Sponsored links


Valid XHTML 1.0!
Valid CSS!



Product: Book - Paperback
Title: The Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling (Second Edition)
Publisher: Wiley
Authors: Ralph Kimball, Margy Ross
Rating: 5/5
Customer opinion - 5 stars out of 5
The Ultimate Powerhouse


This book deserves merely a one sentence review."Simply awesome" . As one of my friends had to say,"We depend on Ralph Kimball for our livelihood"!
This IS the book on Data warehousing. Follow this bookand you will never fail. I have had solutions to allof my design issues from this one book.
A must to every IT professional's personal library,not necessarily restricted to DW professionals



Product: Book - Paperback
Title: The Rational Unified Process: An Introduction, Third Edition
Publisher: Addison-Wesley Professional
Authors: Philippe Kruchten
Rating: 5/5
Customer opinion - 5 stars out of 5
good book on OO process


It documents the Object-oriented design process used by the Rational Corporation. In case you are not aware, the authors of UML work for Rational and they are the company that makes Rational Rose, the market leader in OO design tools.

The book outlines the process, which has many good features. One example is that the process uses the spiral methodology instead of waterfall. The book covers all phases of processes you might want to put in place in an OO project.

Unlike many OO process books for the past, this book keeps it feet on the ground and stays readable. Others in the past have usually drafted into obscure technical details.

The book has two problems. The first is that the prose is pretty stilted. Way too many sentences start with "The Rational Unified Process is". The other problem is that the book is geared around using the tools from Rational. However, it is possible to use most of the process without using the tools from Rational.
In summary, this book documents a pretty good OO design process in a very easy to understand way. If you are looking for an OO process to follow or are looking for ways to improve your existing one, this book is an excellent starting book.



Product: Book - Hardcover
Title: Structure and Interpretation of Computer Programs - 2nd Edition (MIT Electrical Engineering and Computer Science)
Publisher: The MIT Press
Authors: Harold Abelson, Gerald Jay Sussman
Rating: 1/5
Customer opinion - 1 stars out of 5
WARNING: This book will cause you severe pain


The negative reviewers entirely missed the point of this book. The issues are not c++ versus scheme, nor the gap between the book's examples and real-world programs, nor that recursion is less intuitive than looping.
The real point is to teach some very core foundations of computer science that show up everywhere. For example, supposedly revolutionary XML looks a heck of a lot like a nested scheme list, first described in 1960. And processing an active server page (or Java server page) is very much like the textbook's specialized language evaluator. Finally, c++ polymorphism through vtables and part of Microsoft's COM mechanics are the exact same thing as the book's data-directed programming section.
This is very deep material for a programming newbie to learn outside a course, but for an experienced nerd who's looking for a systematic framework, it's absolutely terrific. I had done lots of lisp and compiler work before reading the book, so many of the concepts were not new. But it's with this framework in mind that I learn new technologies, and this approach greatly speeds up how long it takes to understand each week's "new" hot product/language/tool/mindset. Put another way: why do so many popular computer books take 1000 pages to describe a few trivial concepts?



Product: Book - Paperback
Title: Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems
Publisher: Sams
Authors: Stephen Northcutt, Lenny Zeltser, Scott Winters, Karen Fredrick, Ronald W. Ritchey
Rating: 5/5
Customer opinion - 5 stars out of 5
An Excellent Resource


This book is an invaluable reference for Sysadmins, Network Design Engineers, and Security Engineers with most any networking focus. The authors offer real examples of configurations for multiple products to illustrate the points made in the discussions so the recommendations can be implemented wit h a minimum of trouble. The topics covered cross the range of issues associated with perimeter networks, Firewall, VPN, IDS. Each section offers it's own insights and solutions.
You want to have this book in your reference library !