8/31/2011

CCIE Security Practice Labs (CCIE Self-Study) (Practical Studies) Review

CCIE Security Practice Labs (CCIE Self-Study) (Practical Studies)
Average Reviews:

(More customer reviews)
I am disappointed with this book!! Full of mistakes!
Example lab 1: Advertising a route into RIP ver 1 does not work if the major net on the interface has a different subnet mask then the subnet he tries to advertise to R5. What he is trying to accomplish is nonsense! You cant advertise a route if it is in the rip database by just creating a loopback interface on router R1!
Then further on OSPF why would he configure authentication on a loopback interface which is printed out on the CD under configuration examples? Quite frankly this book is not a 5* for sure. I bough it to prepare myself for the lab but I am looking forward what else I discover. So perhaps the author should publish some corrections or updates to this book!
Thanks!

Click Here to see more reviews about: CCIE Security Practice Labs (CCIE Self-Study) (Practical Studies)


Seven comprehensive CCIE security labs to hone configuration and troubleshooting skills

Prepare for the CCIE Security lab exam and hone your security configuration and troubleshooting skills with seven complete practice scenarios that cover:
Basic device configuration
Routing configuration
ISDN configuration
Cisco PIX Firewall configuration
VPN configuration, including IPSec, GRE, L2TP, and PPTP
VPN-3000 Concentrator configuration
Intrusion Detection System (IDS) 42xx Appliance configuration
Cisco IOS Firewall configuration
AAA configuration
Advanced security issues
IP services and protocol-independent features
Security violations

The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. Today's network administrators and managers are under big pressure to satisfy ever-increasing demands from customers, suppliers, and employees for 100 percent network resource availability and access to applications and data. The end result is that the cost of a network security breach has never been higher. Accordingly, the demand for networking professionals with expert-level network security configuration and troubleshooting skills is also great. The Cisco Systems CCIE Security certification is a prestigious program that sets the professional benchmark for internetworking expertise, validating proficiency with advanced technical skills required to design, configure, and maintain a wide range of network security technologies.

CCIE Security Practice Labs provides a series of complete practice labs that mirror the difficult hands-on lab exam. Written by a CCIE Security engineer and Cisco Systems CCIE proctor, this book lays out seven end-to-end scenarios that are both complex and realistic, providing you with the practice needed to prepare for your lab examination and develop critical-thinking skills that are essential for resolving complex, real-world security problems. While many engineers are able to configure single technologies in standalone environments, most will struggle when dealing with integrated technologies in heterogeneous environments.

CCIE Security Practice Labs consists of seven full-blown labs. The book does not waste time covering conceptual knowledge found in other security manuals, but focuses exclusively on these complex scenarios. The structure of each chapter is the same, covering a broad range of security topics. Each chapter starts with an overview, equipment list, and general guidelines and instructions on setting up the lab topology, including cabling instructions, and concludes with verification, hints, and troubleshooting tips, which highlight show and debug commands. The companion CD-ROM contains solutions for all of the labs, including configurations and common show command output from all the devices in the topology."Security is one of the fastest-growing areas in the industry. There is an ever-increasing demand for the experts with the knowledge and skills to do it."-Gert De Laet, Product Manager, CCIE Security, Cisco Systems
CCIE Security Practice Labs is part of a recommended study program from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press.

Companion CD-ROMThe CD-ROM contains the solutions to the seven complete lab scenarios in the book including configurations and show command output.

This volume is part of the Cisco Press Practical Studies Series, which offers readers a means to apply their theoretical knowledge through hands-on lab scenarios for key networking technologies. This unique approach enables readers to practice and hone their internetworking skills while preparing for Cisco certification exams.


Buy Now

Click here for more information about CCIE Security Practice Labs (CCIE Self-Study) (Practical Studies)

Read More...

8/30/2011

How Russia Really Works: The Informal Practices That Shaped Post-Soviet Politics and Bussiness (Culture and Society After Socialism) Review

How Russia Really Works: The Informal Practices That Shaped Post-Soviet Politics and Bussiness (Culture and Society After Socialism)
Average Reviews:

(More customer reviews)
There are many resources to help understand official ways of doing things in Russia, this book helps the reader understand how those many things actually get done.
Alena Ledeneva's discussion of the many types of informal business, political and legal practices is eye-opening for those readers used to the Western rule of law and doing business. She effectively examines many aspects of Russian life including political campaining, bartering, and the business practice of double-accounting.
She opens her chapter on Financial scheming with a post-soviet saying "if a company has a profit, it has a bad accountant". This sums up how many Russian businesses operate and the reader should keep this in mind when establishing joint partnerships and joint ventures.
This is the best book I've read for the business person, diplomat or graduate student who plans on working with Russians in Russia.

Click Here to see more reviews about: How Russia Really Works: The Informal Practices That Shaped Post-Soviet Politics and Bussiness (Culture and Society After Socialism)

During the Soviet era, blat-the use of personal networks for obtaining goods and services in short supply and for circumventing formal procedures-was necessary to compensate for the inefficiencies of socialism. The collapse of the Soviet Union produced a new generation of informal practices.In How Russia Really Works, Alena V. Ledeneva explores practices in politics, business, media, and the legal sphere in Russia in the 1990s-from the hiring of firms to create negative publicity about one's competitors, to inventing novel schemes of tax evasion and engaging in "alternative" techniques of contract and law enforcement. She discovers ingenuity, wit, and vigor in these activities and argues that they simultaneously support and subvert formal institutions. They enable corporations, the media, politicians, and businessmen to operate in the post-Soviet labyrinth of legal and practical constraints but consistently undermine the spirit, if not the letter, of the law. The "know-how" Ledeneva describes in this book continues to operate today and is crucial to understanding contemporary Russia.--This text refers to the Hardcover edition.

