Sponsored links


Valid XHTML 1.0!
Valid CSS!



Product: Book - Paperback
Title: Programming .NET Components
Publisher: O'Reilly
Authors: Juval Lowy
Rating: 5/5
Customer opinion - 5 stars out of 5
Deep & Clear


The adulations from the previous reviewers here are all well earned. In my opinion, this is well beyond just a great book; it's a must-have! The writing is very clear without being verbose; and it's depth is better than anything I've seen anywhere on .NET. The author not only provides many new insights, but refines and corrects existing ones found elsewhere, even correcting some guidelines from MSDN. For instance he advises in favor of using "lock" to make methods thread-safe, which MSDN does not advise. Given any doubt, I'd trust this author over MSDN.
I just wish the book was longer, and covered more relevent topics. It's so good that I want more!



Product: Book - Paperback
Title: ACT! 6 for Dummies
Publisher: For Dummies
Authors: Karen S. Fredricks
Rating: 5/5
Customer opinion - 5 stars out of 5
CUT TO THE CHASE AND BUY THIS BOOK


ACT6! for Dummies is not only extremely informative, it is fun and easy to read. It is a great starting place to learn the many aspects of the program and it is a great reference once you are using the program regularly. If you can figure out how to use this program to its fullest by using the book supplied by ACT, you are probably not in sales, you have a lot of extra time on your hands, and you love to watch paint dry. Unless you are selling real estate in South Florida and one of my competitors, buy ACT6! for Dummies and get yourself on track fast.



Product: Book - Paperback
Title: Google Hacking for Penetration Testers
Publisher: Syngress
Authors: Johnny Long, Alrik van Eijkelenborg
Rating: 5/5
Customer opinion - 5 stars out of 5
how to [mis-] use Google


We all use Google, for many different reasons. But Long points out that its sheer effectiveness has lead to an insidious activity. By crackers and phishers ("black hats"), who are trying to break into systems and get confidential data. Like being able to find a person's real name and US Tax Id or credit card numbers.

Long shows how Google's many search options and comprehensive data can be used by a cracker. For example, searching for a text string written by a common web search, like Apache or IIS, that gives the server's name and version number. Typically, these are default strings that some sysadmins don't bother changing. So when the pages are made public, those strings appear, and Google lets the cracker find them. If she knows of a security bug in that server version, she can Google for who is running it and then drill down. Long goes into far more complicated attacks than that. But the example shows the gist of how Google can be (mis-)used.

Long writes a disquieting text for sysadmins and Web administrators. In the rush by so many organisations to make information available, even if ostensibly only to your employees and customers, Google can expose you to vulnerability. A compelling read.



Product: Book - Hardcover
Title: Introduction to Electrodynamics (3rd Edition)
Publisher: Prentice Hall
Authors: David J. Griffiths
Rating: 5/5
Customer opinion - 5 stars out of 5
A Must Have.


This is a true undergraduate physics book. If you don't already own it, you should. The only complaint that I have with the book is that if used by its self the book tends to become less and less complete as you get closer to the end of the book. And some topics such as magnetic scalar potential (which can be a life-saver) is completely left out of the book. I would seriously recommend anyone using this book to also try to find a copy of the out of print book by Munir H. Nayfeh (Another must-have); it covers the holes that Griffiths leaves out, and it has over 300 worked examples and answers to the odd problems at the end of the book.