Sponsored links


Valid XHTML 1.0!
Valid CSS!



Product: Book - Paperback
Title: The Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling (Second Edition)
Publisher: Wiley
Authors: Ralph Kimball, Margy Ross
Rating: 1/5
Customer opinion - 1 stars out of 5
Lot of unwanted content


This book deserves merely a one sentence review."Simply awesome" . As one of my friends had to say,"We depend on Ralph Kimball for our livelihood"!
This IS the book on Data warehousing. Follow this bookand you will never fail. I have had solutions to allof my design issues from this one book.
A must to every IT professional's personal library,not necessarily restricted to DW professionals



Product: Book - Paperback
Title: How to Break Software Security
Publisher: Addison Wesley
Authors: James A. Whittaker, Herbert H. Thompson, Herbert Thompson
Rating: 5/5
Customer opinion - 5 stars out of 5
Excellent continuation or Whittaker's earlier book


James Whittaker has taken the approach and the tools he introduced in "How to Break Software: A Practical Guide to Testing" (ISBN 0201796198), and has teamed with coauthor Herbert Thompson to adapt them to security testing. In this book the software under test (or attack, since that is the underlying approach) is primarily in the Microsoft environment. That the principles can be applied to any operating system or environment is evident in one scenario where Linux-based OpenOffice is attacked. The the fault model provided early in the book can form the basis for any software test strategy with a goal to uncover and exploit vulnerabilities.
The approach itself is to create a plan, then systematically attack. The areas of vulnerability covered include unanticipated input scenarios (which, even after decades, is still an exposure in too many applications and operating systems), find and attack design flaws and implementation anomalies, and leave no potential vulnerability untested. Among these are the usual exposed ports and default names; however, there are exploits based on data, time stamping and other less common areas that are overlooked by testing professionals - and that is one of the main audiences of this book.
While the techniques and the approach in this book are sound, I would have liked the attacks presented as formal test cases, which would be more meaningful to the testing professionals who will benefit the most from this book. However, the authors do introduce the concept of security testing as an element of QA, adding to the small (but hopefully growing) body of knowledge to be used by QA. I recommend this book, as well as "Exploiting Software: How to Break Code" (ISBN 0201786958) as two books that should be read and used by software testing practitioners. The information combined in these books will-if put into practice-significantly improve the quality and security of software that is released into production.



Product: Book - Paperback
Title: Executable UML: A Foundation for Model Driven Architecture
Publisher: Addison-Wesley Professional
Authors: Stephen J. Mellor, Marc J. Balcer, Stephen Mellor, Marc Balcer
Rating: 5/5
Customer opinion - 5 stars out of 5
Author correction


The review from "A reader" is erroneous. There is no review from "Leon Brooks," so it is unlikely there is any business relationship with a non-existent person.
I imagine "A reader" meant Leon *Starr* who runs an entirely separate business from those run by either of the authors. Sure, we talk and refer business each other's way, but that is to be expected. Please delete "A reader"'s review.
(If you know Leon, you'd know he says what he really thinks, even if--especially?--it's bad!)



Product: Book - Paperback
Title: Access 2000 Developer's Handbook Volume 1: Desktop Edition
Publisher: Sybex Inc
Authors: Paul Litwin, Ken Getz, Mike Gilbert
Rating: 5/5
Customer opinion - 5 stars out of 5
Still waiting for the second volume


I spent the first few days only looking at the awesome class modules provided on the CD that accompanied this book. It helped me a lot in understanding new techniques, and used some of the codes for developing the dbase for a research project I'm working on.
Geek to geek..I strongly suggest having this book, the authors spent a great deal of time writing it for the ease of the rest of us. They have an extensive explanation how to incorporate Access with the rest of Microsoft components such as Outlook.