benrothke writes "David Mitchell Smith wrote in the Gartner report Hype Cycle for Cloud Computing last year that while clearly maturing and beyond the peak of inflated expectations, cloud computing continues to be one of the most hyped subjects in IT. The report is far from perfect, but it is accurate in the sense that while cloud computing is indeed ready for prime time, the hype with it ensures that too many firms will be using it with too much hype, and not enough reality and detailed requirements. While there have been many books written about the various aspects of cloud computing, Testing Cloud Services: How to Test SaaS, PaaS & IaaS is the first that enables the reader to successfully make the transition from hype to actuality from a testing and scalability perspective." Read on for the rest of Ben's review.
Have you META-MODERATED today? Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. ×
First time accepted submitter Sara Konrath writes "The App Generation gives an overview of how digital media and technology may affect young people's perceptions of themselves, their ability to relate to others, and their creativity. As the director of the Interdisciplinary Program on Empathy and Altruism Research (iPEAR), my research finds that there have been generational changes in personality traits related to social functioning. For example, we find that narcissism has been rising while dispositional empathy has been declining in recent generations. I also study the relationship between such traits and the use of social media. Considering this, I was excited to get a copy of the book ahead of its release date." Keep reading for the rest of Sara's review.
Nick Kolakowski writes "Amazon CEO Jeff Bezos regarded Apple co-founder Steve Jobs as a rival, but the men had more in common than they might have believed. Like Jobs, Bezos had a vision of a tech company, started it on a small budget with a tight cluster of coworkers, and fought to grow it into an industry giant. And as detailed in The Everything Store, a new book about the rise of Amazon.com, Bezos also boasts a Jobs-like temper, riddling his subordinates with withering insults when he feels a project is imperfect or falling behind schedule." Read on for the rest of his review.
Nick Kolakowski writes "Markus 'Notch' Persson is the famous indie-game developer behind Minecraft, which is also the name of the new book about his life and work by Daniel Goldberg and Linus Larsson. (The effect is slightly odd, like naming the Steve Jobs biography iPhone.) Minecraft traces Persson’s development from an isolated young man building simple PC games in his bedroom, to a frustrated game developer who feels the software conglomerates are stifling his creativity, to a multimillionaire who's had some trouble coming to grips with his gamer-land fame. The Persson described in the book is an introvert's introvert, far more interested in coding than partying, although he does display flashes of entrepreneurial aggression that would make Steve Jobs or Jeff Bezos proud: at one point, he confesses that he wants to build a gaming behemoth on the scale of Valve." Read below for the rest of Nick's review.
benrothke writes "Narrating a compelling and interesting story about cryptography is not an easy endeavor. Many authors have tried and failed miserably; attempting to create better anecdotes about the adventure of Alice and Bob. David Kahn probably did the best job of it when wrote The Codebreakers: The story of secret writing in 1967 and set the gold standard on the information security narrative. Kahn's book was so provocative and groundbreaking that the US Government originally censored many parts of it. While Secret History: The Story of Cryptology is not as groundbreaking, it also has no government censorship. With that, the book is fascinating read that provides a combination of cryptographic history and the underlying mathematics behind it." Keep reading for the rest of Ben's review.
Michael Ross writes "An online store is one of the most common use cases for a website nowadays. For those web developers and business owners who choose the current version of Drupal as a basis for such an e-commerce project, the canonical solution is Drupal Commerce. There are numerous online resources for learning Commerce, and yet for the longest time no printed book. Now we have Getting Started with Drupal Commerce, written by Richard Jones." Read below for the rest of Michael's review.
