Very Truly Yours, Nikola Tesla Review

Very Truly Yours, Nikola Tesla
Average Reviews:

(More customer reviews)
Very informative as to the way Tesla expressed himself concerning his works, he was a very eloquent speaker as well as an electrical genius.

Click Here to see more reviews about: Very Truly Yours, Nikola Tesla

Nikola Tesla was a man of letters. He wrote many letters to the editors of the magazines and newspapers of his day. These letters give a fascinating glimpse into the mind of an eccentric genius. Collected here for the first time are more than forty of Nikola Tesla's letters. The subject matter ranges widely, as Tesla was interested in almost everything. In these letters he responds to Marconi and Edison, gives his thoughts on the wars of his day, corrects inconsistencies in news reports, and much much more. Nikola Tesla has been called the most important man of the 20th Century. Without Tesla's ground-breaking work we' d all be sitting in the dark without even a radio to listen to.

Buy Now

Click here for more information about Very Truly Yours, Nikola Tesla

Read More...

CCNA Exam Prep (Exam 640-802) (2nd Edition) Review

CCNA Exam Prep (Exam 640-802) (2nd Edition)
Average Reviews:

(More customer reviews)
I've been through ALL the CCNA books out there -- from Lammle's CCNA book to all the various CCNA study guides and so on -- and this one book by Jeremy Cioara is the absolute best available.
The cover of this book looks generic and nondescript, but Cioara has an ability to not only communicate in an amazingly down-to-earth, plain English way that is incredible. Also, he not only is easy and engaging to read, but -- *gasp* -- he actually gets his facts straight!
If you've been through the official CCNA books, you probably think that you have no choice but just to memorize a lot of things without hope of ever getting a simple, commonsense explanation for them, but you would be wrong in that assumption, because Cioara actually explains the things you assumed no one could ever explain.
Get this book -- you'll be glad you did.

Click Here to see more reviews about: CCNA Exam Prep (Exam 640-802) (2nd Edition)



Buy NowGet 32% OFF

Click here for more information about CCNA Exam Prep (Exam 640-802) (2nd Edition)

Read More...

Black Ice: The Invisible Threat of Cyber-Terrorism Review

Black Ice: The Invisible Threat of Cyber-Terrorism
Average Reviews:

(More customer reviews)
Verton's book is full of hyperbole, repetition, unsupported statements, and contradictions. It is poorly written, poorly organized, and poorly edited. His "research" consists mostly of quoting his own magazine articles (29 times) and the magazine he writes for (16 times). By comparison, he quotes from only three books. Example of hyperbole: In commmenting on a admittedly fictional scenario called Dark Winter, the author claims that, "entire communities and cities could be rendered as helpless as those affected by the Black Death of the 14th century, a bubonic plague that killed one third of Europe's population." Yet, he fails to support that claim with any evidence or even a reference to the report on the exercise.
He repeats the same story about an al Qaeda interview with an Italian journalist in his introduction and again at p. 98. He writes nearly the same sentence about radical terrorists living in the U.S. once in the main text on p. 5 and again in a footnote on the same page. He tells a story about the Ptech company at p. 111 and again at p. 223-25, and uses nearly the identical paragraph in each. Where is the editing to catch these duplications?
Worse yet, his uses the Ptech story to draw two contradictory conclusions. In the first telling, he says that Ptech is an example of al Qaeda using American companies as fronts for terrorist financing. He claims that "evidence was uncovered" to show this connection. Yet, two pages later, he asserts that the FBI has been "unsuccessful in finding any evidence linking Ptech to terrorism financing." Then in the second telling of the Ptech story, he uses it as an example of how the War on Terrorism has turned into a "virtual witch-hunt," using a "scorched-earth strategy" [more hyperbole] that has "left many innocent casualties in its wake." The reader is left confused whether Ptech serves as an example of al Qaeda using American companies as fronts for terrorist financing, or an example of the War on Terrorism spoiling the reputation of innocent American enterprises.
Even his definition of cyber-terrorism is contradicted by his own material. He defines cyber-terrorism as either the use of cyber-tools to destroy critical infrastructure, or traditional terrorism that has a destructive effect on electronic and Internet infrastructure. See Introduction at xx. But in his appendix, he quotes the FBI definition of cyber-terrorism, which is narrower--the use of cyber-tools to shut down or destroy critical national infrastructures.
From his overly broad definition of cyber-terrorism, the author strays into three fictional scenarios of terrorism that seem to be the centerpiece of his book. They are supposed to scare us into thinking that cyber-terrorism can really happen. But if they are fictional, how can they alarm us? And, even as fiction, none of them even fits the FBI's definition of cyber-terrorism. The first, Black Ice, starts with a ice storm, not a cyber-attack. The second, Blue Cascades, was described vaguely as "a cyber system failure ... caused by a prolonged power outage." The third, Dark Winter, was a smallpox outbreak.
Many years ago, a famous fast food restaurant ran an ad that said, "where's the beef?" After reading this book, I have to ask, "where's the cyber-attack?"

