Image

Book Review: Digital Vertigo Screenshot-sm 65

benrothke writes "In Digital Vertigo: How Todays Online Social Revolution Is Dividing, Diminishing, and Disorienting Us, author Andrew Keen, who describes himself as the Anti-Christ of Silicon Valley (whatever that means), raises numerous profound questions about social media and its implications on society. In the new world of social media and Web 3.0, which is claiming to revolutionize communication and interactions, Keen writes that history is repeating itself and points to the beginning of the industrial revolution as an example. He writes of Jeremy Bentham who invented the Panopticon; a structure where the inhabitants were watched at all times. Bentham felt the Panopticon could make humanity more virtuous, more hard-working and happier; similar to the promise of Web 3.0. The Panopticon was a failure, and Keen sees the same for Web 3.0. The book is a critique of Web 3.0." Read below for the rest of Ben's review.
Books

Book Review: How Google Tests Software 44

MassDosage writes "Having developed software for nearly fifteen years, I remember the dark days before testing was all the rage and the large number of bugs that had to be arduously found and fixed manually. The next step was nervously releasing the code without the safety net of a test bed and having no idea if one had introduced regressions or new bugs. When I first came across unit testing I ardently embraced it and am a huge fan of testing of various forms — from automated to smoke tests to performance and load tests to end user and exploratory testing. So it was with much enthusiasm that I picked up How Google Tests Software — written by some of the big names in testing at Google. I was hoping it would give me fresh insights into testing software at "Google Scale" as promised on the back cover, hopefully coupled with some innovative new techniques and tips. While partially succeeding on these fronts, the book as a whole didn't quite live up to my expectations and feels like a missed opportunity." Read below for the rest of MassDosage's review.
Software

Book Review: Elemental Design Patterns 129

jkauzlar writes "Believe it or not, it's been 18 years since Design Patterns by Gamma, et al, first began to hit the desks of programmers world-wide. This was a work of undeniable influence and usefulness, but there is criticism however that pattern-abuse has lead to over-architected software. This failure is perhaps due to wide-spread use of patterns as templates instead of understanding their underlying 'grammar' of this language such that it may be applied gracefully to the problem at hand. What's been missing until now is a sufficiently authoritative study of design patterns at this 'grammatical' level of abstraction. Jason McC. Smith, through a surprisingly captivating series of analytic twists and turns, has developed a theory of Elemental Design Patterns that may yet rejuvenate this aging topic." Keep reading for the rest of Joe's review.
Image

Book Review: Elementary Information Security Screenshot-sm 56

benrothke writes "Elementary Information Security, based on its title, weight and page length, I assumed was filled with mindless screen shots of elementary information security topics, written with a large font, in order to jack up the page count. Such an approach is typical of far too many security books. With that, if there ever was a misnomer of title, Elementary Information Security is it." Read below for the rest of Ben's review
Image

Book Review: The Logic of Chance Screenshot-sm 44

eldavojohn writes "The Logic of Chance: The Nature and Origin of Biological Evolution is a comprehensive snapshot of the latest research of biological evolution. The text is written by Eugene V. Koonin, an editor for a journal and researcher at NCBI. The book, although lacking in foundational knowledge and often foregoing explanation of research, presents a comprehensive and well-referenced view of modern evolutionary research. It is heavily laden with acronyms and jargon specific to biology and evolution. As a result, reading it requires either prior knowledge or a high tolerance for looking up these advanced topics with the reward of it being an extremely eye opening and enjoyable read worthy of your time." Keep reading for the rest of eldavojohn's review.
Image

Book Review: Fitness For Geeks Screenshot-sm 201

jsuda writes "You would think that geeks would be as interested in fitness as dogs are of TV. After all, geeks already put in hours of finger dancing on keyboards, assembling hefty code fragments, and juggling PHP programming functions. Although intended, in part, as a guide to real physical fitness the book, Fitness for Geeks, entices geeks with what they are really interested in–the science of fitness, nutrition, and exercise. In 11 chapters over 311 pages (including notes and an index) author, Bruce W Perry, describes in great detail the science of fitness and all of its components–food selections, timings, and fastings; exercising of all types; sleep, rest, and meditation; the benefits of hormesis (shocking the body with stresses); and the benefits of natural sunlight." Read on for the rest of jsuda's review.
Book Reviews

