Sponsored links


Valid XHTML 1.0!
Valid CSS!



Product: Book - Paperback
Title: Inside C#, Second Edition
Publisher: Microsoft Press
Authors: ANDREW WHITECHAPE TOM ARCHER
Rating: 5/5
Customer opinion - 5 stars out of 5
An exceptional book


Being an experienced C/C++ professional programmer this book really hit the spot. I am very impressed with Tom's style, and it constantly referred back to the differences between C# and C++ which was exactly what I wanted.
Clear, consise and very well written ...



Product: Book - Hardcover
Title: The Algorithm Design Manual
Publisher: Springer
Authors: Steve S. Skiena
Rating: 3/5
Customer opinion - 3 stars out of 5
Great theory book


This is the worest textbook that i hae ever seen! Do not apend ur money on it.



Product: Book - Paperback
Title: Security Warrior
Publisher: O'Reilly
Authors: Cyrus Peikari, Anton Chuvakin
Rating: 4/5
Customer opinion - 4 stars out of 5
How Does One Identify Threats to The IS Environment


One of the early steps in conducting a risk assessment for an information technology environment is to do an analysis of the threats facing your enterprise and the vulnerabilities to these threats. But how does one really get a handle on the threats in an ever changing environment? How do you get inside a hacker's head? In their book Security Warrior (506 pages, O'Reilly Media, 2004, ISBN 0-596-00545-8), Cyrus Piekari and Anton Chuvakin attempt to take the reader inside the mind of the hacker, to find out what they already know about our systems, tools they use to analyze and attack our systems, and how they then cover their tracks.

This book will satisfy people from system administrators to CIOs from different levels. For the hard core 'techno-geek', the first part of the book goes into extensive discussion of reverse engineering, including many, many pages of code showing how it is done. Of course, this is done with a legal disclaimer that basically says "do not do this at home, but if you do it is at your own risk". As this book was released just this year, there are great overviews of how attacks are launched on Windows, Linux, UNIX, and Windows CE. If your focus is on wireless, they have you covered. SOAP, XML, & Web services Security? Not a large amount of material, but enough to get you started.

The only major fault I find with this book is that social engineering only gets 11 pages of coverage, even though Piekari and Chuvakin state up front that social engineering is one of the most threatening forms of hacking attacks. Granted, it is a very complex issue that could (and often does) fill a volume by itself. While people outside of the system administration arena may glisten key points from this book, it really is a tool that should sit on the bookshelf of every system administrator. It provides a very broad overview, while providing extra references for each chapter if you want to dig into more detail. You will learn things from the darkside you may not have known about, but in the end this is a good thing. And if you want to skip over the lines of detailed code, you can do this safely as long as you know reverse engineering is a problem and that you have a detailed reference to go back to.

The Business Control Caddy Scorecard: Birdie on a long par 5.

Christopher Byrne
The Business Controls Caddy
http://www.controlscaddy.com/



Product: Book - Paperback
Title: The Java(TM) Programming Language (3rd Edition)
Publisher: Addison-Wesley Professional
Authors: Ken Arnold, James Gosling, David Holmes
Rating: 5/5
Customer opinion - 5 stars out of 5
Not how to program but how to program in Java


This book is not the first I'd recommend to someone who has never programmed before. Although there are some exercises in the text, the book has too much depth and does not contain enough code examples to be a full blown programming tutorial.
However, there is more to the book than simply explaining the technical facets of Java. The book contains good advice for the intermediate programmer on how to get the best out of the language, and discusses object-oriented practices such as designing classes to be extended, and times when it is wise NOT to extend a class.
If you have programmed before and are looking for an introduction to Java, then I recommend this book without reservation. It is not too heavy to carry around and enjoyable enough (for me) to read cover-to-cover, but it is also detailed and structured well enough to use as a reference.