Used price: $2.94
Collectible price: $9.48
Used price: $1.45
Collectible price: $2.64
Used price: $19.95
Buy one from zShops for: $19.00
The book is almost 900 pages but only 500 are material, the final 400 are case studies and appendixes.
However this is not a bad book, but is not the best way to start learning XML.
XML is not the replacement of HTML. If you want to write XML to convert it to HTML with XSL then you will take twice the time to create them, not an intelligent move. The true power comes when you want to interchage data between applications, not only web (you can use it with desktop applications with C++, Delphi, Java, VB, ASP or any other programming way) or to talk with a web server sending an XML request and receiving an XML response that you can parse with DOM or SAX.
Recommended but you will need other books to go on.
Hunter does a good job explaining each item and I really like the way he branches into many related technologies, instead of just plain XML. Those related technologies include XSLT and XPath, DOM, SAX, DTDs and schemas. Some of these things, such as schemas and DTDs are essential for learning XML, so I'm glad they are covered.
At the beginning of the book, I thought that Hunter was another Microsoft lemming, just following the Microsoft trends and technologies. But it soon became apparent that he uses MS products where they make sense, but is quick to point out their drawbacks. It irks me to no end how the entire world chooses an internationally-accepted standard, then MS decides to come up with their own. Hunter does a good job of pointing that out.
One complaint is that this book doesn't do much in helping the Macintosh user that's starting into the XML field. That may have been remedied in the 2nd edition, and to be fair, there weren't a lot of tools available for the Mac user when this was written. I did find some Mac tools and found it humorous how the Windows, Java and Unix tools require extensive use of the command line, altering class paths, etc, while the Mac version was "drag the file onto the icon" to accomplish the exact same thing. But that's how the Mac world works.
'Beginning XML' does a good job of covering all the important topics related to XML like Namespaces, DTDs, Schemas, XPath, DOM, SAX, XSLT, CSS etc... much so that the title is not really accurate in this sense. The other introductory XML books out there do not even touch on these topics to any practical degree.
I would also not recommend a Microsoft Press XML book as, typical with anything from Microsoft, I suspect it will teach you XML in a style that forces you to be dependent on Microsoft tools. However, as MS is one of the most important purveyors of quality XML tools it would also be a mistake to ignore their offerings. 'Beginning XML' does a very good job of acquainting you with both the MS tools as well as some of the more important third party ones.
The author's style is very friendly and easy to read and succeeds in making very complex and often boring topics like XSLT almost tolerable and sometimes even entertaining. Even more importantly, he touches on all the important issues in depth so that after finishing this book you can consider yourself at least an intermediate level expert in the myriad XML-related technologies out there.
The only reason I'm not giving five stars is because there just might be something better out there. But then, I wouldn't hang around waiting for one, 'coz Beginning XML, unlike the other books out there, is going to educate you on the topic in a sufficiently comprehensive and useful way. XML and its related technologies is a huge and difficult field, and any book that looks like it makes for light reading will, in my opinion, fail to teach the subject properly.
Used price: $17.94
This book is basically the aircraft history of every single B-17 ever built. Now, if that's what you're looking for - then this book is for you. If, however, you're looking for the comprehensive narrative history of the B-17 Flying Fortress that you "thought" this book was going to give you -- keep looking. That's not what this is.
Now that it's in paperback, I MIGHT consider purchasing it. As someone has said, this is like the "B-17 telephone book". It's an awesome reference work on each individual aircraft just like they maintain at the USAF Historical Research Agency in Montgomery, Alabama. For many, this book is ideal. For most of us, that's probably way too much detailed airframe information than we care for.
Used price: $5.99
Buy one from zShops for: $13.89
That convergence is the focus of Voice and Data Security. About a third of the book addresses the fundamentals of voice and data security, covering topics such as cryptography, sniffing, and spoofing. The rest of the book deals with securing digital and voice assets.
