Sponsored links

Valid XHTML 1.0!
Valid CSS!

Product: Book - Paperback
Title: Designing with Web Standards
Publisher: New Riders Press
Authors: Jeffrey Zeldman
Rating: 4/5
Customer opinion - 4 stars out of 5
Good for a laugh and a start into web standardization.

Let me first state that this will NOT teach you ALL of the workings of CSS. I thought that it would, but I was wrong. This book is all about accessibility and it is an evangelical book more than anything else.
With that said, I really enjoyed the book. It is a very easy read compared to most computer books. The book teaches you some css and then delves right into the problems that each browser has with CSS / XHTML etc.. and shows workarounds. With this book, I was able to get the index page of my personal site to validate with css and XHTML transitional. This is definately a great starter book, but it will leave you hungry for more. (thankfully, Mr. Zeldman has his suggested readings here and there in the book)
Oh and yes, the first two chapters are all about how browsers of the past don't work and the day of "table hacks, 1 pixel gifs" are numbered. Personally, I found it amazing how easy it was to remove all my table layout and use CSS instead! Only took me an hour!

Product: Book - Paperback
Title: Secrets and Lies : Digital Security in a Networked World
Publisher: Wiley
Authors: Bruce Schneier
Rating: 5/5
Customer opinion - 5 stars out of 5
Bruce presents a refreshing & pragmatic approach to infosec

Consider the scores of books about computer and network security available today. Many are fat tomes, exhaustively written with myriad details. But corporate networks remain extremely insecure. Is anyone buying or reading these books?
With its mantra that security is a process, not a product, Secrets and Lies is one of the most important security books to come out in the last ten years. It forces information security managers to focus on security at the macro level--the processes--rather than at the micro level, as in the installation of a firewall or intrusion detection system. And since so many managers do equate security with firewalls, it is easy to understand why corporate networks are at risk.
Anyone looking for a quick fix to their security problems will not find it here. As each day passes, more and more security vulnerabilities, network breaches, and digital disasters are occurring. Without processes in place to manage these incidents, all of the security products in the world will be for naught.
Readers looking for a matter-of-fact, no-nonsense initiation into the world of information systems security should consider Secrets and Lies required reading.

Product: Book - Paperback
Title: Programming in Ada 95 (2nd Edition)
Publisher: Addison-Wesley Professional
Authors: John Barnes
Rating: 5/5
Customer opinion - 5 stars out of 5
not a 'for dummys' book but excellent after that

A great book to deepen your knowledge on Ada95. I would recommend to start learning Ada95 with another book but after doing your first steps this one will be a great help in improving your Ada skills

Product: Book - Paperback
Title: Security Architecture: Design, Deployment and Operations
Publisher: Osborne/McGraw-Hill
Authors: Christopher King, Ertem Osmanoglu, Curtis Dalton
Rating: 4/5
Customer opinion - 4 stars out of 5
Diamond In The Rough

While this book didn't light a raging intellectual fire within my gray matter it certainly was a well-crafted and thorough explanation of various security techniques. And although I found some of the chapters a bit bloated and at times confusing the price of the volume was completely justified on the basis of Chapter 12 alone. "PKI: Components and Applications" was by far the most clear and concise treatise I have ever encountered during my months of research covering PKI -- a challenging and almost arcane security method. With envious ease the author managed to delineate complicated and intricate methodolgies using a common-sense approach that's a pleasurable derivation from standard computer book narrative.
If you are interested in learning about PKI I suggest no better a place to start or end than "Security Architecture: Design, Deployment and Operations".