Welcome to UnixReview.com

Main Menu
  Home
  Archives
  Reviews
  Books
  Geek Links
  Contact Us

Sections
  Regular
  Expressions

  Tool of the Month
  Open Source
  Certification
  Shell Corner
  lost+found


Newsletter
Get the Newsletter
Get the Newsletter

 

Book Reviews

Book Review: BGP
Border Gateway Protocol (BGP) has been elevated to the protocol-de-jour in many circles. Wanting to understand the topic in depth, I turned to a book with a title simple enough to imply that it was a comprehensive reference on the topic. I was not disappointed.
December 2002

Book Review: Information Architecture for the World Wide Web, Second Edition
Although during the past year or so, we've seen a number of Web sites close shop and disappear, we've also seen those sites that survived grow larger and more complex. Several years ago, it was accepted that Web sites could be somewhat clunky and amateurish; today, however, the competion demands more.
December 2002

Book Review: UNIX Administration: A Comprehensive Sourcebook for Effective Syste
One of the goals of Unix was to be a universal operating system. While Unix has achieved a level of ubiquitousness unparalleled in information systems, the fact remains that with hundreds of different flavors of Unix, getting a handle on the operating system is no easy feat.
December 2002

Book Review: Red Hat Linux Security and Optimization
A doctrine of the open source movement is that although the software is free, you have to pay for the support and documentation. While anyone can go to ftp.redhat.com/pub/redhat/ and get the Red Hat Linux software for free, books on Linux or other open source topics will cost the reader money. But for readers who are willing to shell out $50 for a book about Linux security, Red Hat Linux Security and Optimization is a good overview on the core concepts of Linux security and how to secure, optimize, and harden Red Hat.
December 2002

Book Review: Absolute BSD
Ted Nolan reviews Absolute BSD: The Ultimate Guide to FreeBSD by Michael Lucas.
November 2002

Book Review: The Book of SAX
Laird reviews The Book of SAX, published by No Starch Press.
November 2002

 Book Review: Perl for Web Site Management
If there's a Perl niche that O'Reilly hasn't yet covered, I'm not sure what it would be. Perl for Web Site Management is a recent Perl title from O'Reilly, aimed at giving would-be Webmasters a full arsenal to help manage Web sites.
November 2002

Book Review: Network Security with OpenSSL
The latest addition to O'Reilly's "must-have" references is Network Security with OpenSSL. The book covers pretty much all you'd ever need to know about using OpenSSL in your programs.
October 2002

Book Review: Universal Command Guide
If there is one book the administrator of a mixed network needs on his shelf, it is Hungry Minds’ Universal Command Guide for Operating Systems. Surprisingly, that is my claim, and not theirs. In a world full of marketing and advertising, this book could easily qualify for the best book to quietly take its place on the bookstore shelf in a long time – what they would call a “sleeper” in the movie world.
October 2002

Book Review: The Art of Deception: Controlling the Human Element of Security
Kevin Mitnick says "the term 'social engineering' is widely used within the computer security community to describe the techniques hackers use to deceive a trusted computer user within a company into revealing sensitive information, or trick an unsuspecting mark into performing actions that create a security hole for them to slip through." It's suitable that Mitnick, once vilified for his cracking exploits, has written a book about the human element of social engineering — that most subtle of information security threats.
October 2002

Review: A New Kind of Science
August 2002

Linux and Windows 2000 Integration Toolkit: A Complete Resource
How complete is this "complete resource"? Find out in Dulaney's review.
August 2002

802.11 Wireless Networks: The Definitive Guide
July 2002

Samba Book Roundup
July 2002

Web Services Essentials
June 2002

Essential Checkpoint Firewall-1
June 2002

Performance Monitoring
June 2002

Book Review: XML Security Books
Ben Rothke reviews two new XML security books.
October 2002

Book Review: Learning Unix for Mac OS X
O'Reilly's Learning Unix for Mac OS X is the first book (that I'm aware of, anyway) out there to help the Mac faithful get a grip on Unix. It's a smallish tome that won't scare off folks who are used to pointing and clicking (with only one button!) their way through life.
September 2002

Book Review: Desktop Witness — The Do's & Don'ts of Personal Computer Security
It used to be said that the most secure computer was one that was powered off. But with dial-up technology that can remotely start up a computer, such an approach is no longer sufficient. The old approaches must be modified to deal with the current computer security threats; and with that, Desktop Witness — The Do's & Don'ts of Personal Computer Security attempts to enable the reader do the unthinkable — both use their personal computer, and have security and privacy.
September 2002

Book Review: Web Programming in Python: Techniques for Integrating Linux, Apache
Is Web Programming In Python: Techniques for Integrating Linux, Apache, and MySQL by George K. Thiruvathukal, Thomas W. Christopher, and John P. Shafaee, for you? Perhaps. It's neither so perfect (like anything written by Donald Knuth, for example) that everyone should have a copy, nor so flawed as to be worthless. This book has quite a distinctive character. As I explain below, its fitness for you depends a great deal on what you're after in a book.
September 2002

Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Writing a book on wireless security is like writing a book on safe skydiving — if you want the safety and security, just don’t do it.  Hard-wired (cabled) networks have been around for decades and they are still for the most part insecure.  Wireless networking (focusing on 802.11), which has been around for only a few years, is clearly an insecure technology.  With that, there is currently not a lot to write about when it comes to effective wireless security. Wireless Security Essentials: Defending Mobile Systems from Data Piracy confirms that there is little to say on this topic because although it is 345 pages in length, only about 75 pages deal with wireless security.  Of those 75 pages (pages 135 – 207), about 15 pages discuss vendor products. 
August 2002

Web Performance Tuning, 2nd Edition
The latest edition of Web Performance Tuning features significant updates and expanded content. Read Emmett's review to find out if the new edition is truly brilliant, just OK, or something less.
June 2002

Zope Book Roundup
Zonker checks out offerings from No Starch Press and New Riders to see who's got the dope on Zope.
June 2002

HIPAA Book Roundup
Rothke presents six of the most useful HIPAA resource books to help you gain an understanding of the topic and how it may affect your organization.
May 2002

Essential SNMP
Emmett confesses, "I can toss out acronyms likes MIBS, RMON, and NMS with the best of them, but if pushed into a corner, I wouldn't be able to hide the holes in my understanding of SNMP." Find out if Essential SNMP is enough to fill those knowledge gaps.
May 2002

Apache Roundup
"Bertolt Brecht wrote a classic play called 'The Good Person of Szechwan,' in which three gods roam about trying to find one -- just one -- any one -- good person. I felt like one of those gods as I roamed about the bookstore trying to find one -- just one -- good book about administering Apache on a Linux server..."
May 2002

Dot.con and dot.bomb
Dot.con provides a retrospective glimpse of the dot.com bubble, whereas dot.bomb chronicles the meteoric rise and fall of a specific internet company, Value America. Check out Rothke's review to see how these two books stack up.
May 2002

IP Routing
Most network administrators know something about routing, but many feel they don't know enough about it. The purpose of the newly published IP Routing is to fill the knowledge gaps that administrators may have.
April 2002

Introduction to Expert Systems
Expert systems can be loosely defined as computer programs that apply human expertise in solving problems. This book focuses on how expert systems are implemented and should interest anyone who'd like to see how AI works "under the hood."
April 2002

Free as in Freedom: Richard Stallman's Crusade for Free Software
Rothke reports on a new release from O'Reilly & Associates: the mesmerizing biography of Richard Stallman, one of the most influential people in computer science.
March 2002

Web Security, Privacy & Commerce, 2nd Edition
Web security, privacy, and commerce have changed radically in the last five years. Rothke checks out a much-needed 2nd edition from computer security veterans Simson Garfinkel and Gene Spafford.
March 2002

Beyond Our Control? Confronting the Limits of Our Legal System in the Age of Cyb
Rothke notes that, although most of us aren't lawyers, the topics in this book -- cyber-security, consumer fraud, free speech rights, intellectual property rights, file-sharing programs, and more -- are worth reading about.
February 2002

Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios
Are you up for a good mystery, cloaked in the guise of an incident report scenario? This book contains 20 incident report scenarios, complete with elements of deception, intrigue, false identity, forensics, complexity, and mitigation. A sample solution is provided for each scenario.
February 2002

Solaris 8 Security
Rothke discovers a resource that won't waste your time or your money -- or a lot of trees.
February 2002

T1: A Survival Guide
Durham checks out a survival guide that's intended to make life easier for T1 systems administrators.
January 2002

Managing IMAP
Managing IMAP is a collection of useful information for those faced with the tasks of IMAP server administration, troubleshooting, and system design.
January 2002

Writing Information Security Policies
In many ways, an information security policy is like dietary fiber: we all agree that it is necessary and beneficial, but only a handful of people take action to obtain it. Rothke explains while investigating this title from New Riders.
January 2002

CSS -- The Definitive Guide
Today's newest browsers support most of CSS1, and the specs for CSS2 are already out. Nonetheless, this book has a lot to offer.
January 2002

Incident Response
Rothke checks out a book that's designed to help you know what to expect -- and what to do -- when the inevitable occurs.
January 2002

Linux Web Server CD Bookshelf
Holman reviews O'Reilly's latest CD compilation.
January 2002

DocBook: The Definitive Guide
This is by no means a beginner's guide to DocBook, and it would be a steep learning curve for readers with no previous experience with the various markup languages (SGML, HTML, or XML). Although Walsh and Muellner do present SGML and XML, I recommend that anyone who is not familiar with these languages get a good introduction from another source before diving into this book.
December 2001

Fresh Styles for Web Designers: Eye Candy from the Underground
Fresh Styles for Web Designers offers alternatives to the unnecessarily bland, print-oriented design that exists on the Web today. Author Curt Cloninger acknowledges the Web as a unique communications medium and advocates designing for the Web, such as it is.
December 2001