As an example, PBX and mail fraud are huge problems facing corporate America. Yet while most companies are aware of the situation, many organizations don't do all they can to secure their voice systems. This book contains an excellent policy and audit checklist on how to set up a corporate PBX policy. Items such as protection management, standards and procedures, technical safeguards, and incident response are discussed in the checklist, which alone is worth the cost of the book.
A single unauthorized modem in a corporate network will undermine firewalls, cryptography, and all other protection mechanisms. Thus, the authors cover how war dialers and telephone line scanners can be used to ensure that the back doors that unauthorized corporate modems create are closed.
Voice and Data Security is valuable to those needing a good introduction to the core ideas and security repercussions involved with the convergence of voice and data systems. It speaks volumes.
When reading VaDS, it's important to remember that all of the authors have some sort of relationship with San Antonio-based voice security company SecureLogix. That's ok, as Foundstone is the powerhouse behind the successful "Hacking Exposed" book series. Some parts of the book read like commercials for SecureLogix products like TeleSweep and TeleWall, but the authors largely focus on non-proprietary solutions to voice security.
VaDS is strongest when it speaks solely to voice security issues, and, to a lesser degree, network infrastructure. I learned quite a bit about tapping phones (ch. 11), voice mail abuse (ch. 14), and voice-data convergence (ch. 5). Chapters on broadband infrastructure and exploitation were helpful. Even though the final chapter seemed out of place, its intriguing coverage of cyber law kept my attention.
Less helpful were the chapters covering general security issues, such as cryptography (ch. 18), malware (ch. 19), sniffing (ch. 20), scanning (ch. 21), passwords (ch. 22), firewalls (ch. 23), IDS (ch. 24), and denial of service (ch. 26). This material is so well-covered elsewhere that its appearance did little to help VaDS distinguish itself. Chapter 27 was an exception, with its succinct discussions of popular Microsoft IIS web server vulnerabilities.
Aside from including well-worn material, VaDS suffered slightly from a few technical mistakes. Explanations of buffer overflows in chapter 4 needlessly associated them with TCP-based sessions. UDP-based buffer overflows are exploited regularly. The author of this chapter also seems to believe that buffer overflows are a problem because they overwrite "user ID and privilege information" on the stack. That's rarely the case; subverting return pointers is the problem. Chapters 8 and 15, describing voice protocols like H.323, were difficult to understand, and ch. 18 (p. 283) makes an unsubstantiated claim that "a well-known Mid-East terrorist was discovered to be using steganography." Typos on pp. 155-156 appeared, and port 443 was replaced by 444 on p. 69.
Overall, VaDS marks a welcome contribution to the information security community. I plan to include it in my tier two security analyst reading list, with recommendations to concentrate on its voice-related content. Hopefully the second edition will strip out the unnecessary network security coverage found elsewhere, and include more excellent explanations of voice security issues.
(Disclaimer: I received a free review copy from the publisher.)
List price: $14.95 (that's 30% off!)
Used price: $5.75
Collectible price: $16.00
Buy one from zShops for: $10.25
What an interesting turn of events; a world class baseball essayist picks an all-star caliber NY Yankee pitcher to follow through a season. They both agreed that this would turn into a book after the season. The problem is that this turns out to be the worst season of Cone's career. Lesser participants would have probably dropped the idea in mid-season. However, this book turns out to be more than the recap of a swan song. Angell gives us the beginning and the middle of Cone's career to go along with the end. We see the highlights and not just the low lights. David Cone makes for an interesting subject but the reader often enjoys the sidebar stories more than the Cone stories. The beauty of Angell's writing is how he takes us on journeys through Baseball and the reader is able to see through the author's panoramic view. We may start with the Red Sox and end up with the Padres. In this book we keep coming back to the ups and downs of David Cone. There are times we would have preferred to linger at other places and with other personalities that Angell introduced us to. Still there is plenty here to keep the reader's interest.
