Elsevier

The Wireshark Field Guide by Robert J. Shimonski (Elsevier)

Posted on April 2, 2014

I usually don’t start with this, but lately I had some time constraints that made me wondering if is right to use so much time reading books. The Wireshark Field Guide Analyzing and Troubleshooting Network Traffic by Robert J. Shimonski is only 149 pages long (if we cut the introduction, indexes, etc. it boils down to 128 pages). This is a really short book and I have really appreciated this fact.

Read More

Principles of Big Data: Preparing, Sharing, and Analyzing Complex Information by Jules J Berman (Elsevier/Morgan Kaufmann)

Posted on May 14, 2013

As you probably know, I usually do not comment the books layout, being more focused on the contents of a book instead of it’s layout. This time I will start this review speaking about the layout of this book since it’s REALLY peculiar. The Introduction is written in a two-columns layout, very similar to the Science magazine layout. The book itself is written in a single column layout, still with a “Science like” look.

Read More

Practical Anonymity, by Peter Loshin (Elsevier/Syngress)

Posted on May 7, 2013

The anonymity on the web is probably one of the most debated topics on the web. Is possible to be completely anonymous? The short answer is no. This book tries to help the read to improve its anonymity, staying is the “real world”, as the “Practical” world in the title suggests. In this book you will not find anything that is too complex for an average user. Whether this is good or bad, depends on you expectations.

Read More

Hacking Web Apps by Mike Shema (Elsevier/Syngress)

Posted on April 16, 2013

Have you ever thought that the website you are developing or using is secure? Well, this book will make you change your opinion. This book will change your idea of security and therefor you’ll start to see anything as “probably having some security glitch”. Mike Shema speaks about a lot of different kind of attacks in his book in a real deep way, at the point that sometimes I wondered if he was planning to instruct people how to hack websites or only how to secure own websites.

Read More

Wireless Reconnaissance in Penetration Testing by Matthew Neely, Alex Hamerstone, Chris Sanyk (Elsevier/Syngress)

Posted on March 19, 2013

When someone says the word “wireless”, 99.9% of the audience thinks at the Wireless Networking Technologies (802.11 family). Very few think to the Bluetooth. Even fewer people think to all the other technologies that use wireless technology to work, such as cordless phone, guard radios, headsets, wireless camera etc. This book embrace the last point of view. The first chapter provides basic information and motivation for Wireless Profiling. The chapter 2 provides the reader with all the information she needs to be able to understand the wireless technology and it’s usage.

Read More