Buy NowGet 24% OFF

Click here for more information about How Russia Really Works: The Informal Practices That Shaped Post-Soviet Politics and Bussiness (Culture and Society After Socialism)

Read More...

Network+ Certification Practice Questions Exam Cram 2 (Exam N10-003) (2nd Edition) Review

Network+ Certification Practice Questions Exam Cram 2 (Exam N10-003) (2nd Edition)
Average Reviews:

(More customer reviews)
The book which has these reviews posted under it is 2 edition (June 7, 2005) and the most recent review is dated April 22, 2005. So, my question is... How can these reviews be about this book? Looks like Amazon just took the reviews from a previous edition, but how accurate is that? Not very accurate in my opinion. Also, if you look at the actual book for the N10-003 exam (Network+ Exam Cram 2 (Exam Cram N10-003) (2nd Edition) (Exam Cram 2) (Paperback)), most of those reviews are also for the previous edition. Bottom line, these reviews aren't any help if they are not for the current edition of the book they are posted under. Poor job Amazon! :-(

Click Here to see more reviews about: Network+ Certification Practice Questions Exam Cram 2 (Exam N10-003) (2nd Edition)



Buy Now

Click here for more information about Network+ Certification Practice Questions Exam Cram 2 (Exam N10-003) (2nd Edition)

Read More...

8/29/2011

Securing Business Information: Strategies to Protect the Enterprise and Its Network (IT Best Practices series) Review

Securing Business Information: Strategies to Protect the Enterprise and Its Network (IT Best Practices series)
Average Reviews:

(More customer reviews)
Of all the security books I've read this one stands out as the best for two reasons: (1) it lays out what is needed and the steps to take to develop an enterprise security policy in a clear, logical sequence, and (2) there no gaps in the proposed process. Indeed, it appears that the authors had 'due diligence' as their foremost principle when they wrote this book. In addition their experience is evident by the way they approach the subject and tie it together.
The approach is straightforward: initiate, assess, gather requirements, perform a gap analysis, develop a baseline and implement. What makes the approach unique is the 'divide and conquer technique that partitions the business into security domains. This has benefits beyond decomposing the complexities of enterprise security into manageable pieces - it can also be linked into enterprise problem management and business continuity planning processes because you're forced to examine your resources and systems, and to prioritize them according to their criticality. I also liked the discussion of policies, which discussed the merits of identity-based and role-based approaches, and included excellent advice on policy auditing. One strong point about this section was the treatment of finding documented *and* undocumented policies. This material is applicable to anyone who is involved in policies and procedures development, regardless of whether or not it's related to security. I also especially liked the chapter on trust modeling. This is one area where I learned much from the book.
I've only touched upon key elements of this book. A review of the table of contents will reveal that it's complete and filled with case studies and important discussions of technologies that can be employed to create an effective enterprise security posture. This book is obviously applicable to security specialists, but is also useful to business continuity planners, service delivery practitioners and service providers. It is, to date, the best book on security from among the 20 I've read, that I've come across. It's also a complete recipe for a successful development and implementation of enterprise security policies, processes and procedures.

Click Here to see more reviews about: Securing Business Information: Strategies to Protect the Enterprise and Its Network (IT Best Practices series)



Buy Now

Click here for more information about Securing Business Information: Strategies to Protect the Enterprise and Its Network (IT Best Practices series)

Read More...

8/28/2011

Computer Security: Principles and Practice Review

Computer Security: Principles and Practice
Average Reviews:

(More customer reviews)
Stallings and Brown directs the book at a computer professional, who might be a programmer or system administrator. The book deliberately minimises the mathematical aspects. Much of the topic consists of layers above sophisticated encryption algorithms. Alas, a detailed treatment of the latter often requires heavy math background. If you do desire such a treatment, I recommend Matt Bishop's Introduction to Computer Security. That book was deprecated by some reviewers, who found it too mathematical.
Anyway, back to Stallings and Brown. It does proffer good technical explanations of various malware. Like worms and viruses. And attack modes like Denial of Service, and Distributed Denial of Service. Important variants are also covered - reflector and amplifier attacks.
Countermeasures to malware then naturally enter the narrative. So you learn how a firewall functions. Plus how to set up a honeypot to attract spam, phishing and malware.
So far, the above might be regarded as external attacks on your system. Sometimes, worms or viruses might try to take advantage of weaknesses in installed programs. Hence, another section of the book is for those of you who write such programs. Explaining how to guard against buffer and stack overflows, for example. These 2 are perhaps the most common entry points for malware.

Click Here to see more reviews about: Computer Security: Principles and Practice



Buy NowGet 31% OFF

Click here for more information about Computer Security: Principles and Practice

Read More...

