Programming

The Web Programming CD Bookshelf 77

honestpuck writes " I am a big fan of the written word on dead trees, but sometimes I like to have the written word where I can easily search it, or cut and paste from it. That's why I like PHP.net and why I decided to get a copy of O'Reilly's Web Programming CD Bookshelf. And I am pleased with it, though not ecstatic." Read on to see what honestpuck liked about this collection, and what drawbacks it may have for you.
Java

Java Database Best Practices 180

ProfKyne writes "I was excited to read this book when I first noticed it listed as "coming soon" in the Java section of O'Reilly's site back in May. I downloaded and read the sample chapter and waited expectantly for the book to be released. I was hoping that this book would be perfect for me, as nearly all of the Java programming I have done has dealt in some way with database access, though I do not consider myself to be an expert on the subject. The book didn't disappoint; Java Database Best Practices is an excellent high-level guide to writing database-driven applications from Java." Read on for the rest of ProfKyne's review.
Linux

Linux Clustering 162

SPK writes "A colleague and I recently discussed how New Riders's most highly regarded book -- Paul DuBois's MySQL -- corresponds to O'Reilly's worst dud: MySQL & mSQL. Charles Bookman's Linux Clustering does nothing to improve New Riders's reputation. The book is divided into eleven chapters, unevenly distributed among three sections: an overview of clustering for Linux, building clusters, and maintaining clusters. Four appendices provide brief information about online clustering resources, options for RedHat's 'Kickstart,' options for DHCP, and information on 'Condor ClassAd Machine Attributes.'" To find out why Krause was so displeased with this book, read on below for his review.
Software

The Exim SMTP Mail Server 233

ollyg writes "Exim is a mail transfer agent that can be run as an alternative to Sendmail on most Unix and Unix-like systems. At my organization we use it to relay around half a million messages per day, although it's suitable for many other types of installation including those with local delivery, and far larger (or smaller) ISPs." Ollyg reviews here the official guide to Exim's current release, which weighs in at a hefty 621 pages.
Security

Fyodor Answers Your Network Security Questions 277

You asked nmap creator Fyodor many excellent questions, and his answers (below) are just as excellent. You'll want to set aside significant time to read and digest this interview, because Fyodor didn't just toss off a few words, but put some real time and energy into his answers.
Technology

Managing Enterprise Content 177

Scott Abel writes: "If you are even considering a content management system for your organization, you owe it to yourself to read Managing Enterprise Content. The book is perhaps even more important to those of you who find yourselves in the midst of a content-management nightmare today." The goals here include saving money, time and effort in creating and using information (everything from Web content to help-desk troubleshooting scripts), and the book is not only suited to corporate environments -- read on for the rest of Scott's review.
Books

FreeBSD: The Complete Reference 153

Just Some Guy writes "I recently received a promotional copy of Roderick W. Smith's "FreeBSD: The Complete Reference". I was pretty skeptical at first - it's my nature - but was pleasantly surprised at the range and depth of information presented in a very accessible format. While not ready to supplant Greg Lehey's "The Complete FreeBSD", it's certainly a worthwhile read for new and moderately-experienced users." Read on for Just Some Guy's full review.
Education

Digital Game Based Learning 132

rjnagle writes "When Marc Prensky asked a colleague who had just returned from a training course how it was, she replied, 'AFTRB.' (Another #$#$^&# Three Ring Binder) . In his book, Digital Game-Based Learning , Prensky, an instructional game designer and founder of games2train, argues that computer games are more effective learning tools because they sustain interest and attention in settings where people are normally bored." To follow that train of thought (or if you just liked Ender's Game), read on below for Nagle's lengthy review of the book.
Microsoft

How Would You Move Mount Fuji? 1247

adamba writes: "Why are manhole covers round?" "How many gas stations are there in the United States?" "How would you design a remote control for venetian blinds?" "What company is famous for interview questions like those?" You might not know the answer to the first three questions, but you probably know the last one. The notion of asking "Microsoft interview questions," quick logic puzzles and brainteasers, has become accepted wisdom for many technology companies. In comparison, the questions asked during traditional interviews, such as "Describe your typical day" and "What is your greatest weakness?" seem too simplistic, too easy to handle with a prepared answer, too prone to allowing weak candidates to slip through: they simply don't reveal enough about the person. While the Microsoft questions appear to be a better way to evaluate people, the issue has never really been seriously examined. Microsoft's success would seem to make the argument pointless: Can $250 billion in market capitalization be wrong?" Read on for an interesting look at the details and justifications for this kind of interview.
Encryption

Practical Cryptography 140

jpetts writes "If you have an interest in cryptography and spend even a small amount of time looking at the subject on the Internet, you will almost certainly have come across the name Bruce Schneier. His book, Applied Cryptography is widely regarded as the most accessible, and one of the most important books on cryptographic algorithms ever published. Schneier has also published other books, including the less technical Secrets and Lies, an thought-provoking book aimed at getting people to think about the whole of the security landscape, not just cryptography. Now, together with Niels Ferguson, renowned cryptographic expert, and longtime collaborator, another immensely valuable book on security has just appeared." Read on for the rest of jpetts' review.
Programming

Open Source Web Development With LAMP 104

Alan Eibner submitted this review of Addison-Wesley's Open Source Web Development With LAMP. He writes "The number of books about Web development technologies is astounding. Some claim you can learn everything you need to know in 24 hours. Others require several complementary volumes in order to learn the subject. Why another web development book? And what sets this one apart from the rest?" Read on for the rest of Alan's chapter-by-chapter review. Update: 04/11 18:22 GMT by T : I'd called this an O'Reilly book rather than Addison-Wesley; sorry, now fixed.
Java

