List price: $16.00 (that's 30% off!)
Used price: $7.80
Buy one from zShops for: $11.10
Used price: $3.78
Buy one from zShops for: $6.99
List price: $19.95 (that's 30% off!)
Used price: $13.87
Collectible price: $19.95
Buy one from zShops for: $13.00
The writers of this excellent series have smartly chosen to keep story arcs fairly brief lasting about five issues. This allows each trade paperback to contain two arcs. The two in this volume are excellent.
The first arc finds the JSA being attacked by the Injustice Society and Johnny Sorrow. The Flash winds up accidently travelling back in time to ancient Egypt in his efforts to defeat Sorrow. (Time travel isn't something treated lightly like in Dr. Who.) This ties the two arcs together nicely and also relates the origins of three legends: Dr. Fate, Captain Marvel and Hawkman.
Other surprises wait as Black Adam joins the JSA and the exploration of Hawkman and Hawkgirl's relationship deepens. Kendra discovers she's really Hawk's wife reincarnated, but everything isn't peachy keen. All in all, it's well written and art is top notch. Enjoy!
Used price: $15.00
List price: $49.95 (that's 30% off!)
Used price: $26.26
Buy one from zShops for: $24.99
HPYN2E shines in many respects. The "laws of security" in chapter 2 are accurate and enlightening. Chapter 4 helps teach secure programming techniques by comparing insecure and secure code snippets. Chapter 4 also demonstrates debugging and disassembling code, usually not seen in security texts. Chapter 8 probably contains the most advanced coverage of buffer overflows I've read in a book. By actually showing and explaining stack traces, the authors share a level of detail sufficient to satisfy all but the most elite coders. Chapters on "diffing" (5) and format strings (9) are robust. Hardware hacking, thoroughly described in chapter 14, is fascinating. The author cared enough to include numerous clear photographs of disassembled equipment, and mentioned many helpful external web references.
While these great chapters comprise more than half of HPYN2E, the remainder is not exceptional. I was not happy with the rambling, wordy chapters on spoofing (12) and tunneling (13). Spare us the quotes from Dante's "Divine Comedy"! Still, this material is easily skimmed.
Because HPYN2E is written more from an intruder's point of view, the title doesn't seem to reflect the material. The book isn't exactly a "how to hack" manual, but it expertly illuminates many facets of compromising information resources.
Still the idea was very interesting (information directly from the real experts), and I kept waiting for a new edition.
Well the second edition is now out, and not only fulfills, but exceeds all my original expectations !!
Let's take a look:
The Approach:
Understanding attacks and vulnerabilities, by understanding 'how to hack' (good hacking of course. . . .ahem )
The Book:
Rewritten, expanded and improved, the book consists of 800+ pages well structured into 18 chapters (against 450+ pages and 15 chapters of the first edition).
Well written, well presented, with a real fancy table of contents, the chapters include url's, a FAQ section and a SOLUTIONS FAST TRACK one.
A lot of CLEVER code is included as well as helpful 'Tool & Traps' and 'Notes from the Underground. . . ' outlines.
The new sections (all outstanding) include:
- Hardware Hacking (otherwise only found in papers)
- Tunneling (excellent)
- IDS evasion (very easily explained)
- Format strings attacks
The Intended Audience:
People willing to become network security pros.
Contents:
- Introduction to Security, Attacks and related Methodologies.
- Cryptography.
- Unexpected Input, Buffer Overflow, Format Strings.
- Sniffing, Hijacking and Spoofing.
- Tunneling, Hardware Hacking, Viruses (et al.).
- IDS Evasion.
- Automated Tools.
- Reporting Security Problems.
The Bottom Line:
It is not just a good book, it is the best book among high level network security books, and the only that compares with specialized papers. Only quite easier.
I got more than 60 papers on buffer overflows. None compares with the classical 'Smashing The Stack For Fun And Profit' by Aleph One. IMHO, however, the corresponding chapter from this book, does compare and is really easier to understand.
