere over 700 pages including the appendices, I found that all the information in the book is worthwhile and relevant.