Linux Device Drivers
If you're a casual Linux user, I suggest that you run with Godspeed from this title and never look back. On the other hand, if you are a developer immersed in the bowels of the Linux kernel version 2.4, this is one book you’ll likely read until it's ragged. If you fall between the two ends of the spectrum, you’ll find this book intriguing and enlightening, in many ways.
November 2001

Ethernet: The Definitive Guide
If you've been occupied with networking for any length of time, you’ve undoubtedly acquired a lot of information about Ethernet. O’Reilly’s Ethernet: The Definitive Guide, however, brings to light just how little the average administrator actually knows about it.
November 2001

Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses
Recent security books have dealt exclusively with point security issues such as Windows NT security, Cisco router security, and TCP/IP security. Although point security is necessary, it does not provide the necessary level of security unless the varied points are integrated.
November 2001

Server Load Balancing
Don't be fooled by its brevity; this book is packed with concise information on Layer 4 and 5 network-based load balancing.
October 2001

Web Application Development with PHP 4.0
Zonker finds something for new and old programmers alike in this book by Tobias Ratschiller and Till Gerken.
October 2001

MySQL: Building User Interfaces
Ever thought of using MySQL and GTK+ for bulding custom apps? Zonker reviews this recent offering from New Riders.
October 2001

Exim: The Mail Transfer Agent
This book covers everything you've ever wanted to know about Exim, and probably quite a few things that you didn't know you wanted to know (but will be glad to find out).
September 2001

Instant Perl Modules
Graham uncovers a book designed to promote and support the reuse of Perl modules.
September 2001

The Linux Cookbook
"Webmaster Randy" offers a sample taste of The Linux Cookbook by chef...er, author Michael Stutz.
September 2001

Programming Linux Games
If the thought of Linux and games together really gets your motor running, check out this book on building game engines with Linux.
September 2001

Real World Linux Security: Intrusion Prevention, Detection, and Recovery
Information security adversaries are at your door. It's only a matter of time before network attacks occur. It is within this framework that Bob Toxen presents Real World Linux Security, a superb overview of how to comprehensively secure a Linux system.
August 2001

The Joy of Linux
Take two Linux-lovers and 10 years of shared experiences in the Linux community. Add a little Nitrozac and Snaggy. Shake it all up, intersperse with innuendo, and you've got The Joy of Linux.
August 2001

CERT Guide to System and Network Security Practices
If your mother were involved with information security, she would tell you to read this book. Listen to her.
August 2001

Effective awk Programming
Effective awk Programming provides a thorough look at the uses of awk. It covers the important details while being easy to follow.
August 2001

Just for Fun: The Story of an Accidental Revolutionary
One cannot help feeling some delight about the refreshing unlikeliness of the story of Linus Torvalds.
July 2001

Incident Response -- Investigating Computer Crime
Zonker checks out a book on investigating computer crime.
July 2001

DNS and BIND -- Help for System Administrators 4th Edition
Zonker reviews the latest edition of DNS and BIND -- a book sys admins have been swearing by for years.
July 2001

Security Engineering: A Guide to Building Dependable Distributed Systems
Rothke reviews Ross Anderson's treatise on security design and engineering.
July 2001

Networking Linux: A Practical Guide to TCP/IP
Zonker reviews a basic guide for new Linux network admins.
June 2001

Maximum Security, 3rd Edition
Rothke reviews the latest edition of this popular book.
June 2001

Policy Routing Using Linux
Marsh's book is well suited for experienced admins or those who are already familiar with routing.
June 2001

The Humane Interface--New Directions for Designing Interactive Systems
In his book, Jef Raskin describes fundamental flaws in current interface design practices and offers solutions for improvement. Reviewer Ken Barnes says Raskins' ideas are gold. "They are ideas of the best sort -- those that inspire imaginative controversy."
June 2001

Hacking Linux Exposed: Linux Security Secrets & Solutions
November 0003

Swarm Intelligence
November 0003

Extreme Programming Explained--Embrace Change
November 0003

Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
April 2001

Book Review Millennial Perspectives in Computer Science
November 0003

Book Review SSH, the Secure Shell: The Definitive Guide
November 0003

Book Review Network Printing Book Review
November 0003

Book Review Network Security Essentials
November 0003

Book Review Hacking Exposed
November 0003

Book Review Web Accessibility for People with Disabilities
November 0003

Book Review Steal This Computer Book 2
November 0003

Book32
Tony Bourke discusses implementation, traffic flow, and security issues related to a NAT-based SLB network architecture.
October 2001

   
Home | Top


Copyright © 2002 CMP Media LLC, Privacy Policy
Comments about the Web site: webmaster@unixreview.com
SDMG Web Sites: Byte.com, C/C++ Users Journal, Dr. Dobb's Journal, MSDN Magazine, New Architect, SD Expo, SD Magazine, Sys Admin, The Perl Journal, UnixReview.com, Windows Developer Network

www2