CCNA 640-802 Network Simulator Review

CCNA 640-802 Network Simulator
Average Reviews:

(More customer reviews)
I just installed this software, and so far - it's just what I was expecting. I have the unique position of having tried both Boson's NetSim and RouterSim's Network Visualizer simulation software packages, and although both are excellent products (and getting better) I find Wendell Odom's product to be more intuitive and easier to just jump right in. In my opinion, the design process that goes into designing any network simulation software, is similar to designing a game. Some games require you to learn the controls, before you can really get started, while others are so well thought out that you can well, just jump right in.
However, if anyone has any plans to progress beyond the CCNA (eg. CCNP, etc.), I would recommend taking a look at the other two simulators. When I first purchased RouterSim's Network Visualizer, it was still a buggy product and prone to crashes. Even so, it was the only worthwhile game in town, at the time (2004). I never got the opportunity to finish the labs, as I was called to active duty and served over seas for almost two years. RouterSim's Network Visualizer has a particularly strict software license. You only get one, and in order to install it on another machine, you have to send your activation key back to the company (online, via the software itself). Once the license is back with the company, you can then install the software again on another computer, and then activate the product by downloading activation key from them once again. Ever served in the military? Well when you get those orders, you go. There is not a lot of time. You may have a few days to settle any pending business, like saying goodbye to your family and friends, making sure your will is in order, arrange for your bills to be paid, and so on. So transferring a software license wasn't on the top of my list. My software was originally installed on a desktop and I was not about to lug that (and the monitor) with me in my ruck. By the time I came back, the CCNA exam had changed so much that my simulator was, yes - outdated. I tried explaining my situation to the nice folks at RouterSim, but I was informed nicely that I can just purchase the upgrade. Remembering my experiences with the software crashes, I declined and signed up to take a CCNA cram class instead. Big mistake.
For a newbie, cram courses don't work. Eight days (8 hours a day) of instruction will not teach you the operations of a network and how Routers and Switches come into play so much so that you can pass the CCNA. Much less, get you so familiar with the input commands that you can use on the job. In my class, I had an Egyptian instructor who may be very knowledgeable, but help me if I can understand a darn thing that he was saying. I just couldn't get pass the accent. The school did however, introduced me to Boson's NetSim, a far superior product than my older version of RouterSim's Network Visualizer. Oh yes, if you decide on taking a class, make sure that they give you access to ACTUAL Cisco equipment! They didn't technically lie to me however, the school did have Cisco equipment, but that was a very brief show and tell. We primarily were working with the NetSim software. There are several versions now - CCENT, CCNA, CCNP, etc. They also sell videos and mp3's, besides the simulation software. Cisco seems to be endorsing them, you can find links to Boson from the Cisco website. To briefly describe the product, you basically have a network simulation software package along with a couple of pdf lab manuals (they are compressed and will appear once you've installed the software). I would print out the manuals and follow through the lessons, chapter by chapter.
So why do I prefer Wendell Odom's Network Simulator over the others? One, you get 4 licenses. Yes, you can install your product on FOUR separate computers. Two, the price. Wendell Odom's Network Simulator is under $100 (Amazon price, retail is $149). RouterSim's CCNA Network Visualizer is $229.00. And Boson's NetSim for CCNA is $249. And third, the pdf step-by-step lessons on Wendell Odom's Network Simulator pops up as you activate the corresponding lesson simulation. Something that I can really appreciate, as I will be traveling a lot on my new job, and don't want to carry a hard copy lesson book with me, nor scroll through the pages to the lesson I want. Dual monitors would serve you well here. It really is just simpler to use. You are presented with a lesson menu on the right side. A diagram of your network is on the top left, and the command line section (where you type) is below that. Click on the computer icon on your virtual network, and on the command line section you're looking at the CLI interpretation of what you would see if you were logged on to that computer. The same goes for the switches and the routers. Neat.
Do bear in mind however, that network simulators are just that, they only simulate the network and is not the real thing. They are by no means a perfect substitution for actual equipment. The lessons on either of the packages mentioned, must be executed on the respective software packages themselves, in the specific manner that is described, or they may not work. This new test (640-802) has challenged even Network Engineers currently in the workforce. I know a couple of techs, currently going through the recertification process, and even they are intimidated. One of the reasons is increased focus on Switching, a previously intermediate (CCNP) level subject. And there is the current approval of Subnet Zeros for the CCNA, that's gotta throw some people off. It did for me, I was taught something else.
If you are going for your certification for the first time - I recommend signing up for a Cisco Network Academy class. It may take up to a year to graduate, but you will not be wasting your time. Another option, is to get your own equipment. But, if none of these are options for you - Wendell Odom's Network Simulator is by far the cheapest solution on the market. Whatever option you finally choose, designing networks and supporting network equipment is not a book learning exercise. You shouldn't read your books from cover to cover, and then do the exercises - let the exercises be your guide. Just remember, it is critical that you get some hands-on experience (simulators, or the real deal).
Unfortunately, I had to buy this product from an Amazon.com competitor. It was on my Shopping Cart, but when I went to pay for it, Amazon took it off, "for review". I waited a day or so, and it was still under "review", so I had no choice but to go elsewhere. I had to pay a little more, but I was already waiting a month or so for this simulator to come on the market and had put my studies on hold until it does, therefore, I just couldn't wait anymore. Sorry, Amazon.com.

