Used price: $2.68
Collectible price: $6.31
Buy one from zShops for: $2.50
List price: $23.95 (that's 30% off!)
Used price: $3.99
Collectible price: $5.99
Buy one from zShops for: $5.95
Murder in Red, White & Blue was interesting UNTIL the solution.
Never, never have I had to try so hard to figure out the ending.
This book is a fascinating mixture of fact and fiction. I was drawn into the time and place completely while reading. I enjoyed the Hilda character, an independent woman struggling to live in her time and social place. The story itself was very good. With several different things going on at once, it was hard to know for sure what was happening and who to believe. And, while I did guess the solution, I completely overlooked the clues that pointed to the ending. My only complaint is that the author's note really belongs at the back of the book.
This was my introduction to the Hilda Johansson character. I'm hooked on this fun mix of fact and mystery and will be looking for the others in the series.
Used price: $5.99
Buy one from zShops for: $13.89
That convergence is the focus of Voice and Data Security. About a third of the book addresses the fundamentals of voice and data security, covering topics such as cryptography, sniffing, and spoofing. The rest of the book deals with securing digital and voice assets.
As an example, PBX and mail fraud are huge problems facing corporate America. Yet while most companies are aware of the situation, many organizations don't do all they can to secure their voice systems. This book contains an excellent policy and audit checklist on how to set up a corporate PBX policy. Items such as protection management, standards and procedures, technical safeguards, and incident response are discussed in the checklist, which alone is worth the cost of the book.
A single unauthorized modem in a corporate network will undermine firewalls, cryptography, and all other protection mechanisms. Thus, the authors cover how war dialers and telephone line scanners can be used to ensure that the back doors that unauthorized corporate modems create are closed.
Voice and Data Security is valuable to those needing a good introduction to the core ideas and security repercussions involved with the convergence of voice and data systems. It speaks volumes.
When reading VaDS, it's important to remember that all of the authors have some sort of relationship with San Antonio-based voice security company SecureLogix. That's ok, as Foundstone is the powerhouse behind the successful "Hacking Exposed" book series. Some parts of the book read like commercials for SecureLogix products like TeleSweep and TeleWall, but the authors largely focus on non-proprietary solutions to voice security.
VaDS is strongest when it speaks solely to voice security issues, and, to a lesser degree, network infrastructure. I learned quite a bit about tapping phones (ch. 11), voice mail abuse (ch. 14), and voice-data convergence (ch. 5). Chapters on broadband infrastructure and exploitation were helpful. Even though the final chapter seemed out of place, its intriguing coverage of cyber law kept my attention.
Less helpful were the chapters covering general security issues, such as cryptography (ch. 18), malware (ch. 19), sniffing (ch. 20), scanning (ch. 21), passwords (ch. 22), firewalls (ch. 23), IDS (ch. 24), and denial of service (ch. 26). This material is so well-covered elsewhere that its appearance did little to help VaDS distinguish itself. Chapter 27 was an exception, with its succinct discussions of popular Microsoft IIS web server vulnerabilities.
Aside from including well-worn material, VaDS suffered slightly from a few technical mistakes. Explanations of buffer overflows in chapter 4 needlessly associated them with TCP-based sessions. UDP-based buffer overflows are exploited regularly. The author of this chapter also seems to believe that buffer overflows are a problem because they overwrite "user ID and privilege information" on the stack. That's rarely the case; subverting return pointers is the problem. Chapters 8 and 15, describing voice protocols like H.323, were difficult to understand, and ch. 18 (p. 283) makes an unsubstantiated claim that "a well-known Mid-East terrorist was discovered to be using steganography." Typos on pp. 155-156 appeared, and port 443 was replaced by 444 on p. 69.
Overall, VaDS marks a welcome contribution to the information security community. I plan to include it in my tier two security analyst reading list, with recommendations to concentrate on its voice-related content. Hopefully the second edition will strip out the unnecessary network security coverage found elsewhere, and include more excellent explanations of voice security issues.
(Disclaimer: I received a free review copy from the publisher.)
List price: $29.95 (that's 30% off!)