Click Here to see more reviews about: Black Ice: The Invisible Threat of Cyber-Terrorism

The first book to define the clear and present danger posed by a cyber-terrorist attack on the U.S. computer- and network-dependent infrastructure. The pages are packed with interviews from members of terrorist groups, including al-Qaida, as well as key insiders involved in planning and executing the U.S. plan for the defense of cyberspace, including Tom Ridge, James Gilmore, CIA and NSA officials--and even al-Qaeda supporters. Internet security expert Dan Verton investigates how cyber-terrorism could occur, what the global and financial implications are, the impact this is having and will continue to have on privacy and civil liberties, and how to prepare and prevent against cyber-terrorism.

Buy Now

Click here for more information about Black Ice: The Invisible Threat of Cyber-Terrorism

Read More...

Return Engagement (Settling Accounts Trilogy, Book 1) Review

Return Engagement (Settling Accounts Trilogy, Book 1)
Average Reviews:

(More customer reviews)
First of all, I really like the plot of this series of books by Harry Turtledove. He is very imaginative in fashioning the alternative history following a Confederate victory in the Civil War. I also like his plot device of showing all events through the eyes of a large and diverse cast of characters.
But... BUT... the author continues to annoy the heck out of me with his tendency to repeat, repeat, and repeat again the characteristics and motivations of each of the characters. Ditto factual elements, such as the streets and sidewalks in black neighborhoods being in bad shape. It's as if he thinks we have forgotten what we read 50 pages previously. His editor should have clued him in a long time ago that this was not only unnecessary, but also a turn-off for readers. I would guess that over 95% of the people reading this book have read at least some of the previous books as well. We already know (to pick one of the most obvious examples) that Sam Carsten gets sunburned easily. It's probably been mentioned 60 times since Carsten's character arrived in the series. Mention these things ONCE per book, please!
Another annoyance: a character will make a rather mundane and obvious observation about the war -- such as a comment about the enemy's strategy -- and other characters will act like he's a military genius for thinking of something so profound. I don't know why that bothers me, but it does.
I notice I'm not the only one bothered by Mr. Turtledove's stylistic quirts. I hope he will read the reviews here on Amazon and give them serious consideration as he writes the next two books (which I'll certainly devour in any case). He did, indeed, seem to respond to criticism that the sex scenes in an earlier book were an embarrassingly bad idea, since he hasn't repeated the mistake in recent books of the series.
A few requests for the author:
- I really am interested in learning what's happening in the rest of the world. Please provide more than just the smallest of crumbs.
- How about a Mormon character that we can follow?
- How about a Confederate enlisted man?
Despite the annoyances, I love the books. And this one was among the best of the series so far.

Click Here to see more reviews about: Return Engagement (Settling Accounts Trilogy, Book 1)



Buy Now

Click here for more information about Return Engagement (Settling Accounts Trilogy, Book 1)

Read More...

Discovering Computers 2009: Complete (Shelly Cashman) Review

Discovering Computers 2009: Complete (Shelly Cashman)
Average Reviews:

(More customer reviews)
This is the first review I've written on Amazon, or anywhere else for that matter, but Discovering Computers 2009 Complete is so unbelievably bad that I had to say something, hopefully helping some poor soul from using this so-called text as a source of information. I am using this as a textbook in a required course in a community college, and am only through chapter 5 so it is possible that all of the inaccuracies and just plain wrong information will suddenly no longer be manifest in later chapters, but I'm not counting on it.
I have been a PC user since the original IBM PC, and have delved into much of the technology involved over the years, so I am at the very least familiar with most of the subject matter. I don't claim to be an expert by any stretch, but I do have my strengths and it is this prior familiarity that permits me to evaluate the text's accuracy. Also consider that this is a book that is supposed to teach those with little or no experience with computers beyond perhaps some very basics, so misleading or unclear statements can be just as damaging to such readers as the outright incorrect statements.
OK, I just opened to a page... this one's not a biggie, but I'll start here. "Today, AMD is the leading manufacturer of Intel-compatible processors, which have an internal design similar to Intel processors..." I think that Intel would like to know about that! The architecture is not similar at all, and remember that we are talking about a college level text here. The very next paragraph: "Originally, Apple computers used only an IBM processor or a Motorola processor..." No, originally Apple used a MOS Technology 6502 processor; the Mac used Motorola and then IBM processors. Nothing critical here, so I'll move on.
At the end of chapter 4: The Components of the System Unit is a page entitled Keeping Your Computer Clean, in which the book suggests using "small attachments on your house vacuum" on the "wires, chips, adapter cards, and fan blades."!!! Even if the user is wearing an antistatic wristband -which the text recommends but makes no mention of how to ground- a house vacuum should NEVER be used on such electronically sensitive parts, as the static electricity generated by the dust flowing through the tube will very efficiently zap those chips and adapter cards. Additionally, they instruct the user to unplug the computer from everything, not necessarily a bad thing, but make no mention of grounding the case or at the very least placing it on a grounded anti-static mat. BAD BAD BAD!
Under the topic of Digital Cameras, a sidebar states that a "digital zoom digitally alters the pixels at the center of the CCD..." If it had said that it only uses the pixel data from the central areas of the CCD it would have been somewhat better, but as it stands the reader is led to believe that the CCD is somehow altered. The text attempts to explain image resolution and pixel density, delving into ppi(pixels per inch), which should almost never be mentioned in the same sentence as image resolution and pixel density. Again from the text: "For example, a 2304x1728 (pronounced 2304 by 1728) ppi camera has 2,304 pixels per vertical inch and 1,728 pixels per horizontal inch." This is just plain wrong in both a fundamental and conceptual way, and exemplifies how the entire book seems to have been authored by someone who does not understand much of the subject matter, and has simply performed a few Internet searches on the topic and then cut-and-pasted his way into a text. If you do not understand why the above sentence is wrong then how would you know it was when you read it in the text. It is not a particularly difficult concept but is misunderstood by the general public (Pixel density, ppi, dpi, etc.).
I have other studying to do, or I could spend the rest of the semester picking this waste of a tree apart. If you have any choice in the matter of selecting a book with which to learn about computers and the technology, please please please do not buy this one. I have nothing to gain what so ever by trashing this one, but I can tell you that it is very aggravating to have to memorize 'facts' that I know without question are wrong, simply to pass an exam.
Speaking of exams, you should see (not!) some of the 'edutainment' the publisher has on the associated 'learning' Web site; neither 'edu' nor 'taining'. I will say this though: I did learn to capitalize Web and Internet.

Click Here to see more reviews about: Discovering Computers 2009: Complete (Shelly Cashman)



Buy NowGet 31% OFF

Click here for more information about Discovering Computers 2009: Complete (Shelly Cashman)

Read More...

iPad: The Missing Manual Review

iPad: The Missing Manual
Average Reviews:

(More customer reviews)
The extensive features in Apple's newest creation, the "magical" iPad, deserve this new book in The Missing Manual series. In addition to its paperback version, iPad: The Missing Manual is available from the publisher, O'Reilly, in four different electronic media versions including ePub. This reviewer downloaded the ePub version to the iPad in order to read it there while exploring the very device it described.
A veteran author of books in The Missing Manual series, Biersdorfer, a New York Times tech columnist, provides clear, detailed explanations and helpful illustrations of the iPad's many features in a very readable, often entertaining way.
Experienced Apple users and iPhone users will find much of the text very elementary (e.g., "Turn the iPad On and Off" and "Find the Home Button," in Chapter One). The five chapters devoted to the multi-media iPod functions of the iPad, music, videos, audiobooks, podcasts, photos and the newest addition, books, will be very helpful to those who come to the iPad without any prior experience with Apple products. But for those who have used a Mac, an iPod or an iPhone even for a short time, they seem superfluous. Not only do all these Apple devices have an easy and intuitive user interface, but also they are similar.
Justifiably, an entire chapter is devoted to the newest feature on any Apple device, books. Helpful sections on how to find books in the new iBookstore and elsewhere, ways to make the reading experience pleasant (changing font size, searching within a book, using bookmarks, etc.) are included in Chapter 8.
Owners who rely on the iPad as a productivity tool will welcome the chapters on email, the internet, and the iWork apps (Pages, Numbers, Keynote). There are many useful explanations and tips such as "all the programs in the iWork suite can export files as PDF documents [and] can export files in their native iWork formats...[but] although Pages can export to the native Microsoft Word .doc format, Numbers and Keynote can't export their contents as Microsoft Excel or PowerPoint files. Yet, anyway." Important information to know--and not obvious.
A very helpful feature of the ebook version of iPad: The Missing Manual is that tapping on any entry in the Table of Contents and/or the Index takes the reader immediately to that precise point in the book.
iPad: The Missing Manual will be most valuable to those with little or no previous Apple device experience. Nonetheless, even those who have used Apple products for years will find insights and tidbits that make using the iPad a more productive and pleasurable experience.