Click Here to see more reviews about: CCNA 640-802 Network Simulator

The most effective router and switch simulator for hands-on CCNA® skills enhancementThis software only product covers all CCNA topics 250 labs 8 different lab topologies 3000+ hands-on tasks Three Unique types of labs CCNA 640-802 Network Simulator helps you develop and improve hands-on configuration and troubleshooting skills without the investment in expensive lab hardware. This state-of-the-art, interactive simulation software allows you to practice your networking skills with more than 250 structured labs designed to help you learn by doing, the most effective method of learning. Experience realistic network device response as you work through each of the labs (available in electronic form on the CD), which include detailed instructions, topology diagrams, hints, and full answers. Unlike other simulators on the market, the lab scenarios included in the CCNA 640-802 Network Simulator are far more complex, challenging you to learn how to perform realistic network configuration and troubleshooting tasks.This unique network simulation software helps you master the hands-on skills needed to succeed on the CCNA® exam. Topics covered include:Router and switch navigation and administration LAN switching IP addressing Routing WANs VLANs and trunking IP routing protocols Scaling IP TroubleshootingSystem Requirements:500 MHz or higher processor 512 MB RAM (1 GB recommended) 500 MB hard drive space 32-bit true color monitor (1024x768 resolution) Microsoft Windows XP Professional with SP3, Microsoft Vista, or Mac OS X Version 10.4.11 or higher Java Runtime Environment (JRE) version 1.5.0 Adobe Acrobat Reader 8.0 Connection to the Internet during installation for access code validationAlthough this product was published before these operating systems were released, this product has been tested and successfully installed on Windows 7 platforms as well as Mac OS X Snow Leopard (version 10.6). If you experience any trouble installing the software on these platforms, please contact Pearson Customer Technical Support at: http://www.informit.com/about/contact_us/. Category: Cisco® CertificationCovers: CCNA exam 640-802

Buy NowGet 37% OFF

Click here for more information about CCNA 640-802 Network Simulator

Read More...

8/27/2011

E-Learning in the 21st Century: A Framework for Research and Practice Review

E-Learning in the 21st Century: A Framework for Research and Practice
Average Reviews:

(More customer reviews)
Perhaps it is not surprising that the authors of a book on e-learning are Canadian. Canada, like Australia, has had perennial problems with educating a population spread over vast distances. It is natural that Canada would have an intense interest in a means of providing remote higher education.
The authors argue that e-learning is not some mirage of the dot com boom. In this book, they explain that it can be a fundamentally disruptive technology. That if correctly implemented, it can empower a more economic and effective teaching of specialised material, irrespective of the actual subject of the material.
The application of e-learning to higher education is seen as better than for general primary or secondary education. There, the material is much the same across a nation, and traditional teaching methods are adequate. But for tertiary education, across an entire nation, there might be only limited demand for certain subjects, making it inefficient for every university to offer those.
They don't claim that there are exclusive pedagogies to be used in e-learning. Rather, that it lends itself to varied approaches, several of which can be effective.

Click Here to see more reviews about: E-Learning in the 21st Century: A Framework for Research and Practice

The second edition of E-Learning in the 21st Century provides a coherent, comprehensive, and empirically-based framework for understanding e-learning in higher education. Garrison draws on his decades of experience and extensive research in the field to explore the technological, pedagogical, and organizational implications of e-learning. Most importantly, he provides practical models that educators can use to realize the full potential of e-learning. This book is unique in that it focuses less on the long list ever-evolving technologies and more on the search for an understanding of these technologies from an educational perspective.The second edition has been fully revised and updated throughout and includes discussions of social media and mobile learning applications as well as other emerging technologies in today's classrooms. This book is an invaluable resource for courses on e-learning in higher education as well as for researchers, practitioners and senior administrators looking for guidance on how to successfully adopt e-learning in their institutions.

Buy NowGet 26% OFF

Click here for more information about E-Learning in the 21st Century: A Framework for Research and Practice

Read More...

8/26/2011

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice Review

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
Average Reviews:

(More customer reviews)
There are a million basic security books out there and I've read a bunch of them at one time or another. This book does a great job of explaining the basics without getting bogged down with too much detail. I think one of the problems that I see in some of the other books is that they are either aimed at a certification (like the sec+) or are setup to be a heavy text book. Neither of these approaches is great for explaining the basic concepts of security in a general way. The author walks you through many of the fundamental ideas of security like CIA, authentication and crypto, then moves on to some applications of these ideas in areas like operating system security, network security and physical security, among others. One of my favorites was the chapter on operations security, something that I don't generally see covered in any detail in basic security books. Loved the book and I'm going to pick up a few copies for people at work that need some education in this area.

Click Here to see more reviews about: The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice


As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. It covers the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability. Then it dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.

Learn about information security without wading through huge manuals
Covers both theoretical and practical aspects of information security
Gives a broad view of the information security field for practitioners, students, and enthusiasts


Buy NowGet 40% OFF

Click here for more information about The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Read More...

