Used price: $16.08
Used price: $4.95
Collectible price: $13.95
Buy one from zShops for: $22.00
Every time you read it, it just gets better and better.
This spirited second mainly deals with the coming together of the dwarven clans of Kal-Thax...and the beginings of what will soon be "Thorbardin". If you havent figured it out, this series takes place before the Catacylsm.
This is by far the best "History" series I've ever read. It keeps you coming back for more and more. Though sadly it is out of print, and you have to pay like 20.00 for every book, the price is well worth it.*
*Check Ebay, I've seen quiet a few sets of them on there for a really good price...
-Jon
Used price: $10.54
Buy one from zShops for: $20.28
List price: $22.95 (that's 30% off!)
Used price: $12.00
Buy one from zShops for: $12.50
Dwayne
This collection takes you a grand journey through the realm of fantasy with elves and necromancers and talking trees and wizards and walking gingerbread men.
If you enjoy fantasy, then you should read this. If you enjoyed the Hobbit, then you should read this. If you are looking for something to read to your children at night, then you should read this.
List price: $49.95 (that's 30% off!)
Used price: $24.00
Buy one from zShops for: $24.99
HPYN2E shines in many respects. The "laws of security" in chapter 2 are accurate and enlightening. Chapter 4 helps teach secure programming techniques by comparing insecure and secure code snippets. Chapter 4 also demonstrates debugging and disassembling code, usually not seen in security texts. Chapter 8 probably contains the most advanced coverage of buffer overflows I've read in a book. By actually showing and explaining stack traces, the authors share a level of detail sufficient to satisfy all but the most elite coders. Chapters on "diffing" (5) and format strings (9) are robust. Hardware hacking, thoroughly described in chapter 14, is fascinating. The author cared enough to include numerous clear photographs of disassembled equipment, and mentioned many helpful external web references.
While these great chapters comprise more than half of HPYN2E, the remainder is not exceptional. I was not happy with the rambling, wordy chapters on spoofing (12) and tunneling (13). Spare us the quotes from Dante's "Divine Comedy"! Still, this material is easily skimmed.
Because HPYN2E is written more from an intruder's point of view, the title doesn't seem to reflect the material. The book isn't exactly a "how to hack" manual, but it expertly illuminates many facets of compromising information resources.
Still the idea was very interesting (information directly from the real experts), and I kept waiting for a new edition.
Well the second edition is now out, and not only fulfills, but exceeds all my original expectations !!
Let's take a look:
The Approach:
Understanding attacks and vulnerabilities, by understanding 'how to hack' (good hacking of course. . . .ahem )
The Book:
Rewritten, expanded and improved, the book consists of 800+ pages well structured into 18 chapters (against 450+ pages and 15 chapters of the first edition).
Well written, well presented, with a real fancy table of contents, the chapters include url's, a FAQ section and a SOLUTIONS FAST TRACK one.
A lot of CLEVER code is included as well as helpful 'Tool & Traps' and 'Notes from the Underground. . . ' outlines.
The new sections (all outstanding) include:
- Hardware Hacking (otherwise only found in papers)
- Tunneling (excellent)
- IDS evasion (very easily explained)
- Format strings attacks
The Intended Audience:
People willing to become network security pros.
Contents:
- Introduction to Security, Attacks and related Methodologies.
- Cryptography.
- Unexpected Input, Buffer Overflow, Format Strings.
- Sniffing, Hijacking and Spoofing.
- Tunneling, Hardware Hacking, Viruses (et al.).
- IDS Evasion.
- Automated Tools.
- Reporting Security Problems.
The Bottom Line:
It is not just a good book, it is the best book among high level network security books, and the only that compares with specialized papers. Only quite easier.
I got more than 60 papers on buffer overflows. None compares with the classical 'Smashing The Stack For Fun And Profit' by Aleph One. IMHO, however, the corresponding chapter from this book, does compare and is really easier to understand.
Finally, the 'piece de resistance' of the book, is the chapter about Spoofing. Really enjoyed it, and by the way got surprised reading the innovative (to me) technique to 'Spoof Connectivity Through Asymmetric Firewalls'. Good Job Dan ;-)
As an added bonus, as an owner of this book, you'll find a lot of code files, applications and links...
Used price: $59.94
Buy one from zShops for: $69.95
Harrison's is probably the best medical reference for medical professionals there is. As expected, the 14th edition of this authoritative reference lives up to its name. This book is not meant to be used as a textbook by medical students (or anyone for that matter). For those looking for a textbook, I suggest "Cecil's textbook of medicine", which does a beautiful job in that area. However, when you need to know the last say on any topic in Internal Medicine, your best bet remains Harrison's.
List price: $17.95 (that's 30% off!)
Used price: $8.08
Buy one from zShops for: $11.69
List price: $29.95 (that's 30% off!)
Used price: $18.00
Buy one from zShops for: $18.99
Outstanding introduction for middle-school, high school, even beginning college level students. Very clearly written, not a lot of unnecessary words - just the right level of explanation to get you thinking in the right direction and to see what the graphics are illustrating. My 13-year old loved it, and finally understands a bit more of what his Dad does all day. I've been doing this for 15 years -- and even I got a better grasp of some things.
Highly recommended.
...that also discussed the plusses and minusses of various computer languages....
...and that was useful to a professional programmer, and entertaining for his 13-year-old kid.
that's this book. i occasionally teach introductory programming classes, and i've used this book as a source of handouts and overheads (within the bounds of "fair use" and the copyright laws, of course. :-) ) in my early days as a developer, i also pulled it off of the shelf more than once when i needed a quick graphical metaphor for something that i was trying to understand.
This collection is a nice balance of his early, sexually and emotionally explicit plays -- imagine "Who's Afraid of Virginia Woolf" meets "Oh, Calcutta" -- along with his two great works of political and moral philosophy, "Aunt Dan and Lemon" and "The Fever".
It's hard to describe the latter works, hard to convey their brilliance, difficulty, and, finally, their tremendous ability to disturb. "The Fever" is a monologue and "Aunt Dan and Lemon" relies as much on monologue as dialogue, so neither has ever been much of a hit with audiences used to soundbites and smash cuts. Both could also be said to be assaults on the audience, for you cannot sit through productions of them or read them without having some fundamental beliefs questioned and, if you've really paid attention, upset. At their heart, these works seek to undermine a simple belief which most of us take for granted: that we live a relatively moral, decent life and that we are, at heart, a good person.
There are very few writers who I think are truly necessary, writers without whose voices I would feel absolutely bereft, even less human. Wallace Shawn is one of those writers.