Click Here to see more reviews about: iPad: The Missing Manual

Apple's iPad is the perfect personal media center. It lets you search the Web with WiFi, helps you stay in touch with its built-in email application, and allows you to read books, magazines, and newspapers in full color. You can also play games, listen to music, watch videos, view photos, and create documents, layouts, and slideshows with iPad's iWork suite. With iPad: The Missing Manual, learning how to use this new device is a snap. The clear step-by-step instructions, undocumented shortcuts, workarounds, and lots of practical timesaving advice help you learn each feature and application -- presented with the renowned Missing Manual wit and easy-to-read format. Learn how to shop in the iPad's integrated, custom-designed bookstore Use its full-color, large-screen eBook and ePeriodical reader Create documents, spreadsheets, and presentations with the iWork "lite" productivity suite Use iTunes to organize and manage media files Get connected to the Web with built-in WiFi and the Safari browser Orient yourself with the iPad's GPS and map technologies Locate and download custom-built games Use the iPad's built in email, calendar, and contact applications Run any and all iPhone apps on the iPad View Pictures on Your iPad By J. D. Biersdorfer To see the pictures you synced from your computer, tap the Photos icon on the iPad's Home screen. Then tap the Photos button at the top of the screen to see your pictures in thumbnail view, filling the iPad screen in a grid. If you chose to copy over specific photo albums, tap the name of the album you want to look at. Mac syncers can also tap the Events, Faces, or Places button to see photos sorted in those categories, as page xx explains. On the thumbnails screen, you can do several things:
Tap a photo thumbnail to see it full-size on the iPad screen.
Double-tap an open photo to magnify it.
Spread and pinch your fingers on-screen (those fancy moves described in Chapter 2) to zoom in and out of a photo. Drag your finger around on-screen to pan through a zoomed-in photo.
Flick your finger horizontally across the screen in either direction to scroll through your pictures at high speeds. You can show off your vacation photos really fast this way (your friends will thank you).
Rotate the iPad to have horizontal photos fill the width of the screen or to have vertical photos fill its height.
With a photo open, tap the iPad's glass to display a strip of itsy-bitsy thumbnails of all the photos in the current album at the bottom of the screen. Tap or slide to a thumbnail to jump to a particular picture.

When you tap the ^ icon in the menu bar, you can set a photo as wallpaper, assign a picture to your iPad's Contact's program, send a pic to MobileMe, or start a photo slideshow. To get back to your library, tap the Photos or album-name button at the top of the screen.
Email Photos If you want to share your photographic joy, you can email one or a bunch of pictures right from the Photos program:
One photo. To email the photo currently on-screen, tap the iPad's glass to make the photo controls appear, and then tap the ^ icon in the upper-right corner. Tap the Email Photo button. The mail program attaches the photo to a new message, ready for you to address.
Multiple photos. To email a bunch of pictures at once, tap open the album containing the photos. Tap the ^ icon in the top-right corner and then tap the pictures you want to send (blue checkmarks appear in the corner of the thumbnails to show you've selected them). Tap the Email button to attach them to a new message. If you have a draft message in progress, tap the Copy button, then switch to the mail program, open your message, and hold down your finger until the Paste button appears. Tap it to paste in the pictures.
Delete Photos You have two ways to delete photos from your iPad. If you synced photo albums from iTunes, connect the iPad to the computer, open iTunes, hit the Photos tab, and turn off the checkboxes by those albums. Click Apply and then Sync to 'unsync," or remove, those pix from the iPad's gallery.
If you have pictures in your Saved Photos album you want to ditch, you can delete a currently open picture by tapping the T icon and then tapping the Delete Photo button. To delete multiple pictures from the Saved Photos thumbnail view, tap the ^ icon, then tap the unwanted pictures to assign the Blue Checkmarks of Selection. Tap the small red Delete button on the top-left side of the menu bar. There's a blue Cancel button on the other side of the menu bar if you change your mind.


Buy Now

Click here for more information about iPad: The Missing Manual

Read More...

The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking Review

The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
Average Reviews:

(More customer reviews)
I bought Krutz's first book on CISSP prep and found it to be very readable and made difficult concepts more easily understood, at least enough for me to pass my CISSP certification. So far I'm 40% into this text and the same formula is holding true. A good aid for prepping for the CEH.

Click Here to see more reviews about: The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking


The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope
Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more
Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking
Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests


Buy NowGet 37% OFF

Click here for more information about The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking

Read More...