EVOLUTION INFO-SECURE

SECURITY, SENSE & ETHICS

Book Reviews

Review for the book 'Mastering BeagleBone Robotics' By Richard Grimmet.

Before i read this book, i was curious about 2 things - how can i build a small robot just for fun sake & what could be the application of a microcomputer - The Beagle Bone Black??


This book gave me my answers. As a startup and a enthusiast in building small robots this book provides a good starting point on how to build robots  - stepwise.


Right from begining on how to setup the Beagle Bone Black, adding software packages for the projects is demonstrated in very simple language. Various resources for circuit boards and other accessories needed to build a project are provided that makes the work easier, it becomes handy to look for other needed accessories for building projects.


Construction of different variants of robots is explained which gets easier to grasp the methodology.


Although if someone is new to programming it could get a bit trickier to program the robot. But programming will not be an issue anymore - the program code is given with proper explanation of
each segment of code and what it does, that makes the job of programming a lot easier.


Book is highly recommend for students who can make a small robots that can perform various tasks - best suited for college projects.


For Hobbyists, Geeks - a nice book that provides a basic framework to make a robot and levels of functionality can be added as per functional need, or simply just play around with the projects, a nice way to learn & have fun.

Click here to go to the goodreads.com page to know more about the Book

#########################################################################################

Review for the book 'Responsive web design by example 2/e' By Thoriq Firdaus.

For a begineer in web development it is a bit confusing in most cases on how to begin with a project especially a responsive one, i myself had a lot of dilemmas while working on my academic project. Various frameworks such as bootstrap, foundation, web development tools such as bower, using CSS preprocessors, etc have been explained in a very systematic way so that novice as well as professional developers can work & learn with ease.

The main advantage of learning to develop by referring this book is by example projects (not 1 but 3 different sample projects) that have been created step-wise, which is a great way to learn for starters.
The concept of 'mobile first' is explained very well in this book, as the next generation of web development will be(or has already begun) hugely based on handheld devices, so the website must fit exactly as per the device that demands the website.

The book contains lots and lots of external references relating to the frameworks, more info on designing & development frameworks and even a good resource to get images that can be useful to design a responsive website. Also good practices on how to organize a project folder systematically so that it can be easily managed, so that it can become a habit on how to organize a project and manage it.
I would highly recommend this book to students who are taking steps in the world of creative web development.
this book deserves a 10/10..!!!!

Click here to go to the goodreads.com page to know more about the Book

 

#########################################################################################

Review for the book 'SELinux Cookbook' By Sven Vermeulen.


SELinux cookbook provides a good guidance on how to start up with SELinux Development
Environment for deploying information security on various levels. The book provides a good
demo on various 'recipies' that could help administrators set up a 'layered security approach' starting from files,users roles,applications, desktops, servers, defining user roles..
The application of SELinux Environment can greatly benefit an organization as it has various options available to deploy a layered security approach.. This can lead to a better security stance when applied to the relevant data and/or applications.
System administrators can also improvise on their skills by adopting on to the SELinux and delegating the task of security of the critical information to SELinux.
Pros: Content is explained nicely.
          The 'Recipies' are adaptable, making it simpler to frame rules for files, users, applications & servers.
        
Cons: More Recipies on same topic would have been more better.
         
Overall, the SELinux CookBook is really good resource for system administrators to start deploying information security policies from file level straight upto user level.

Click here to go to the goodreads.com page to know more about the Book

#########################################################################################

Review for the book 'Mastering Kali Linux for Advanced Penetration Testing'
By Robert W Beggs.


Most of the professionals / security enthusiasts / Researchers are well-aware with the Penetration Testing
Platform - 'Kali Linux' which is  a newer version of the Backtrack Framework.
For a Security professional it is of utmost importance to know this platform, this book is a good resouce
for getting introduced to various tools and their working mechanics.
The author in this book has very well conveyed the a b c.... of the kali linux, including ups & downs of a penetration testing.

The follwing are the Pros & Cons I came across while reading this book:
Pros:
- Simplicity -  a novice user can just follow the chapters with the kali linux installed in the system, the screen shots
prove very much useful and decrease the initial learning curve on the topic.
- 'The attackers kill - chain' Explained Excellently. The phases of recon and information gathering, which are vital
for any successful attack are shown here quite nicely.
- An overview of most famous tools such as Nmap, Metasploit framework, recon-ng framework is given to help
readers know and explore these tools.
- Extra tools that can be used in every phase of the kill chain are shown that adds more fun to learning.
- Clear and simple understanding of the matters related to security.
- The part of 'exploit' & 'attack' is interesting and fun to learn.

Cons:
- Very little info on 'Maltego' is provided, expected some more on Maltego, so that more features and power of maltego
can be demonstrated.
- Info on some more tools could have been given.

To Sum up, this book can prove to be a very useful resource to anyone who is interested in information security / Penetration
Testing, Security Professional for sharpening their skills.  Also, for System Administrators / IT managers this book can benefit them as they will know the possible attack vectors
and patch them if they find before a 'Black Hat' does.

Overall Rating: 9/10
This book is worth buying.
Click here to go to the goodreads.com page to know more about the Book