CCNA Top Success Secrets and Best Practices: CCNA Experts Share The World's Cisco Certified Network Associate Expert Greatest Tips Review

CCNA Top Success Secrets and Best Practices: CCNA Experts Share The World's Cisco Certified Network Associate Expert Greatest Tips
Average Reviews:

(More customer reviews)
I checked this book out of my local library, and I feel compelled to warn anyone who can read this. DO NOT BUY THIS BOOK.
In my opinion-- The book is rife with typographical errors, duplicate articles, brazen advertising for brain-dump websites, fake articles that are advertising for IT training schools, and useless filler articles. It doesn't appear that there was any editorial effort put into publishing this book. A few useful articles were from Chris Bryant, and I can't imagine Mr. Bryant giving permission for his name to be associated with such a terribly written/edited book.

Click Here to see more reviews about: CCNA Top Success Secrets and Best Practices: CCNA Experts Share The World's Cisco Certified Network Associate Expert Greatest Tips

Addresses the top consultancy & education forum questions, with tips & success factors on investigating, evaluating, attaining & capitalising on Cisco Certified Networking Associate (CCNA) IT certification.

Buy Now

Click here for more information about CCNA Top Success Secrets and Best Practices: CCNA Experts Share The World's Cisco Certified Network Associate Expert Greatest Tips

Read More...

8/25/2011

Security+ Guide to Network Security Fundamentals Review

Security+ Guide to Network Security Fundamentals
Average Reviews:

(More customer reviews)
I bought this book for two reasons: first I needed it for a security class this summer, second I needed a book with good testing software to prepare for the CompTIA Security+ exam. It served its purpose and I passed the exam easily.
The practice exam software is good, but I have used this exam engine from Certblaster before and the question text size they use is too small, which is very irratiting especially since there is plenty of room to use a larger text size. Unlike other books that use the same Certblaster software (usually a Course Technology publication), this one does not use the other functions that the test software offers, like providing the explanations to the questions, so you can actually learn as you go. Someone got lazy. Also the end of chapter question drills, which ask up to 20 questions, provide neither the answer OR the explanation key so you can check yourself; you have to dig through the text. End of chapter quizzes are really good learning tools, but these ones make you work too hard, and waste your time by making you hunt down the correct answers in a chapter you just read. They could at least give the answers, even if they are too lazy to provide the explanations. So, as an exam prep book, this one really falls down on its face in that area. I hate to criticize this fine book, but for almost 100.00 these overpriced Course Technology books should be doing better than this.
It is a good book as far as the text and layout go, very readable and enjoyable. But unless you need it for a class (as is often the case with Course Technology books), save your money and get the Sybex book, or Sybex+something else like the ExamCram and STILL pay less than half what this book costs.
I give it 3 stars. I would have given 5 except for the inexcusable lack of answers/explanations to the end of chapter review questions, the lack of answers/explanations to the Certblaster practice exams, and the insane price.

Click Here to see more reviews about: Security+ Guide to Network Security Fundamentals

Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting the changes in security that have occurred since the most recent CompTIA Security+ objectives were created. The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

Buy NowGet 24% OFF

Click here for more information about Security+ Guide to Network Security Fundamentals

Read More...

8/24/2011

Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice) Review

Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
Average Reviews:

