Used price: $14.32
Buy one from zShops for: $12.05
List price: $17.95 (that's 30% off!)
Used price: $1.88
Collectible price: $7.41
Buy one from zShops for: $1.88
I second the reviewer above that I will be next getting Ernest Gann's "Fate is the Hunter" real soon: the description of an icing encounter in the early post-war days of airline transport was terrifying. I've not had the intensity of experience of these writers, but I can really appreciate it.
The quality of the writing is top-notch, so that non-aviators will be able to appreciate these experiences. I would hasten to add that 99.9% of aviation does not have this level of intensity.
This a fabulous anthology.
Used price: $67.15
Buy one from zShops for: $62.66
List price: $13.00 (that's 20% off!)
Used price: $4.55
Buy one from zShops for: $8.99
His stories are short, quiet, meant to be read slowly, and especially, to be read one at a time. Do not read this little volume in one sitting, though certainly that is possible. Rather, read one story, chew it, savor it, and understand how it connects with your life's journey.
Griebner's stories evoke in me Dag Hammarskjold's words of gratitude:
"For all that has been--Thanks!
To all that shall be--Yes" (*Markings*, p. 95)
Used price: $11.99
Used price: $22.00
Buy one from zShops for: $19.80
Used price: $4.99
Collectible price: $15.00
Instead, "Let me Be Free," is on the Nez Perce tribe which lived in Oregon's Wallowa Valley until it was forced from the land in the 1860's. This is a great book if the reader is interested in a century's worth of history about the tribe but I'd suggest something else if the intent on reading this is solely learning about Chief Joseph's tragic flight from the US military in 1877.
I originally got into Lavender's works after reading his fantastic book, "Bents' Fort" which is about the trading family of William Bent in SE Colorado. I had no interest in the subject but was recommended the book and I fell fully immersed into it because of Lavender's detailed writing-style and ability to create real identities to the historical characters instead of just giving names and dates. He has the same writing style in "Let Me Be Free," and will never shy from a unimportant but lighthearted side story. The writing is anything but dry.
The first half of LMBF is on how the tribe lived and existed, its neighbors, and its relations with the first whites to reach Oregon. Lavender has a contentious understanding of the western Native American tribes and writes in a fair and unbiased reader-friendly style and includes the correct names and terms the Nez Perce (Nimipu) used.
The last 100 pages cover Chief Joseph's (Hin-mah-too-yah-lat-kehht's) flight and includes a fantastic map in the front for the reader to follow the tribe along on its failed march to freedom.
The book fails to get five stars from me because I was most interested in the Nez Perce march and it just took too long to finally reach that subject in the book. It reminded me of "Undaunted Courage," (Ambrose's book on Meriweather Lewis) where there is no much buildup to the expedition that once the reader finally reaches it in the book, it falls a bit flat. However, if anyone is interested on the Nez Perce tribe itself, you won't find a better book. Any Western Oregon historians would also immensely enjoy this work.
He downplays the significance of Sacagewea. For the most part she was little used on this voyage. Her one major contribution was helping to secure horses for the great fording of the Bitteroot Mountains. Still, Lavender lavishes much attention on her and her son, which it seems that William Clark did as well. Her presence seemed to secure safe passage during their final leg down the Columbia River, as it made the expedition team seem less war-like.
Lavender also provides the background for the voyage, detailing President Jefferson's dream to establish an American Northwest Passage, linking one ocean to another. Lavender probes the seemingly paternal relationship between Jefferson and Lewis, and how Jefferson was able to win Congress over to a third attempt to cross the continent, despite questions regarding Lewis' qualifications. Jefferson personally trained Lewis for the expedition and provided added tutelage in the form of the leading lights of American science. Like a devoted son, Lewis made every effort to carry out the mission, which Jefferson sponsored, even when it seemed foolhardy to do so.
For those who haven't travelled this route before, you will be in good hands with David Lavender. For those who have, I think you will marvel at how masterful a job Lavender does in recording the events, giving the best rounded version of the "voyage of discovery" that I have read.
Used price: $14.35
Collectible price: $26.95
Buy one from zShops for: $13.95
John H. Hill
Curator-in-Charge of Aviation
San Francisco Airport Museums
John H. Hill
Curator-in-Charge of Aviation
San Francisco Airport Museums
List price: $49.95 (that's 30% off!)
Used price: $24.00
Buy one from zShops for: $24.99
HPYN2E shines in many respects. The "laws of security" in chapter 2 are accurate and enlightening. Chapter 4 helps teach secure programming techniques by comparing insecure and secure code snippets. Chapter 4 also demonstrates debugging and disassembling code, usually not seen in security texts. Chapter 8 probably contains the most advanced coverage of buffer overflows I've read in a book. By actually showing and explaining stack traces, the authors share a level of detail sufficient to satisfy all but the most elite coders. Chapters on "diffing" (5) and format strings (9) are robust. Hardware hacking, thoroughly described in chapter 14, is fascinating. The author cared enough to include numerous clear photographs of disassembled equipment, and mentioned many helpful external web references.
While these great chapters comprise more than half of HPYN2E, the remainder is not exceptional. I was not happy with the rambling, wordy chapters on spoofing (12) and tunneling (13). Spare us the quotes from Dante's "Divine Comedy"! Still, this material is easily skimmed.
Because HPYN2E is written more from an intruder's point of view, the title doesn't seem to reflect the material. The book isn't exactly a "how to hack" manual, but it expertly illuminates many facets of compromising information resources.
Still the idea was very interesting (information directly from the real experts), and I kept waiting for a new edition.
Well the second edition is now out, and not only fulfills, but exceeds all my original expectations !!
Let's take a look:
The Approach:
Understanding attacks and vulnerabilities, by understanding 'how to hack' (good hacking of course. . . .ahem )
The Book:
Rewritten, expanded and improved, the book consists of 800+ pages well structured into 18 chapters (against 450+ pages and 15 chapters of the first edition).
Well written, well presented, with a real fancy table of contents, the chapters include url's, a FAQ section and a SOLUTIONS FAST TRACK one.
A lot of CLEVER code is included as well as helpful 'Tool & Traps' and 'Notes from the Underground. . . ' outlines.
The new sections (all outstanding) include:
- Hardware Hacking (otherwise only found in papers)
- Tunneling (excellent)
- IDS evasion (very easily explained)
- Format strings attacks
The Intended Audience:
People willing to become network security pros.
Contents:
- Introduction to Security, Attacks and related Methodologies.
- Cryptography.
- Unexpected Input, Buffer Overflow, Format Strings.
- Sniffing, Hijacking and Spoofing.
- Tunneling, Hardware Hacking, Viruses (et al.).
- IDS Evasion.
- Automated Tools.
- Reporting Security Problems.
The Bottom Line:
It is not just a good book, it is the best book among high level network security books, and the only that compares with specialized papers. Only quite easier.
I got more than 60 papers on buffer overflows. None compares with the classical 'Smashing The Stack For Fun And Profit' by Aleph One. IMHO, however, the corresponding chapter from this book, does compare and is really easier to understand.
Finally, the 'piece de resistance' of the book, is the chapter about Spoofing. Really enjoyed it, and by the way got surprised reading the innovative (to me) technique to 'Spoof Connectivity Through Asymmetric Firewalls'. Good Job Dan ;-)
As an added bonus, as an owner of this book, you'll find a lot of code files, applications and links...