
May 7, 2013
The anonymity on the web is probably one of the most debated topics on the web.
Is possible to be completely anonymous? The short answer is no.
This book tries to help the read to improve its anonymity, staying is the “real world”, as the “Practical” world in the title suggests.
In this book you will not find anything that is too complex for an average user.
Whether this is good or bad, depends on you expectations. I’ve took this book the first time with really high expectations and I was really disappointed. When I took it for the second time, with different expectations, I did found the book pretty good.
Read More 
April 30, 2013
After few months after the review of CompTIA Security+ Rapid Review, I’m now here to speak about it’s bigger brother: the Training kit.
With its 569 pages, this book is more than twice the length of the Rapid Review one. Even if someone can think that they did a better summary in the Rapid Review one, I have to say that this is not the case for these two books. While the Rapid Review allows you to pass the exam if you already know the certification contents and you only need to evaluate your level and to refresh some contents, the Training Kit will teach you the certification contents.
Read More 
April 23, 2013
Hadoop is today a industry-standard software for the Big Data and this book it’s the industry-standard book for Hadoop.
his book is able to bring you from no knowledge about Hadoop and the Big Data to a full knowledge of Hadoop and it’s usage.
The book is split in 16 chapters and 3 appendix for a total of 628 pages of contents. This make ~33 pages for chapter so it’s easy to read and to find what you need. This is very important since - even if it’s possible - it’s rare that this kind of book is read cover-to-cover.
Read More 
April 16, 2013
Mike Shema speaks about a lot of different kind of attacks in his book in a real deep way, at the point that sometimes I wondered if he was planning to instruct people how to hack websites or only how to secure own websites. The book has often some code samples that allow a faster understanding of what the author is saying. Even if a coding knowledge is not required, the ability to understand HTML, JS, SQL, PHP, Python and C++ speeds up the reading.
Read More 
April 9, 2013
Logs are one of the most powerful tools in the sysadmin hands, and probably of all kind of IT roles.
This book does deep into the logs and their management.
One of the aspects that I really liked about this book is the division of the text in chapters.
The book is “only” 420 pages long, but is well split in 22 chapter, so they are (on average) 21 pages long. This is a huge advantage, since it allows the reader to stop frequently without dividing a concept in two different reading sessions. Also, this policy, allows the reader to quickly find what is more important for her in that specific moment.
Read More 
April 2, 2013
As the name suggests, this set of videos is for developers.
HTML 4 and Javascript are often used without much explaination about the JS code it self but only about the HTML5 Canvas part.
I felt to point this out immediately since I’ve not found it on the O’Reilly page, but I believe that is really important to specify.
Another thing that I’d like to point out is that (as it is easy to imagine, but not obvious) these videos only speak about 2D graphics in HTML (therefore there will no WebGL topics).
After these two notes (that will not influence in any way my judgement about the videos), let’s start talking about the videos.
Read More 
March 26, 2013
Ganglia is the most robust and scalable tool for performance monitor I’ve tried or heard of.
This book, written by some of the top contributor of the project, is an awesome guide to Ganglia.
Due to its organization and the authors writing style, the book is easy to understand and can be read as a “full-guide” reading it from the first page to the last one, or a reference book reading only the parts that are relevant to you in that specific moment.
Read More 
March 19, 2013
When someone says the word “wireless”, 99.9% of the audience thinks at the Wireless Networking Technologies (802.11 family).
Very few think to the Bluetooth.
Even fewer people think to all the other technologies that use wireless technology to work, such as cordless phone, guard radios, headsets, wireless camera etc.
This book embrace the last point of view.
The first chapter provides basic information and motivation for Wireless Profiling.
The chapter 2 provides the reader with all the information she needs to be able to understand the wireless technology and it’s usage.
Read More 
March 12, 2013
Metasploit is the most common and complete framework for testing security.
Metasploit is an entire suite of tools and methodologies designed for testing the security of computers and networks.
The book is written for both experienced penetration tester and people new to the security field. For the first group, one of the most interesting thing is the explanation of the rules and ideas that formed the Penetration Test Execution Standard, while for users new to the field, is really interesting what can be done and how.
Read More 
March 5, 2013
After Microsoft’s CompTIA A+ Training Kit, here I am reviewing the Microsoft’s A+ Rapid Review.
This book is really similar to the book CompTIA Security+ Rapid Review (this too by Microsoft Press).
Darril Gibson, the book’s author, have compressed a huge amount of contents in a (relatively) small amount of pages (411). This is the first big difference in respect of the Security+ Rapid Review, since this book has more contents per page (and about the double of pages).
Read More