Sponsored links


Valid XHTML 1.0!
Valid CSS!



Product: Book - Hardcover
Title: Confidence : How Winning Streaks and Losing Streaks Begin and End
Publisher: Crown Business
Authors: ROSABETH MOSS KANTER
Rating: 2/5
Customer opinion - 2 stars out of 5
This book is not worth the time or the money


I found this book, like many of the other reviewers, to be overly repetitive. The book, while it does try to espouse worthy principles of leadership, could have been written with the same effect in 100 pages or less and not wasted the readers time. Furthermore, there is one passage from the book located on page 319 on former New York mayor Rudolph Guliani's performance during 9/11 that I found extremely alarming. It reads as follows:

"Guliani became and remained a hero because of a single episode, but turnarounds require more than immediate crisis-management skills. No controversy dogged Guiliani because his actions provoked no challenges, required no tough choices, and were completed shortly after the crisis event, when he left office. He sent no troops into battle, solved no problems, developed no policies, seeded no innovations. New York City's disaster relief response was effective because teams had already prepared and could spring into action, freeing him to be their cheerleader-in-chief".

Calling Guiliani simply a cheerleader-in-chief, and furthermore saying that he didn't have to make any tough choices and did not solve any problems while leading New York City through one of the worst disasters this country has ever seen proves just how blind Rosabeth Moss Kanter is to real leadership in action.

Save your money and your time, there are much better books out there.




Product: Book - Paperback
Title: Cisco Router Firewall Security
Publisher: Cisco Press
Authors: Richard Deal
Rating: 4/5
Customer opinion - 4 stars out of 5
Securing the Edge


The Cisco Press Book "Cisco Router Firewall Security" by Richard Deal while claiming to be for individuals or organizations "using a Cisco router as a perimeter firewall solution" is much more and I believe from that quote it was designed to be a reference guide for using routers to do just that: be a perimeter firewall for an organization. But what Richard Deal delivered is not only an excellent book on implementing a router as the firewall, but a detailed guide and approach to making any organizations routers secure and safe as they should be to develop a safe environment. To emphasis my comments on this thought you simply need to look at the break down of the chapters, like Chapter 4 "Disabling Unnecessary Services", and while this is important for any perimeter device, doing it in general on a router regardless of location helps to strength the environment and deliver a more secure network.

Within the book Richard emphasizes that an individual can either read it cover to cover, or skip around and I agree that at sometimes reading cover to cover especially if you do not know a subject is an excellent approach, but with this one even not knowing and using it for the references offers is just as much benefit. Cause within the individual sections of the book there's enough information that you will not get lost as long as you have understanding of other Cisco devices like TACACS+ or general network concepts like RADIUS. Richard presents clear examples and details the steps to implement many of the book suggestions without much issue. I was able to take one of my lab routers and execute numerous of his examples without difficulty and still have the unit function as expected.

While Cisco continues to publish new IOS code for their devices Richard spends a few minutes at different points like in Chapter 6 "Basic ACL Configuration" to highlight which version of IOS is needed to accomplish the issue being explained. Considering this feature does help to enhance the value of the book even further, but amongst my favorite chapters and section was Part VI "Managing Access through Routers" for he the book combined numerous prior items from Access Control List (ACL) configuration to routing protocols and authentication proxy using features like AAA with both TACACS+ and RADIUS. These configuration examples combined with Part VIII on "Virtual Private Networks (VPN)" only go to enhance each other. Yet as mentioned before the book was designed to allow individuals to either research a sub-set of the features in a router or the entire book itself. Thus in the middle of what appears to be two clear parts that would naturally fit together Part VI and VIII, Richard places Part VII on "Detecting and Preventing Attacks" demonstrates this feature covering areas of Intrusion Detection Systems, DoS Protection and Logging Events. The concept that attacks could come in any form, but commonly from external interaction is widely known. Seeing this section of the book only goes further to enforce and emphasis the importance of securing routers to protect the network.

As anyone in the Information Technology industry is aware it is important to protect the environment and to say that this book could not help in that protection is a clear understatement. I believe that anyone from the "small business jack of all trade IT person" to the "corporate IT Network Specialist" could benefit in some manor from this book and the explanations and examples presented. If I was to say there was one thing I would do different on this book is of had it published in a hard bound cover cause Cisco Press has not often published a book that does not have a clear basis for use and this book is no except to that, thus I believe it would be a benefit and often used book of any network individuals library.



Product: Book - Paperback
Title: Java Swing, Second Edition
Publisher: O'Reilly
Authors: James Elliott, Marc Loy, David Wood, Brian Cole
Rating: 3/5
Customer opinion - 3 stars out of 5
Explaining everything isn't always a good thing.


There is a lot to know about Swing -- a ton. It's a hazard in writing about it to render so much information in a tedious way, and this book fell victim to it. Every stone of Swing the authors could think to turn is, I am sure, turned. For Pete's sake, this book is longer than Unix Power Tools, and that book represents two decades of Unix experiences!
I've had this book for six months and I'm still trying to pick through all the method, class, and interface descriptions to find the kernels of real insight. The book does have them, but you have to wade in deep to get one. I would rather have a well-organized collection of insights to guide exploration, and a separate reference section; this book mostly lists and explains. I can't stay awake for it.
The concepts are important. Plenty of examples are important. With those things firmly in hand, you can point out exceptions or substantive variations on rules, focussing on major ideas.
I have no doubt this book was an exhausting effort; the style reflects it.



Product: Book - Paperback
Title: Advanced Java 2 Platform: How to Program (With CD-ROM)
Publisher: Prentice Hall
Authors: Harvey M. Deitel, Paul J. Deitel, Harvey M. Deitel
Rating: 2/5
Customer opinion - 2 stars out of 5
Mea Culpa


I am partly through the book. Some of the prose describing all of the code is tedious but there is much to learn. The examples at the ends of the chapters ae quite challenging and here is my complaint. The book is not advertised correctly. it is imposible to get the ansers to the examples (on CD) unless you are a recognized instructor with a certifcate. I know because I called Pearson Education support. This is quite a lot of money to pay to NOT obtain the answers, but that would be ok if if were plainly advertised before I made the purchase.