(More customer reviews)
I want to be fair here. I bought this book not to read hype on what looks like an emerging technology, albeit massively overhyped but, rather, to read about legal and business issues that might moderate its acceptance. To be fair, I will return to give my appraisal after I have finished but I was forced to share this so as to, perhaps, give pause to others interested in buying this book. I've seen webinars that refer to cloud computing as 2-10 technology, massively hyped for 2 years and will take the next 10 for the industry to sort out where it fits (and maybe more importantly where it does not.
The first two glaring take-aways I've seen in this book is 1) the mashing of social web to cloud computing, vis-a-vis considering MySpace, FaceBook, and other social web sites as examples of cloud computing, they are not; 2) the notion that end users will be writing their own programs in the clouds vs. the, since the dawn of software development, programmer (or more recently developers) writing the programs, tech writers writing the documentation, marketeers hyping the program and end users buying or using, with embedded ads, the software. Both of these are orthogonal to 'cloud computing'. While it may be someday, in a "Battlestar Gallactica" age end users may speak to their computer in whatever language they speak and tell it what they'd like it to do. For now it takes specialized training and while the computer languages used are different syntactically from those used in the '60s and '70s, fundamentally they are not different at all. Of course someday maybe everyone will be flying their cars to work and to play. On your next flight anywhere, tap the pilot and ask him how much specialized training he's had in order to taxi a plane, much less leave the ground and return it in one piece to where ever they said they would land it.
The authors talk about computing being a utility as electricity providers (or cable providers) yet they also talk about global compute clouds. Are there global utility companies? They talk about replacing NetBeans, Eclipse, Microsoft Visual Studio (IDEs) with some Utopian ephemeral global software development environment where the tools and end products exist virtually in some ether. None of that has to do with IT Governance and Security much less Amazon, Terramark, Eucalyptus, RightScale, or CloudSwitch. Where they have another 10-11 chapters I withhold final judgment but I felt I owed it to others innocently looking for a good source of information, not hand-waving on this subject. Just as with any emerging technology or software development language there are plenty of people that emerge from the woodwork to write a book on it, totally independent of their experience with it. Confusing Cloud Computing and Web 2.0 is not going to garner confidence. If unwary readers do not discover this until after they have purchased the book, it will not make any difference.
As a professional software developer I can tell you provisioning an image for execution in the cloud is more intensive than provisioning a bare metal server. End users are not going to be doing anything more than issuing a run command on a pre-existing image.
Here is my take: Running your business at an undisclosed facility managed by Amazon (or others) is no more cost effective than running your business out of a service center was in the 70's or 80's. If you don't physically control the data, you don't physically control access to it either. Nowadays you are under legal obligation to do so. I spent the money on this book hoping there was more substance to the security, privacy, and governance aspects of cloud computing than I just summarized.
Since one of the authors has decided to launch personal attacks on me, I will continue with my review with Chapter 3. I didn't really pick up on this in chapters 1 and 2 but I am now concerned about who edited this book. Even at the high school level children are taught to never ever cite Wikipedia for their references. I noticed the bulk of the footnotes cited are wikipedia. Since the source of information found on Wikipedia is unknown, its validity is also unknown. The professional standard for citations are peer reviewed sources. By using these there is a level of confidence a claim made, by virtue of it's citation is likely of high quality.
An assertion, I believe, made several times, and characterized on pg 52, "The new mantra of 'the browser is your operating system...browsers have become the ubiquitous operating systems for consuming cloud services". I would call to the reader's attention in any legitimate Computer Science source the definition of an operating system. Internet Explorer is not an example of an operating system. Furthermore, services, clouded or not, where the Internet browser is the user interface (UI or GUI in this case), are but one type of solution space, often characterized as LAMP or Linux, Apache, MySQL, and PHP. This is totally independent of cloud anything. I contend whenever one writes a book (or publishes one) there are two axises of importance, the first being is the material relevant to the topic and is the material factually accurate. While one might chose to host multiple web containers in the 'cloud' to take advantage of the elasticity of the cloud for scaling up and down with volume, another pervasive class of problem that takes place in a cloud-like environment is compute scaling, such as can be seen in grid computing. In this space a problem may arise where 100 or 1000 processors are required to solve a compute intensive problem but only for a few hours. This, as opposed to 24x7x365, is an excellent usage of public cloud (burst mode). To the extent the author is, thus far, focusing on web based interaction with the cloud he calls out but never elaborates on why there is any more vulnerability for a web container hosted at an Amazon secure facility, for instance, than there is within one's own perimeter. The threat vector is port 80 or port 8080. Of course, if there really is one, the obvious solution is to use off port, two phase SSL, where both the client side and server side are digitally authenticated and encrypted and host the open (proxy) website(s) within your perimeter. In either case the DoS attack on port 80 or 8080 is independent of the location of the web container. Isn't that correct Tim?
In chapter 3, pg 52, "Using hijacked or exploited cloud accounts, hackers will be able to link together computing resources to achieve massive amounts of computing without any of the capital infrastructure costs". Really? what about the account owner seeing running instances on their accounts they aren't using? How long does it take for a credit card owner or provider to realize an account is being misused? There is an easier vector for this, they are called bots and have been around for years. One need but Google the program Asphyxia. If you, for any decision, had a choice of hard vs. easy...which do you think a hacker would take?
In chapter 3, the author discusses type 1 and type 2 hypervisors. This is something of an arcane distinction but he refers to Xen as type 1, bare metal. This actually is incorrect as Xen is hosted by an operating system meaning it is not bare metal [...]. The authors spend much time on Xen, which is relevant from the perspective of security attacks against it but in that vein not a single mentioned, that I have found, is made of KVM which is part and parcel of all remotely recent versions of Linux from, I believe 2.6.20 and up. Ubuntu Enterprise Cloud is based on KVM, as is RedHat's virtualization and cloud family. But, this is why they make second editions.
Another assertion the authors make in chapter 3 (pg 59), "Security requirements such as an application firewall, SSL accelerator, cryptography, or rights management... are not supported in a public SaaS, PaaS, or IaaS cloud". Huh???? I refer the reader to Amazon's VPC, Intel's Service Gateway, SELinux, UFW. That is simply a patently false statement. Of course you can host your applications on an instance of an image configured with SELinux in enforce mode, fully firewalled, with no open connections on unsecured ports, and be quite secure. However, if this book was written in 2008 only to be published in early 2009 this may have been a more true statement then. However few people knew what cloud was in early 2009 and the entire field has rapidly evolved since the authors wrote this book. This is why it is necessary for authors, and publishers, to maintain an errata site, perhaps in the cloud, where corrections and retractions to, best case dated, worst case patently false, statements can be made. Intel, by the way, is also producing encrypting NICs (network interface cards).
While I still subscribe to my previous comment about if you don't control your data you don't control who has access to it, I do have an addendum to it. Cloud computing is a rapidly evolving field. A book, written by anyone, 2 years or more ago on cloud computing is, almost by definition, wrong or highly questionable. Technology simply moves faster than publishers generally do. If you have data that you don't want to or, legally, can not share it, in all likelihood, does not belong in a public cloud. If you are risk averse, it does not. If you are risk tolerant then the decision should be dependent on talking to vendors, cloud and operating system (no, not web browsers). What are the cloud vendor's SLA, what is the insurance on data breaches, what is the state of the art vis-a-vis SELinux, encrypting NICs, encrypted databases, the cloud vendor's physical security, software security, etc. Who had physical access to software keys?
We are a long way from the George Jettson world. In our lifetime people won't be flying their cars to work. Provisioning of data...Read more›

Click Here to see more reviews about: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)



Buy NowGet 27% OFF

Click here for more information about Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)

Read More...

