List price: $27.95 (that's 30% off!)
Used price: $18.00
Buy one from zShops for: $17.98
The gist of the problem for the British was that Britain had an insatiable demand for tea and silk, but there was virtually nothing the Chinese wanted to import from Britain. Therefore British traders in Canton imported opium from British-owned plantations in India, creating millions of Chinese opium addicts (including the emperor himself). Not only did drug dealing more than offset their negative balance of payments, it eventually generated nearly 10% of British tax collections.
The first Opium War erupted in 1839 when the Chinese officials 'got serious' about suppressing the opium trade and resulted, among other things, in the British navy and numerically small but well-armed ground troops opening various Chinese ports by force and obtaining possession of Hong Kong. The second Opium War, in which French navy and army forces joined, resulted in the conquest of Peking and the destruction of immense artistic and cultural wealth when the Summer Palace complex was looted and burned. In fact the words 'loot' apparently came into the English language in the first Opium War from a Hindi word 'lut'. Queen Victoria even named a Pekinese dog sent to her from the sack of Peking 'Lootie'.
Nobody comes off well. The British are uniformly horrible, and the French only slightly better. Americans are not active belligerents (excepting one occasion when a US Navy captain intervenes, despite contrary orders, to help the British), but American traders and consuls are involved in drug dealing. And, yes, the Chinese are victimized, but many Chinese grew wealthy as opium importers (the authors describe one Chinese as the world's wealthiest man), most officials were corrupt, incompetent and uncaring regarding their citizens' welfare, and Chinese soldiers serving in the British army commit as many atrocities as the Brits and Sikhs.
While the British ignore this sorry episode and Americans are largely ignorant of it, the Chinese remember Western aggression and their victimization all too well. Opium plagued China for another century, although most was home-grown by 1900. On the eve of World War II 10% of the population was addicted, with 30% of Hong Kong's population addicted (Not the image of efficient British colonial administration, is it?). Massive opium addiction did not end in China until the Communists brutally cracked down on it after their 1949 victory. The authors conclude, 'The Great Helmsman just said no.'
I recommend this book as an excellent overview of 19th Century Western interaction with China and an important piece of knowledge for those who would understand Chinese wariness towards the West since 1949. The few reproductions of paintings and photographs are interesting, but the large scale map of China is inadequate to follow the complex series of military actions. There is a bibliography for those who want to study the subject further, although many of those books will be hard to come by outside a major university library.
Read and escape for a while. Buy as many copies as You can and make it read to your children before it is too late for them.
Used price: $1.40
Buy one from zShops for: $4.73
Used price: $20.00
Collectible price: $19.99
Buy one from zShops for: $18.01
McDonald stresses the fact that he does not want Travis to appear as a godlike hero,he wants to show us Travis as a real man.He succeeds in doing this,and what is even better is that he maintains his respect for Travis and treat him with dignity,even though he becomes more human than most people could accept.(In South Carolina,according to McDonald,some people shake their heads and wonder why Travis didn`t end up in hung instead of a hero.)He also weighs both sides of the matter very carefully.Travis might have been a man who took the law in his own hands and because of that,became guilty of a severe crime(he is said to have murdered a man he thought guilty of having an affair with his wife),but at the same time,he was a man who fathered and befriended all children who came to need him,a man who loved fun and games,a man who was worried about having to do legal work in a foreign language when he arrived in Texas,but who rose to the occasion and taught himself Spanish(he even spoke Spanish to his men during the battle of the Alamo),a man with Mexican friends as well as Anglo-American friends-in short,a man who would never say no to a challenge and who always did his utmost,though his means were small. It`s a terrible thing that he should perish so young,but he was where he was needed when we needed him there.He was a great man, great not meaning perfect,something which McDonald shows in this fine book.
My only complaint is that the book appears to be an introduction to Travis,something which it isn`t-you ought to have read a little bit about him on beforehand.In addition,I sorely miss information on Travis`choice of weapons,both as commander of the Alamo and in his younger years.These are merely trifles,though,and I assure you that you are going to love this book,just like I do.
List price: $20.00 (that's 30% off!)
Used price: $9.95
Collectible price: $10.00
Buy one from zShops for: $13.15
Certainly the myth of Crockett is dented somewhat, as we see that he is a man clumsy in politics, impatient with family life, seeking the next adventure. Bowie also comes across as a rather scandalous man, involved in shady land and slave dealings which would have most certainly placed him in jail today. And finally Travis, whose life has never before been examined with such detail, comes across as a rather poor businessman, constantly in debt and a obsessive womanizer to boot.