One last comment is on the publisher which is Warner Books. I am confused how it came to be that a lesser publisher would handle this project. The book may be well-written but it is of poor quality. My hardbound copy may not withstand another reading as it is already showing signs of coming apart. I recommend getting the paperback version (assuming there is one). I suspect the paperback will last longer than the cloth-bound edition.
Used price: $10.00
Used price: $30.99
Buy one from zShops for: $35.26
The author is more than qualified to write an historical perspective: He's been a leading authority on the subject of computer graphics and CAD programming for more than a quarter of a century. He's been a personal acquaintance of many of the principal characters in the unfolding of this exciting and still young branch of mathematics. Characters such as Pierre Bezier, Steven Coons, and Carl de Boor. I should emphasize that the historic perspective doesn't interfere with the flow and development of the text from a purely mathematical point of view. You could read the text and skip the history, but that'd be a shame because the historical accounts and biographies are what set this text apart. In some sense you feel like you're experiencing the thrill of discovery in the same way that the theory developed - only in fast forward.
For these reasons, this book will also be of interest to anyone who enjoyed James Gleick's Chaos. But unlike Gleick's Chaos, you'll really get to understand the mathematics behind the story - the story of the development of NURBS. It reads like a novel with twists, coincidences and subplots. The men behind NURBS have had a profound influence on the last part of the 20th century and their methods will literally shape the future as the graphic tools of tomorrow's designers. I wish all textbooks could be written in this style. That would also mean all textbooks would have to be written by the founders of their respective fields and that wouldn't be a bad thing.
If you're a blue-collar Microsoft junkie looking for some sort of certification to let you pretend to be a programmer, perhaps your appetite will be better served by more specific texts. But for anyone who appreciates the art of programming, this book is for you - even if you don't ever touch graphics, it's just a fun book.
List price: $29.98 (that's 30% off!)
Used price: $8.00
Buy one from zShops for: $13.47
The killer is a well respected foreign dignitary who also has a passion for role playing games. He, along with three others throughout the world are members of an exclusive game called the four horsemen. How Cross comes to his identity and possible capture is a series of non stop chills. The ending may not be as topsy turvy and dramatic as other Patterson books, but some surprises do change the complexion of future Cross novels.
Patterson sticks to his format here. The positive aspect is that his fans know the characters and enjoy their continuing saga. Sampson has developed into the type of figure that would be extraordinary in his own book. The negative aspect is that some of Cross's statements and the details of his family life are a bit worn on the faithful Patterson fan. As a result, the Alex Cross novels could use an injection of freshness. Therefore the novel was a bit shy of the better Cross chapters.
Overall the book has a quick flow and only sputters in some of the chapters that surround Alex's relationship with Christine. The villain is devious but also falls short of a Gary Soneji or Jack and Jill. The plot is better than average and I am still left wanting more Alex Cross. A no brainer four star piece of fiction.
Pop Goes The Weasle, the latest installment of Alex Cross, gives his fans almost everything they could ask for and some they don't want!.
Just when Alex is the happiest he has ever been, the events surrounding the latest psychokiller threaten to make this the worst time of his life (even worse than when his wife was killed).
Will Alex pop the question to Christine? Will Alex prove to be a "bad cop", or worse yet a murderer? Will Alex lose what he holds dearest to his heart?
Read this book, and these questions and more will reel you in and keep you hooked until the very last page.
One caution! Don't read this book if you want a long read. I read this book in about 12 hours with no trouble!
Used price: $0.60
Buy one from zShops for: $7.55
Just three pages into Chapter 2, 'Creating a JSP Page', the author hits you with several pages of Java source code as he compares and contrasts the java source produced by JRun, Tomcat, etc as a result of processing a simple JSP page.
The first piece of JSP you see is the page directive, and this topic begins with references to java packages. First, I would think that there are kindler, gentler ways to dip ones toe into the JSP waters. Surely some simple JSPs could be written that do not require the <%@page import...> directive, saving this subject for later. And even so, the explanation of packages would make no sense to someone who did not already understand java.
And so it goes throughout this book.