Finally, the 'piece de resistance' of the book, is the chapter about Spoofing. Really enjoyed it, and by the way got surprised reading the innovative (to me) technique to 'Spoof Connectivity Through Asymmetric Firewalls'. Good Job Dan ;-)
As an added bonus, as an owner of this book, you'll find a lot of code files, applications and links...
List price: $49.95 (that's 30% off!)
Used price: $25.98
Buy one from zShops for: $25.00
Unlike the attack-minded "Hack Proofing Your Network, 2nd Ed", HPYWN is indeed a defensive-oriented book. It offers strong overviews of widely deployed wireless technologies. These include modern cellular networks and wireless area networks created by 802.11, Bluetooth, and HomeRF. HPYWN offers sound advice on making the best use of available wireless defensive mechanisms, despite acknowledging that Wired Equivalent Privacy (WEP) is "broken." An overview of popular wireless assessment tools like Netstumbler is helpful although not especially thorough...
Of the book's nine chapters, chapters 2 (A Security Primer, 50 pages) and 8 (Auditing, 43 pages) don't add anything original to the current body of published security books. Furthermore, many wireless security topics are discussed repeatedly. For example, I didn't need to read in chapters 1, 4, 5, and 6 that WEP's insecurities stem from weak Initialization Vectors. Other recommendations on changing default configurations, enabling logging, and so on also appear in multiple sections. The editor should have consolidated this information to avoid wasting the reader's time.
Overall, Syngress should be credited for getting into the wireless game with this book. I would have preferred to see protocol decodes, thorough documentation and usage examples for wireless assessment tools, and in-depth VPN deployment guidance. Should the second edition of HPYWN contain this information, it will justify its current page count.
Used price: $2.50
Buy one from zShops for: $4.67
I highly recommend this book to everyone. A truly great fantasy book. Gemmell will keep you on the edge of your seat.
Used price: $1.83
Collectible price: $7.99
I count this book among my all-time favorites, a sort of heir apparent to "Walden."
Used price: $0.01
Collectible price: $2.22
Buy one from zShops for: $1.24
As someone who occasionally sees grizzers on his property, I can't conceive of living in an environment that doesn't have a population of apex predators to keep things interesting. Petersen masterfully chronicles how government funded assassins with the support of short-sighted local ranching communities and clumsy land managers, managed to kill virtually every grizzly in Colorado. He also accurately details how Western ranchers have come to view public lands with more than a sense of ownership but rather with a sense of absolute entitlement. This has led them to run their stock on federal land at ridiculously cheap rates, ignore even the most commonsense principles of husbandry, and push bears and wolves into the zoos and picture books while trying to keep everyone else out. Also to blame are the Baby Huey-like semi-rich, who hack 20 acre ranchettes out of the diminishing habitat and in the process are strangling the thing they profess to love most.
Petersen manages to stay somewhat balanced, using an essay by the outspoken and bearlike Doug Peacock to say what is probably really on his mind regarding sheep ranchers and development dingbats. In the course of researching the book, Peterson also forges unlikely friendships with former (but not reformed) professional and amateur bearslayers , including Ed Wiseman, who killed the last known Colorado grizz in hand to hand combat in 1979.
There is the general belief in the book that the great bear still lives in the San Juans but has become more nocturnal and reclusive as it adapts to its shrinking habitat. There are certainly drainages wild enough to support a grizz but I personally don't believe there are any left. My heart tells me that any state with a wildlife management policy as pathetic and dumbheaded as Colorado's can't have allowed for even a single surviving great bear. Also, I am reminded of a story in Scott Weidensaul's recent (and excellent) book on vanishing species entitled "The Ghost With Trembling Wings." Weidensaul tells the story of an animal who escapes from a European zoo and whose likeness is posted on the news. Consequently, hundreds of eyewitness calls come flooding in from all over the country, each caller claiming to have personally seen the critter. It turns out that the koala had actually been run over by a train several hundred yards from the zoo immediately after escaping. Weidensaul's point is that people WANT to believe something so badly, they convince themselves of its existence. And I'm afraid that is what we are doing with the Colorado grizzly.