Like all great historical figures shrouded in myth, it was only a matter of time before modern-day historians placed these Texas revolutionary heroes beneath a very un-romantic, yet 21st century microscope. So it comes as a rather stunning surprise that after these three statue-like figures are dressed down in human fashion, by battle's end they still, somehow, manage to put their past behind them and become heroes in spite of their many flaws.
I'm not sure if Mr. Davis did this intentionally, just as I'm not sure if you could truly draw a portrait of these men and this battle and not find shades of extraordinary heroism within the walls of that mission fortress. Certainly, John Wayne's infamous 1960 film "The Alamo" is anything but the truth, but the great unvarnished fact about this story is that even with the bones revealed, these men still come across as noble and heroic, having seized an incredible moment in time, thus surviving for all eternity.
And that, undoubtedly, is what continues to fascinate Americans, if not world citizens, about this battle. These men, while holding out for the hope of reinforcements, chose to stay, eventually sealing their doom. Yes, the line may not have been drawn in the sand, but in "Three Roads to the Alamo," that obvious fact becomes surprisingly irrelevant. Warts and all, these men's lives serve as the proper contrast to their eventual final deeds, making their decisions in 1836 all the more unforgettable.
"Three Roads to the Alamo" is a intimately detailed historic work, which will fascinate all readers interested in this legendary battle. Arguably, it is one of the finest books yet written about this 13-day siege.
Allen J. Wiener
Used price: $5.99
Buy one from zShops for: $13.89
That convergence is the focus of Voice and Data Security. About a third of the book addresses the fundamentals of voice and data security, covering topics such as cryptography, sniffing, and spoofing. The rest of the book deals with securing digital and voice assets.
As an example, PBX and mail fraud are huge problems facing corporate America. Yet while most companies are aware of the situation, many organizations don't do all they can to secure their voice systems. This book contains an excellent policy and audit checklist on how to set up a corporate PBX policy. Items such as protection management, standards and procedures, technical safeguards, and incident response are discussed in the checklist, which alone is worth the cost of the book.
A single unauthorized modem in a corporate network will undermine firewalls, cryptography, and all other protection mechanisms. Thus, the authors cover how war dialers and telephone line scanners can be used to ensure that the back doors that unauthorized corporate modems create are closed.
Voice and Data Security is valuable to those needing a good introduction to the core ideas and security repercussions involved with the convergence of voice and data systems. It speaks volumes.
When reading VaDS, it's important to remember that all of the authors have some sort of relationship with San Antonio-based voice security company SecureLogix. That's ok, as Foundstone is the powerhouse behind the successful "Hacking Exposed" book series. Some parts of the book read like commercials for SecureLogix products like TeleSweep and TeleWall, but the authors largely focus on non-proprietary solutions to voice security.
VaDS is strongest when it speaks solely to voice security issues, and, to a lesser degree, network infrastructure. I learned quite a bit about tapping phones (ch. 11), voice mail abuse (ch. 14), and voice-data convergence (ch. 5). Chapters on broadband infrastructure and exploitation were helpful. Even though the final chapter seemed out of place, its intriguing coverage of cyber law kept my attention.
Less helpful were the chapters covering general security issues, such as cryptography (ch. 18), malware (ch. 19), sniffing (ch. 20), scanning (ch. 21), passwords (ch. 22), firewalls (ch. 23), IDS (ch. 24), and denial of service (ch. 26). This material is so well-covered elsewhere that its appearance did little to help VaDS distinguish itself. Chapter 27 was an exception, with its succinct discussions of popular Microsoft IIS web server vulnerabilities.
Aside from including well-worn material, VaDS suffered slightly from a few technical mistakes. Explanations of buffer overflows in chapter 4 needlessly associated them with TCP-based sessions. UDP-based buffer overflows are exploited regularly. The author of this chapter also seems to believe that buffer overflows are a problem because they overwrite "user ID and privilege information" on the stack. That's rarely the case; subverting return pointers is the problem. Chapters 8 and 15, describing voice protocols like H.323, were difficult to understand, and ch. 18 (p. 283) makes an unsubstantiated claim that "a well-known Mid-East terrorist was discovered to be using steganography." Typos on pp. 155-156 appeared, and port 443 was replaced by 444 on p. 69.
Overall, VaDS marks a welcome contribution to the information security community. I plan to include it in my tier two security analyst reading list, with recommendations to concentrate on its voice-related content. Hopefully the second edition will strip out the unnecessary network security coverage found elsewhere, and include more excellent explanations of voice security issues.
(Disclaimer: I received a free review copy from the publisher.)
Used price: $4.25
Buy one from zShops for: $4.50