Sponsored links


Valid XHTML 1.0!
Valid CSS!



Product: Book - Paperback
Title: Incident Response and Computer Forensics, Second Edition
Publisher: McGraw-Hill Osborne Media
Authors: Chris Prosise, Kevin Mandia, Matt Pepe
Rating: 2/5
Customer opinion - 2 stars out of 5
mediocre


The book gives a decent overview on the field, but lacks technical accuracy. The authors fumble on technical details. For example, the authors botched the explanation of what happens when a unix file is deleted by claiming that all files with a link count of zero will be deleted. They also make the claim that only the SCSI interface will accommodate the multiple simultaneous communication that RAID requires - when really IDE will do this as well given proper firmware. Another gross oversight was the exclusion of reverse engineering in their investigation of rogue files chapter.
When emailing the authors about this, all three ignored the email. I do not recommend supporting authors that ignore their readers.



Product: Book -
Title: eBay Secrets : How to create Internet auction listings that make 30% more money while selling every item you list
Publisher:
Authors: Steven Ellis White, Bryon Krug
Rating: 5/5
Customer opinion - 5 stars out of 5
If you want hints and tips for higher profit, buy this book


I have been eBaying for a couple of years and thought I was pretty savvy. This book taught me several important things to help me get even better response from my auctions.I second the reviewer who suggested you read it twice so you do not miss anything. This title is full of important information you do not want to miss (unless of course you want to give money away).The author answers email and is very helpful. You will not go wrong in buying this book if you want success from eBay.



Product: Book - Paperback
Title: SSH, The Secure Shell: The Definitive Guide
Publisher: O'Reilly
Authors: Daniel J. Barrett, Richard Silverman
Rating: 3/5
Customer opinion - 3 stars out of 5
Good from a practical viewpoint


SSH:
- A complex and hard to master protocol (protocols).- An invaluable defensive weapon against several types of attacks.- In short time, SSH will be the 'de facto' privacy standard for remote connections and transference.
The Approach:
Three extraordinary introduction chapters, clearly and well written, lead you step by step into SSH internals. Several clever graphics, and a lot of basic definitions makes these chapters absolutely self contained.The rest of the chapters are carefully dedicated to issues related to implementation and use of SSH, and to ports to several Operating Systems.
The Book:
540+ Pages well structured into 17 chapters and two appendixes.Clever conventions, and a very useful 'Which Chapters Are for You' guide.Plenty of 'real world' examples and 63 pages of special case studies.
The Covered Protocols:
- SSH1.- F-Secure SSH1.- OpenSSH.- SSH2.- F-Secure SSH2.
The Intended Audience:
Quoting the authors: " We've written this book for system administrators and technically minded users. Some chapters are suitable for a wide audience, while others are thoroughly technical and intended for computer and networking professionals."
The Bottom Line:
Being a computer security professor, I constantly assign to my students complex laboratory works related to SSH. Well, with the only help of this book, they usually succeed in their tasks and even improve the original projects.It is a worthy book and really deserves to be purchased.



Product: Book - Paperback
Title: Code Complete, Second Edition
Publisher: Microsoft Press
Authors: Steve McConnell
Rating: 5/5
Customer opinion - 5 stars out of 5
The best is even better


I don't usually bother with writing reviews, but I just had to for this. I bought and read the first edition when it came out and loved it. Today I was in Borders and saw the second edition on the shelf. I grabbed it and didn't even bother opening it before buying. I didn't want to have to wait to have it shipped by Amazon.

The first edition was one of my top 5 computer books of all time (I have hundreds and get most free being a college prof) and now I'm loving the second edition.

My only regret is that I can only give 5 stars to this book. It's a sure 3 thumbs up out of 2 or 7 out of 5 stars.

BUY IT NOW.