Used price: $11.99
Collectible price: $34.95
Buy one from zShops for: $16.69
I thought this book was going to be some kind of adventure tale of roughing it for a year, but it turns out that Sargent lives in the Notch, and kept a diary for a year. The book as a whole is kind of like the pictures in it: occasionally interesting, but fall short of being really beautiful because they're rendered in poor-quality black-and-white printing.
Buy one from zShops for: $14.95
The book is three separate related novelettes. The first story features Isaac Biggs, captain of the foretop on the merchant bark Anne in 1810. It covers a time period of several days and deals with the problems and seamanship aboard the bark. There is a thieving third mate who intends to kill or injure Isaac. Having created this problem, the author extracts Isaac by having him pressed into service aboard an English frigate. No more is heard of the Anne or how the problems aboard were resolved. An additional chapter could have closed out this tale.
The second part of the book is a story about service aboard the British frigate Orpheus from 1810 to 1812. Isaac Biggs is a maintopman and plays a supporting role. The action skips forward rather quickly from 1810 to 1812 when the Orpheus leads a small squadron against a French convoy. Here the writing goes off track. The Orpheus is attacking a French brig, almost wrecking it completely with a couple of broadsides; then the brig is fighting like a frigate; then they board the brig; then they take off the captured officers who seem to be the complement from a frigate, etc. The author seems to lose track of where he is in the storyline, and seemed to forget that a brig was a lieutenant's command with perhaps 40 to 50 in the crew, no significant number of marines, and perhaps 12 four-pounder popguns for its armament (the light structure of a brig could not take the recoil of heavy guns). The story of the action against the French convoy is never completed, and the tale skips forward to a scene in a tavern in Nassau.
The third part of the book is about an American privateer commanded by Captain Smalley, formerly captain of the bark Anne. Isaac Biggs joins the tale at the midway point. Eventually Isaac is able to return to the United States. By placing three stories in the same book, the action becomes superficial at some points, jumping between points where action is very detailed. The repeated nautical commands for sail handling can get a bit tedious.
Clearly the author, Mr. White, knows his ships and his sailing. But that's like the special effects in a sci-fi movie, you have to care about the characters or else it's just a bunch of flashing lights. The author shows some potential as a writer, but it all reads a bit too amatureish -- like a first submission to a creative writing course. There are are way too many point of view shifts, so it can become difficult to remember who is who. Perhaps it was an intentional attempt at subtle parody, but I found it annoying to have very similar personality types in the role of junior officers on the the American Anne and the British Orpheus. And then, the story final seems to get going with a privateering raid -- and then they go home. Yes, it's the first book in a triology, but the story just stops -- it does not end.
I've also got to get this off my chest. The forward was written by someone who is supposed to be a professor of history at the Naval War College, yet his historical facts are wrong! James Barron, captain of the Cheasapeake during the Cheasapeake/Leopard affair was not killed in that action. He was courtmartialed and temporarily suspended from duty in the navy as a result of his role in the affair. His other claim to fame is that he was the one who killed Stephen Decatur several years later. Of course, none of this really matters since the none of the provocations for war (other than pressing sailors) was even mentioned in the novel --wasn't there something about "orders in council?"
Anyway, I don't recommend this book. I do not plan to purchase or read books two and three.
Used price: $5.00
Collectible price: $29.09
Used price: $1.47
Collectible price: $5.29
Buy one from zShops for: $5.75
Elizabeth and Tom Watts (her boyfriend) seem to be having trouble in their relationship. Elizabeth ex-boyfriend William White who Elizabeth thought died in a Car Accident really didn't. William White and Elizabeth were really in love until one day Elizabeth finds out that he is a racist and was involve in an attack of her bestfriend Nina and her boyfriend Ryan. Elizabeth expose the news all over campus. But when William White returns is he looking for a second chance or revenge?? This book will leave you amaze!
Used price: $116.31
Buy one from zShops for: $116.31
Used price: $0.01
Buy one from zShops for: $3.00
Used price: $0.99
Worth owning and using.
The second book tells the tale of a new hunter and how he copes with that fact -- it's great. This one has the supporting character as a hunter but a) she doesn't know what she is, b) she sees nothing but Garou, and c) deals exclusively with a Garou sept.