Java Performance Tuning, 2nd Ed. 287

cpfeifer writes "Performance has been the albatross around Java's neck for a long time. It's a popular subject when developers get together "Don't use Vector, use ArrayList, it's more efficient." "Don't concatenate Strings, use a StringBuffer, it's more efficient." It's a chance for the experienced developers to sit around the design campfire and tell ghost stories of previous projects where they implemented their own basic data structures {String, Linked List...} that was anywhere from 10-50% faster than the JDK implementation (and in the grand oral tradition of tall tales, it gets a little more efficient every time they tell it)." Want to kill the albatross? Read on for the rest of cpfeifer's review of O'Reilly's Java Performance Tuning, now in its 2nd edition.
PHP

PHP MySQL Website Programming 160

Alan Knowles writes "Ever started looking for a PHP script to solve that problem in your company - Managing the passwords, keeping track of equipment, or making information available on the web. Normally after a few hours of hunting, you track down something that looks close to what you want, you download it, get it going, then start digging around the code. At this point, you cringe in fear of two problems, the spaghetti mess that you are about to deploy, the ongoing maintenance nightmare and the horrors of modifying it to fit your needs. Well this book isn't going to solve these issues, but at least if a few more of those budding open source developers read it, the world would be a better place." Read on for the rest of this review; Yes, the book is still available.
Education

Linux for the Rest of Us 163

alvinc writes "Mark Rais' new book Linux for the Rest of Us is an excellent choice for beginning Linux users. It also has enough solid, fundamental information to be a refresher for experienced Linux users. The book's philosophy is that Linux is a viable alternative OS that is also fun, and this viewpoint is reflected in the narrative's friendly tone." Read on for the rest of Alvin's review. Update: 03/26 20:51 GMT by T : Since bn.com isn't stocking this book, author Marc Rais wrote to suggest that you can order this book straight from the publisher.
Books

Imagining Numbers 265

peterwayner writes "One mathematician I know told me that the most important lesson he learned was how to read a math book. It did no good, he said, to just start plowing through the theorems because that brought confusion. The key was to skim the book five or six times to get an idea of what the writer was trying to do. Then, and only then, was it possible to figure out the equations. This is what Barry Mazur tries to do in his book Imagining Numbers . There are some equations, graphs and diagrams, but first and foremost he offers plenty of poetry, philosophy and history to lay a foundation for understanding imaginary numbers." Peter's review continues below -- despite its complicated, abstract subject matter, he says that it's "simple enough to be accessible to most who will be interested in it."
Security

Storage Security 125

shiroi_kami writes "What does Information Security mean to you? To many, it means firewalls and encryption. To some, it means intrusion detection systems. Chances are the words "file servers" weren't high on your list, but they probably should be. After all, information security is about information, and when it's not flying across the network it's got to be stored somewhere, right? In fact, the security of the storage mechanism is often overlooked, which makes it an attractive target for attackers. In their new book, Storage Security, the authors take a comprehensive look at this often-ignored subject. Update: 03/26 05:44 GMT by T : Please note, this review was written by David Bianco under the handle shiroi_kami as an Amazon.com review, and also appears at InfosecBooks.com. Apologies to David for the misplaced and delayed attribution.
Security

Hacker's Challenge 2 95

Francis White writes "Hacker's Challenge 2 is the second volume in a series of books that present a series of real-world security scenarios and their solutions. For each scenario, information is given, clues are presented and questions are asked of the reader. Turning to the back of the book reveals what really happened along with suggestions and tips for how to respond to and possibly even prevent each presented attack." Read on for the rest of his review.
Science

Linked: The New Science of Networks 160

kurtkilgor writes "One of the most frustrating things about many areas of science and engineering today is that we know the basics but don't know how to put them together. We know a great deal about how atoms interact, but we aren't so sure about how to combine them to make a 'big picture' of matter. We understand how an individual computer works, but how to build large informational networks with computers is another thing entirely. We know how people act individually, and yet we can't extrapolate the behavior of entire societies from this. I've long been interested in these types of complexity problems, but not a whole lot of material has been available. In particular, Malcolm Gladwell's book The Tipping Point left me searching for an explanation for the many curiosities that he presents. Is there a mathematical description of tipping points? Is there a way to find out when and why things tip? How does information spread through society?" Kurtkilgor reviews below Albert-László Barabási's Linked: The New Science of Networking, which attempts to answer these questions.
Hardware

Cars for Tinkerers? 81

Lots of interesting things on the automotive front. First off, jotap starts us off with this question: "The 'smart' with its auto/semi-auto sequential gearbox, traction control, electronic managed turbo engine, electronic accelerator and clutch control, G force sensors, and more. Some companies sell chips to upgrade the engine power and change the (slow) original gear shifting timings. It would be nice to have a custom control panel on board and change the settings with a click. I think there's no other car with a better price/technology/size ratio then the 'smart', or is there?" The more modifiable they are, the better!
Programming

Hacker's Delight 178

Ben Olmstead writes with the review below of Henry S. Warren's Hacker's Delight, which is not about tricking folks into providing sensitive information, but rather about how to cleverly manipulate computers into doing more work on their part with less work on yours. Read on for his brief review.

Slashdot Top Deals