Sponsored links


Valid XHTML 1.0!
Valid CSS!



Product: Book - Hardcover
Title: Principles of Internet Marketing
Publisher: South-Western College Pub
Authors: Ward Hanson
Rating: 3/5
Customer opinion - 3 stars out of 5
Very good, but dated


This is a classic. One of the most serious earlier works on the topic. Professor Hanson brought a very solid theoretical framework to Web marketing. The book came at a time when we finally all wanted to get more rigouros with the "New Economy". I perused it again recently for a seminar I am giving, and it is still an excellent reference book. I would give four stars to an updated edition. I don't know if they are planning it.



Product: Book - Paperback
Title: The Data Warehouse Toolkit: Practical Techniques for Building Dimensional Data Warehouses
Publisher: John Wiley & Sons
Authors: Ralph Kimball
Rating: 5/5
Customer opinion - 5 stars out of 5
An excellent introduction in dimensional modelling


Every college who is just thinking of designing a data warehouse should read this book. The descriptions of the dimensional modelling techniques are clear and accurate, and there are some very good examples of different industries. The book have logical structure and is ease to understand. What I missed is the loading part so as the design of staging areas. Extraction and stating can easy turn to a nightmare. So if you are looking for an approach concerning the backend of a data warehouse, this book is of little use. But anyway I consider this book as one of the classics in data warehousing.



Product: Book - Hardcover
Title: Introduction to Algorithms, Second Edition
Publisher: The MIT Press
Authors: Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein
Rating: 5/5
Customer opinion - 5 stars out of 5
Excellent book


I personally bought this book in preparation for the International Olympiad in Informatics (IOI), and it helped me immensely in getting off the ground with the algorithms I had to learn, especially the chapter on Dynamic Programming. Since then, however it has remained a priceless companion during my studies and at home.
This is the definitive reference for algorithms with a firm theoretical and mathematical foundation. Algorithms are treated with a thorough theoretical introduction often with a complete mathematical walkthrough, a clearly thought out solution, a discussion of its pros and cons, lots of clear and consisive diagrams, a pseudocode implementation, and a good deal of serious optimisation discussion. It's written in an accessible manner, starting with the elementary issues, progressing to the advanced and complex thinking needed to conquer them, so you'll find you have to give it your full concentration.
This book will not disappoint. Its explanations are rigorous and its coverage spans all the general purpose algorithms with little focus on their applications but rather on the algorithms themselves. The book covers such major areas as sorting, data structures, advanced design and analysis techniques, graphs, each about a hundred pages on average, and a selection of specialised algorithms such as parallel programming, string matching and computational geometry. Because these algorithms are used everywhere, from games, graphics and simulations to electrical engineering it will have a broad audience and will find a home almost anywhere there is serious programming involved. Each chapter is a unit in itself which means you don't need to read it cover to cover, since they all start off smoothly and handhold you through. Clearly written by professionals, this is the book I know contains the information that I can't find elsewhere.



Product: Book - Paperback
Title: The Shellcoder's Handbook : Discovering and Exploiting Security Holes
Publisher: John Wiley & Sons
Authors: Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan "noir" Eren, Neel Mehta, Riley Hassell
Rating: 5/5
Customer opinion - 5 stars out of 5
Awesome resource to have.


Just the sheer wealth of information is something you are rarely treated to in ANY book. 24 chapters of very deep security tips.

I haven't read the whole book yet as I've skipped to the advanced topics but I can say i've learnt quite a bit despite the fact that I've read many papers on shellcode/buffer overflows.

I can see why some people said this book is dangerous because it will help the attackers. Although this idea of security through obscurity is absurd, I have to say that it will be difficult for most attackers to come up on their own with the things discussed in this book.

In all cases, kudos to the authors for writing such a comprehensive handbook. I hope we'll see a sequel to it.