Book Review: Drupal Intranets With Open Atrium 25

New submitter nuvoleweb writes "Drupal Intranets with Open Atrium, by Tracy Charles Smith is a comprehensive guide to Open Atrium, the popular open source Intranet system. Open Atrium is a derivative (distribution) of Drupal specifically meant for group collaboration, and the author works in the Open Atrium core team at Phase2 Technology." Read below for the rest of Andrea's review.
Books

Book Review: The CERT Guide To Insider Threats 27

benrothke writes "While Julius Caesar likely never said 'Et tu, Brute?' the saying associated with his final minutes has come to symbolize the ultimate insider betrayal. In The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes, authors Dawn Cappelli, Andrew Moore and Randall Trzeciak of the CERT Insider Threat Center provide incontrovertible data and an abundance of empirical evidence, which creates an important resource on the topic of insider threats. There are thousands of companies that have uttered modern day versions of Et tu, Brute due to insidious insider attacks and the book documents many of them." Read on for the rest of Ben's review.
Books

Book Review: The Information Diet 102

stoolpigeon writes "It is a well known fact that the United States has an obesity problem. There are numerous causes that ultimately lead to an imbalance in the ratio between the number of calories taken in to the number of calories burned. The size of the American diet industry is another good indicator of how widespread the problem has become. Clay Johnson believes that the issues the U.S. has with food have become mirrored in how we consume information." Read below for the rest of stoolpigeon's review.
Books

Book Review: HTML5 Developer's Cookbook 42

stoolpigeon writes "HTML5 is the latest version of HTML. In fact, it is still under development — but HTML5 brings so many highly-desired capabilities that browsers have begun to implement it and many projects already take advantage of it. Often an HTML5 project employs more technology than just HTML, and the label has come to include the use of CSS3 and JavaScript as well. There are a number of resources out there to help one use HTML5 and recently I've been using the HTML5 Developer's Cookbook by Chuck Hudson and Tom Leadbetter." Read on for the rest of stoolpigeon's review.
Books

Book Review: Microsoft Manual of Style 110

benrothke writes "The Chicago Manual of Style (CMS), now in its 16th edition, is the de facto style guide for American writers. It deals with aspects of editorial practice, grammar, usage, document preparation and more. It's just one of many style guides for writers. The Microsoft Manual of Style, just released in its 4th edition, attempts to do for the technical writers what the CMS has done for journalists and other writers." Read below for the rest of Ben's review.
Books

Book Review: Google+: the Missing Manual 104

Michael J. Ross writes "Prior to Google+, the company's previous attempts at social networking — Orkut, Dodgeball, Jaiku, Wave, and Buzz — were largely failures, and tended to frustrate users who had devoted time and effort to contributing content and establishing connections with other users, only to see the services wither on the vine. In contrast, Google+ appears to be receiving far more nurturing by the Internet behemoth, and as a result has arguably better chances of not just surviving, but expanding to the point of eventually challenging Twitter and Facebook. Like its rivals, Google+ offers online help information to explain to newcomers the basics of how to use the service. But there is little to no advice on how to make the most of its capabilities, and even the basic functionality is not always clearly explained. That is the purpose of a new book, Google+: The Missing Manual." Keep reading for the rest of Michael's review.
Book Reviews

Book Review: Occupy World Street 284

jsuda writes "For those billions of people for whom the current political-economic system doesn't work–the Occupy Wall Street people, the Tea Partiers, the 99%-ers and have-nots, the middle and lower classes, and the rest of the unwashed masses, Occupy World Street is a starburst of enlightenment and a practical vision of hope for a new and advanced society." Read on for jsuda's review
Book Reviews

Book Review: Liars and Outliers 68

First time accepted submitter benrothke writes "It is said that the song Wipe Out launched a generation of drummers. In the world of information security, the classic Applied Cryptography: Protocols, Algorithms, and Source Code in C by Bruce Schneier may have been the book that launched a generation of new cryptographers. Schneier's latest work of art is Liars and Outliers: Enabling the Trust that Society Needs to Thrive. For those that are looking for a follow-up to Applied Cryptography, this it is not. In fact, it is hard to classify this as an information security title and in fact the book is marked for the current affairs/sociology section. Whatever section this book ultimately falls in, the reader will find that Schneier is one of the most original thinkers around." Keep reading for the rest of Ben's review.
Book Reviews