Agile Software Development: Best Practices for Large Software Development Projects Review

Agile Software Development: Best Practices for Large Software Development Projects
Average Reviews:

(More customer reviews)
A great book, which makes one thing clear: complex software projects cannot be described and managed by THE perfect plan. The authors encourage to adopt agility and give useful guidelines/best practices how to be prepared for the unexpected.


Click Here to see more reviews about: Agile Software Development: Best Practices for Large Software Development Projects

Software Development is moving towards a more agile and more flexible approach. It turns out that the traditional "waterfall" model is not supportive in an environment where technical, financial and strategic constraints are changing almost every day. But what is agility? What are today's major approaches? And especially: What is the impact of agile development principles on the development teams, on project management and on software architects? How can large enterprises become more agile and improve their business processes, which have been existing since many, many years? What are the limitations of Agility? And what is the right balance between reliable structures and flexibility? This book will give answers to these questions. A strong emphasis will be on real life project examples, which describe how development teams have moved from a waterfall model towards an Agile Software Development approach.

Buy NowGet 50% OFF

Click here for more information about Agile Software Development: Best Practices for Large Software Development Projects

Read More...

8/23/2011

Supply Chain Networks and Business Process Orientation: Advanced Strategies and Best Practices (Resource Management) Review

Supply Chain Networks and Business Process Orientation: Advanced Strategies and Best Practices (Resource Management)
Average Reviews:

(More customer reviews)
"The authors have developed a focused, rigorous methodology for assessing supply chain processes, and identifying the path forward for establishing specific performance improvements. Managers from many different functions can benefit from reading this book and applying the lessons to their own supply chain business processes."
- Robert Handfield, Bank of America University Distinguished Professor of Supply Chain Management, Director, Supply Chain Resource Consortium, College of Management, North Carolina State University

Click Here to see more reviews about: Supply Chain Networks and Business Process Orientation: Advanced Strategies and Best Practices (Resource Management)

With future competitive landscape shifting from competition between companies themselves to trading partner networks, understanding and mastering process design and change is becoming more critical than ever. In order to succeed, companies are starting to weave their key business processes into hard-to-imitate strategic capabilities that distinguish them from their competitors. Supply Chain Networks and Business Process Orientation: Advanced Strategies and Best Practices will help you "connect the dots" by offering insights on how to achieve greater integration within your supply chain networks and realize the performance possible with today's interaction economics. Based on exhaustive research of supply chains and newly successful networked corporations in the US and Europe, the authors demonstrate how your company can be successful in building an effective supply chain network. Prescriptive benchmarking models illustrate proven strategies, tactics, and methods for achieving a superior level of supply chain performance.

Buy NowGet 14% OFF

Click here for more information about Supply Chain Networks and Business Process Orientation: Advanced Strategies and Best Practices (Resource Management)

Read More...

8/22/2011

How to Sell Network Marketing Without Fear, Anxiety or Losing Your Friends (Selling from the Soul. Ancient Wisdoms. Modern Practice) Review

How to Sell Network Marketing Without Fear, Anxiety or Losing Your Friends (Selling from the Soul. Ancient Wisdoms. Modern Practice)
Average Reviews:

(More customer reviews)
I agree 100% with the last review. I'm also a top producer for my network marketing company.
Network Marketing is about building relationships. If there is one secret to success, relationship building is it. If you want to learn how to go about this business without turning people off (like 97% of people in this business do), you need this book.
Most beginners are reluctant to truly dialogue because they don't want any "rejection", or fear rejection. This book helps make it possible for you to eliminate that fear, NOT get rejected, and build a successful, and stable network marketing business that lasts.
This book is based on ... you think about helping OTHERS get what they want FIRST, then you'll what YOU want. You will learn NON-manipulative methods that will create real trust between you and your potential partner.
I recommend this book as one of the first books you buy in network marketing.

Click Here to see more reviews about: How to Sell Network Marketing Without Fear, Anxiety or Losing Your Friends (Selling from the Soul. Ancient Wisdoms. Modern Practice)

It's no secret that knowing 'How to Ask the Right Questions at the Right Time'... and 'Listening to What is Being Meant, Not Just What is Being Said'... are the essential problem-solving skills of the effective Distributor.These skills will get you what you want, faster and more efficiently. They will allow you to understand what others want before you start Telling your Story or Presenting.Help your potential partner persuade themselves into taking action by using the power of Dialogue and the 4 Universal Sales Principles of Success by Attraction.

Buy Now

Click here for more information about How to Sell Network Marketing Without Fear, Anxiety or Losing Your Friends (Selling from the Soul. Ancient Wisdoms. Modern Practice)

Read More...

Bayesian Networks: A Practical Guide to Applications (Statistics in Practice) Review

Bayesian Networks: A Practical Guide to Applications (Statistics in Practice)
Average Reviews:

(More customer reviews)
Publisher's description exaggerates the book's pedagogical value; it is a collection of short essays describing applications, and authors do not seem especially concerned with theory. Quality is variable, editorial effort missing-in-action (typos galore) - a typical Wiley book, and an easy return decision.


Click Here to see more reviews about: Bayesian Networks: A Practical Guide to Applications (Statistics in Practice)

Bayesian Networks, the result of the convergence of artificial intelligence with statistics, are growing in popularity. Their versatility and modelling power is now employed across a variety of fields for the purposes of analysis, simulation, prediction and diagnosis.

