Sponsored links

Valid XHTML 1.0!
Valid CSS!

Product: Book - Paperback
Title: The Little SAS Book: A Primer, Third Edition
Publisher: SAS Publishing
Authors: Lora D. Delwiche, Susan J. Slaughter
Rating: 1/5
Customer opinion - 1 stars out of 5
Totally Awful - Do not purchase!

This book works with all versions of SAS and I found it a useful reference. It explains to you how to enter and manipulate your datasets in SAS. Also brief description of PROCs and options with each PROC. Each topic is in a separate page and all contained in about 2 pages at the most. So do not expect so much details on these procedure but if you happened to forget a syntax line, grab this book's index and the reminder is there for you. I recommend it to all SAS users.

Product: Book - Paperback
Title: Effective C++: 50 Specific Ways to Improve Your Programs and Design (2nd Edition)
Publisher: Addison-Wesley Professional
Authors: Scott Meyers
Rating: 5/5
Customer opinion - 5 stars out of 5
A MUST-READ for all C++ Developers

As a C++ instructor, I spend a lot of effort searching for good books to recommend to my students. *Effective C++* and *More Effective C++* are two books that I think every C++ developer should own. The writing style is fantastic and the presentation of the material is very approachable. The topics are arranged as "Items" that are organized around particular programming ideas instead of language features. The material is suitable for many experience levels: beginners to experts. Easy Decision for Today: Just Buy It

Product: Book - Paperback
Title: JavaScript for the World Wide Web: Visual QuickStart Guide (4th Edition)
Publisher: Peachpit Press
Authors: Tom Negrino, Dori Smith
Rating: 5/5
Customer opinion - 5 stars out of 5
JavaScript (Visual Quickstart Guide)

Excellent book!!!
I am recommending this book, not only to my students, but espcially to my friends who shy away from scripting/programming books due to excessive use of "jargon". As an instructor, I find that most books turn the reader off by talking over their heads.
The book is written in plain, easy to comprehend English. This is the perfect way to introduce beginners and non-programmers to JavaScript. It's rare to find a book that does not make programming sound like molecular-biology.

Product: Book - Paperback
Title: Improving Web Application Security: Threats and Countermeasures
Publisher: Microsoft Press
Authors: Microsoft Corporation
Rating: 5/5
Customer opinion - 5 stars out of 5
Just get it!There is nothing that compares to it.

If you are designing, building and deploying Web based applications using Microsoft's .NET Framework run and get this book. Currently, there is no other book that can match the breath and depth of the topic covered in this book.
Contrary to what the title may imply, in addition to ASP.NET this book also covers how security should be addressed in the building of Serviced components, Web Services and Remoting. The chapters on Code Access Security are among the clearest that can be found anywhere.
This book takes a holistic approach to Security in that it addresses threats to the network, host and application layers. The old adage of a chain is only as strong as its weakest link is taken to heart in the book so guidance is provided on how security should be addressed across tiers and at multiple layers. Secure app development across the entire software development and deployment lifecycle is considered within the scope of this book.
In addition to Secure Coding guidelines, Extensive guidelines are provided that show how the Network, Web Server, Application Server and Database Server should be secured.
One of the things that I like about this book is that the guidance that is provided is task and role based. So even though the book is 800+ pages, it can be very easily used as a ready reference.
Multiple checklists that deal with Design, Build, Securing and Assessment are given and can be used out of the box.
In short, don't wait. Go get it now!
From the book's introduction:
Part I, "Introduction to Threats and Countermeasures," identifies and illustrates the various threats facing the network, host, and application layers. The process of threat modeling helps you to identify those threats that can harm your application. By understanding these threats, you can identify and prioritize effective countermeasures.
Part II, "Designing Secure Web Applications," gives you the guidance you require to design secure Web applications. Even if you have deployed your application, we recommend that you examine and evaluate the concepts, principles, and techniques outlined in this part.
Part III, "Building Secure Web Applications," allows you to apply the secure design practices introduced in Part II to create secure implementations. You will learn defensive coding techniques that make your code and application resilient to attack.
Part IV, "Securing Your Network, Host, and Application," describes how you will apply security configuration settings to secure these three interrelated levels. Instead of applying security randomly, you will learn the rationale behind the security recommendations.
Part V, "Assessing Your Security," provides the tools you require to evaluate the success of your security efforts. Starting with the application, you'll take an inside-out approach to evaluating your code and design. You'll follow this with an outside-in view of the security risks that challenge your network, host and application.