Nick Kolakowski writes "Here are the lessons imparted by Dave Eggers' The Circle, his new novel about the rise of a fictional technology company clearly modeled on Google or Facebook: 1) Sharing content with people online is a poor substitute for having real-life experiences with, like, kayaking and family gatherings and drinking and stuff. 2) Unless stopped, companies that build social-networking tools will create increasingly intrusive software. 3) The only sure way to stay sane in our increasingly interconnected (Eggers would say over-connected) world is to drive at high speed off a bridge." Read below for the rest of Nick's review.
benrothke writes "Of the books that author Pete Loshin has written in the past, a number of them are completely comprised of public domain information that he gathered. Titles such as Big book of Border Gateway Protocol (BGP) RFCs, Big Book of IPsec RFCs, Big Book of Lightweight Directory Access Protocol (LDAP) RFCs, and others, are simply bound copies of publicly available information. In two of his latest books, Practical Anonymity: Hiding in Plain Sight Online and Simple Steps to Data Encryption: A Practical Guide to Secure Computing, Loshin doesn't do the wholesale cut and paste like he did from the RFC books, but on the other side, doesn't offer much added information than the reader can get online." Read below for the rest of Ben's review.
First time accepted submitter gbrambilla writes "A problem every system administrator has to face sooner or later is to improve the performance of the infrastructure that he administers. This is especially true if the infrastructure is a Citrix XenApp farm that publishes applications to the users, that starts complaining as soon as those applications become slow. A couple of weeks ago I was asked to publish a new ERP application and suddenly all the hosted applications started to suffer performance problems... after some basic tests I looked on Amazon for an help and found the book I'm reviewing: Citrix XenApp Performance Essentials, by Luca Dentella, is a practical guide that helps system administrators to identify bottlenecks, solve performance problems and optimize XenApp farms thanks to best-practices and real-world examples." Read below for the rest of gbrambilla's review.
benrothke writes "It has been about 8 years since my friend Richard Bejtlich's (note, that was a full disclosure 'my friend') last book Extrusion Detection: Security Monitoring for Internal Intrusions came out. That and his other 2 books were heavy on technical analysis and real-word solutions. Some titles only start to cover ground after about 80 pages of introduction. With this highly informative and actionable book, you are already reviewing tcpdump output at page 16. In The Practice of Network Security Monitoring: Understanding Incident Detection and Response, Bejtlich takes the approach that your network will be attacked and breached. He observes that a critical part of your security posture must be that of network security monitoring (NSM), which is the collection and analysis of data to help you detect and respond to intrusions." Read below for the rest of Ben's review.
benrothke writes "Little did anyone know that when the first Hacking Exposed book came out over 15 years ago, that it would launch a set of sequels on topics from Windows, Linux, web development, to virtualization and cloud computing, and much more. In 2013, the newest edition is Hacking Exposed Mobile Security Secrets & Solutions. In this edition, authors Neil Bergman, Mike Stanfield, Jason Rouse & Joel Scambray provide an extremely detailed overview of the security and privacy issues around mobile devices. The authors have heaps of experience in the topics and bring that to every chapter." Read below for the rest of Ben's review.
Nerval's Lobster writes "When Ars Technica editor Nate Anderson sat down to write The Internet Police, Edward Snowden hadn't yet decided to add some excitement to the National Security Agency's summer by leaking a trove of surveillance secrets to The Guardian. As a result, Anderson's book doesn't mention Snowden's escapade, which will likely become the security-and-paranoia story of the year, if not the decade. For anyone unaware of the vast issues highlighted by Snowden's leak, however, The Internet Police is a handy guide to the slow and unstoppable rise of the online security state, as well as the libertarian and criminal elements that have done their level best to counter that surveillance." Read below for the rest of Nerval's Lobster's review.
benrothke writes "Diet books are literally a dime a dozen. They generally benefit only the author, publisher and Amazon, leaving the reader frustrated and bloated. With a failure rate of over 99%, diet books are the epitome of a sucker born every minute. One of the few diet books that can offer change you can believe in is The Healthy Programmer: Get Fit, Feel Better, and Keep Coding. Author Joe Kutner observes that nearly every popular diet fails and the reason is that they are based on the premise of a quick fix without focusing on the long-term core issues. It is inevitable that these diets will fail and the dieters at heart know that. It is simply that they are taking the wrong approach. This book is about the right approach; namely a slow one. With all of the failed diet books, Kutner is one of the few that has gotten it right." Keep reading for the rest of Ben's review.