This book provides a general introduction to Bayesian networks, defining and illustrating the basic concepts with pedagogical examples and twenty real-life case studies drawn from a range of fields including medicine, computing, natural sciences and engineering.

Designed to help analysts, engineers, scientists and professionals taking part in complex decision processes to successfully implement Bayesian networks, this book equips readers with proven methods to generate, calibrate, evaluate and validate Bayesian networks.

The book:


Provides the tools to overcome common practical challenges such as the treatment of missing input data, interaction with experts and decision makers, determination of the optimal granularity and size of the model.


Highlights the strengths of Bayesian networks whilst also presenting a discussion of their limitations.


Compares Bayesian networks with other modelling techniques such as neural networks, fuzzy logic and fault trees.


Describes, for ease of comparison, the main features of the major Bayesian network software packages: Netica, Hugin, Elvira and Discoverer, from the point of view of the user.


Offers a historical perspective on the subject and analyses future directions for research.

Written by leading experts with practical experience of applying Bayesian networks in finance, banking, medicine, robotics, civil engineering, geology, geography, genetics, forensic science, ecology, and industry, the book has much to offer both practitioners and researchers involved in statistical analysis or modelling in any of these fields.

Buy NowGet 22% OFF

Click here for more information about Bayesian Networks: A Practical Guide to Applications (Statistics in Practice)

Read More...

8/21/2011

Virtual Office Tools for a High Margin Practice: How Client-Centered Financial Advisors Can Cut Paperwork, Overhead, and Wasted Hours Review

Virtual Office Tools for a High Margin Practice: How Client-Centered Financial Advisors Can Cut Paperwork, Overhead, and Wasted Hours
Average Reviews:

(More customer reviews)
I read this book from cover to cover in one night! There are so many great ideas in it that I had to reread the book to make sure I absorbed them all.
I have been a slave to the old model of adding more and more staff to handle the needs of a growing practice. The authors explain how to use technology to streamline our practices, stop drowning in paper, and how to outsource much or all the work currently being done by employees to contractors that work offsite.
If I implement all the ideas put forth by the authors, I could save many of thousands of dollars each month and increase my bottom line by the same amount.
I highly recommend this book for all practice owners that are interested in reducing their overhead AND increasing client satisfaction and retention.

Click Here to see more reviews about: Virtual Office Tools for a High Margin Practice: How Client-Centered Financial Advisors Can Cut Paperwork, Overhead, and Wasted Hours



Buy NowGet 38% OFF

Click here for more information about Virtual Office Tools for a High Margin Practice: How Client-Centered Financial Advisors Can Cut Paperwork, Overhead, and Wasted Hours

Read More...

8/20/2011

CCNA Cisco Certified Network Associate Study Guide, (640-802): Exam 640-802 Review

CCNA Cisco Certified Network Associate Study Guide, (640-802): Exam 640-802
Average Reviews:

(More customer reviews)
After trying to prepare for the CCNA on my own I came to the conclusion that I needed a book if I were going to understand the material enough to receive my CCNA. Having seen Wendells books score high ratings I was going to purchase one of his until I read some of the excerpts from his book. With all due respect to Wendell his books were simply too dry for me. Then I checked out Lammle and discovered his books read as if somebody is actually talking to you, as if you're in a conversation with someone. Having purchased this book it's as immersive as reading a good story and you're learning the whole time.
Todd Lammle fully understands what Cisco expects you to know for your CCNA exam and the seller point for me is the fact that Lammle actually has a gift for teaching it. His book doesn't read as if hes just reguritating information to you but instead he writes to actually make sure you're understanding the material. (I've had professors in college teaching CCNA classes that couldn't do this. And for the record, this book is leaps and bounds better than any college class I've had on Cisco related information). Even if at some point he comes out of nowhere with new material he'll warn you about it and then he'll cover it later in depth. I have never at any point felt overwhelmed with the information in the book and he starts with the fundamentals, the building blocks of networking and goes in depth from there.
At the end of every chapter he'll have exam essays, written labs, and review questions to really make sure you understand the material (along with the CD provided). And to prove Todd wants you to know the material he even has a website you can go to and ask him questions on topics you don't fully understand, or if you feel he might be wrong about something in his book you can talk to him about it. If fact, if you check out other Lammle books on Amazon, you can see he comments on reviews left by others. That to me shows someone who's really dedicated to teaching the material and is someone I have a lot of respect for these days.
I absolutely recommend this study guide. You'll learn so much.

Click Here to see more reviews about: CCNA Cisco Certified Network Associate Study Guide, (640-802): Exam 640-802

Learn from the Best - Cisco Networking Authority Todd Lammle
Written by Cisco networking authority Todd Lammle, this comprehensive guide has been completely updated to reflect the latest CCNA 640-802 exam. Todd's straightforward style provides lively examples, hands on and written labs, easy-to-understand analogies, and real-world scenarios that will not only help you prepare for the exam, but also give you a solid foundation as a Cisco networking professional.
This Study Guide teaches you how to
Describe how a network works

Buy NowGet 47% OFF

Click here for more information about CCNA Cisco Certified Network Associate Study Guide, (640-802): Exam 640-802

Read More...