Book Review: Java Performance 160

jkauzlar writes "The standard Oracle JVM has about sixty 'developer' (-XX) options which are directly related to performance monitoring or tuning. With names such as 'UseMPSS' or 'AllocatePrefetchStyle', it's clear that Joe Schmo Code Monkey was not meant to be touching them, at least until he/she learned how the forbidding inner recesses of the JVM work, particularly the garbage collectors and 'just-in-time' compiler. This dense, 600-page book will not only explain these developer options and the underlying JVM technology, but discusses performance, profiling, benchmarking and related tools in surprising breadth and detail. Not all developers will gain from this knowledge and a few will surrender to the book's side-effect of being an insomnia treatment, but for those responsible for maintaining production software, this will be essential reading and a useful long-term reference." Keep reading for the rest of jkauzlar's review.
Book Reviews

Book Review: The Windup Girl 164

New submitter Hector's House writes "'Nothing is certain. Nothing is secure,' reflects one of the characters in Paolo Bacigalupi's novel The Windup Girl. In 23rd century Bangkok, life for many hangs by a thread. Oil has run out; rising seas threatens to engulf the city; genetically engineered diseases hover on Thailand's borders; and the threat of violence smolders as government ministries vie for power. Environmental destruction, climate change and novel plagues have wiped out many of the crop species that humanity depends on: the profits to be made from creating — or stealing — new species are potentially enormous. After a century of collapse and contraction, Western business sees hope for a new wave of globalization; Thailand's fiercely guarded seed banks may provide just the springboard needed." Keep reading for the rest of Aidan's review.
Image

Book Review: The Tangled Web Screenshot-sm 40

brothke writes "In the classic poem Inferno, Dante passes through the gates of Hell, which has the inscription abandon all hope, ye who enter here above the entrance. After reading The Tangled Web: A Guide to Securing Modern Web Applications, one gets the feeling the writing secure web code is akin to Dante's experience." Read below for Ben's review.
Image

Book Review: OpenCL Programming Guide Screenshot-sm 40

asgard4 writes "In recent years GPUs have become powerful computing devices whose power is not only used to generate pretty graphics on screen but also to perform heavy computation jobs that were exclusively reserved for high performance super computers in the past. Considering the vast diversity and rapid development cycle of GPUs from different vendors, it is not surprising that the ecosystem of programming environments has flourished fairly quickly as well, with multiple vendors, such as NVIDIA, AMD, and Microsoft, all coming up with their own solutions on how to program GPUs for more general purpose computing (also abbreviated GPGPU) applications. With OpenCL (short for Open Computing Language) the Khronos Group provides an industry standard for programming heavily parallel, heterogeneous systems with a language to write so-called kernels in a C-like language. The OpenCL Programming Guide gives you all the necessary knowledge to get started developing high-performing, parallel applications for such systems with OpenCL 1.1." Keep reading for the rest of asgard4's review.
Image

Book Review: Sams Teach Yourself HTML5 Mobile Application Development Screenshot-sm 44

Michael J. Ross writes "The last few years have seen the emergence of several significant advances in web technologies, including HTML5 and CSS3 — all impacting the development of traditional and mobile-centric web sites. In turn, various technical book publishers have released titles addressing one or more of these technologies. While one book may focus on HTML5 and the new JavaScript APIs, another might include extensive coverage of CSS3, with little mention of JavaScript. A recent title, Sams Teach Yourself HTML5 Mobile Application Development in 24 Hours, focuses on some of the more commonly employed elements introduced with HTML5, and how they can be used for creating mobile sites and applications." Read below for the rest of Michael's review.
Image

Book Review: Defense Against the Black Arts Screenshot-sm 58

brothke writes "If there ever was a book that should not be judged by its title, Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It, is that book. Even if one uses the definition in The New Hackers Dictionary of 'a collection of arcane, unpublished, and (by implication) mostly ad-hoc techniques developed for a particular application or systems area', that really does not describe this book. The truth is that hacking is none of the above. If anything, it is a process that is far from mysterious, but rather aether to describe. With that, the book does a good job of providing the reader with the information needed to run a large set of hacking tools." Read below for the rest of Ben's review.

Slashdot Top Deals