benrothke writes "SlideShareis a free web 2.0 based slide hosting service where users can upload presentation-based files. Launched in October 2006, it's considered to be similar to YouTube, but for slideshows. It was originally meant to be used for businesses to share slides among employees more easily, but it has since expanded to also become a host of a large number of slides which are uploaded merely to entertain. SlideShare gets an estimated 58 million unique visitors a month and has about 16 million registered users. With such a strong user base, authors Kit Seeborg and Andrea Meyer write in Present Yourself: Using SlideShare to Grow Your Business how SlideShare users can use the site (including other similar collaborative sites such as Prezi and Scribd) to present their story to a worldwide audience. Given that visual presentations are the new language of business, understanding how to maximize their potential can be a valuable asset for the entrepreneur, job seeker and everyone in between." Read below for the rest of Ben's review.
benrothke writes "Every organization has external software, hardware and 3rd-party vendors they have to deal with. In many cases, these vendors will have direct access to the corporate networks, confidential and proprietary data and more. Often the software and hardware solutions are critical to the infrastructure and security of the organization. If the vendors don't have effective information security and privacy controls in place, your data is at risk. In addition, when selecting a product to secure your organization, how do you ensure that you are selecting the correct product? All of this is critical in the event of a breach. When the lawyers start circling, they will be serving subpoenas to your company, not your 3rd-party vendors." Keep reading for Ben's review.
Michael Ross writes "As a hugely popular scripting language with an 18-year history, PHP has been the topic of countless computer language books. One of the most comprehensive offerings has been Programming PHP, published by O'Reilly Media. The first edition appeared in March 2002, and was written by Rasmus Lerdorf (the original developer of PHP) and Kevin Tatroe. A second edition was released in May 2006, and saw the addition of another co-author, Peter MacIntyre. With the many changes to the language during the past seven years, the book has again been updated, to cover all of the major new features made available in version 5 of PHP." Keep reading for the rest of Michael's review.
sagecreek writes "If you are in charge of a small network with just a few servers, you may still be doing configuration management primarily by hand. And you may take particular pride in maintaining that 'artisan' role. After all, it's mostly up to you to set up new users and their machines, fix current problems, manage the servers and their software, create databases and their user accounts, and try to keep the network and user configurations as uniform as possible despite running several different brands--and vintages--of hardware and software. However, warns infrastructure consultant John Arundel, '[b]eyond ten or so servers, there simply isn't a choice. You can't manage an infrastructure like this by hand. If you're using a cloud computing architecture, where servers are created and destroyed minute-by-minute in response to changing demand, the artisan approach to server crafting just won't work.' In his new book, Puppet 3 Beginner's Guide, Arundel emphasizes: 'Manual configuration management is tedious and repetitive, it's error-prone, and it doesn't scale well. Puppet is a tool for automating this process.'" Read below for the rest of sagecreek's review.
gregrolan writes "Evans's Trousers Of Reality series attempts to understand the interplay between neurology, psychology, and sociology in the context of finding a better path through working life. I previously reviewed the first book in the series, Working Life a few years ago, and the second volume The Ingenious Engine Of Reality has now been published. While the first volume outlined the themes for the series and focused on work-life balance, this second volume digs deeper into the science behind knowledge, learning, and mental models.It then uses this background to explore the relationship between knowledge, behavior, and process in a software project setting." Keep reading for the rest of Greg's review.
benrothke writes "It's said that truth is stranger than fiction, as fiction has to make sense. Had The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests been written as a spy thriller, it would have been a fascinating novel of international intrigue. But the book is far from a novel. It's a dense, well-researched overview of China's cold-war like cyberwar tactics against the US to regain its past historical glory and world dominance." Read below for the rest of Ben's review.