Beyond The Literary-Industrial Complex: Using The Amazon Kindle And Other New Technologies To Unleash An Indie Movement Of Readers & Writers Review

Beyond The Literary-Industrial Complex: Using The Amazon Kindle And Other New Technologies To Unleash An Indie Movement Of Readers and Writers
Average Reviews:

(More customer reviews)
As a Kindle author, with three novels available and others in progress, I found Stephen Windwalker's work invaluable. This, and the companion work on marketing to Kindle readership, have provided great support and keen insight on preparing my work to better leverage colophon and copyright issues. The step-by-step support on the publishing process answered many questions that were not present on the Digital Text Platform site. If you plan to publish a Kindle book, or already have one, check out these easy to follow tips (20 of them). I'm delighted that there are more Windwalker tips in progress. It's great to have his works at my back.

Click Here to see more reviews about: Beyond The Literary-Industrial Complex: Using The Amazon Kindle And Other New Technologies To Unleash An Indie Movement Of Readers & Writers

Find out why you need a publisher ... like a fish needs a bicycle. Here's the book that is helping thousands of authors to unleash a 21st-century indie movement of writers and readers, by the #1 selling author in the Amazon Kindle bookstore. Elegantly combining mission and manual, Windwalker narrates the end of the old world of publishing due to the failure of major publishers to serve either readers or authors, issues a compelling call for change, and guides authors and independent publishers through the steps that will allow them to succeed and to connect with discerning readers, in the fast-changing publishing world made possible by new technologies such as Amazon's Kindle and CreateSpace. Also includes: * A STEP-BY-STEP APPROACH TO PUBLISHING A KINDLE EDITION OF YOUR BOOK OR DOCUMENT* PUBLISHING YOUR FICTION ON THE KINDLE PLATFORM* PUBLISHING PERIODICALS FOR THE AMAZON KINDLE* START EARNING A LIVING TODAY WRITING ARTICLES FOR THE KINDLE

Buy Now

Click here for more information about Beyond The Literary-Industrial Complex: Using The Amazon Kindle And Other New Technologies To Unleash An Indie Movement Of Readers & Writers

Read More...

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research Review

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Average Reviews:

(More customer reviews)
I'm going to take a harsh stance on this book, mostly because this book had potential to really build upon all the information publicly available for Metasploit and really make a great book on Metasploit internals and advanced usage. Instead it seems like current public/free information was just rehashed and new information not updated for the 3.x branch of MSF.
What I consider the "meat" of this book, and what should have made this a 4 or 5 star book, covers the Metasploit Framework 2.x branch and NOT the current 3.x branch. By "meat" I mean the case studies covering exploitation using MSF. The major difference between the two is that 2.x was written in Perl and 3.x in Ruby. To be fair the first 5 chapters cover using MSF 3.x, but I really didn't feel they covered much, if anything, that's not out on the net with the exception of Chapter 5 (Adding new Payloads). "Using" Metasploit has been covered a million times in a million other books. A book specifically on Metasploit should have covered things not covered in every other hacking book.
Chapter 1 is an "Introduction to Metasploit." If you haven't ever used the tool and didn't want to RTFM, then "maybe" it would be useful for you. Most of the material I felt could be found on the Metasploit main support page, the wiki, or via google, but mostly the first two. I'm also not sure why there are pages and pages of current payloads and exploits with no explanations as to why I would use one type of payload versus another especially for the obscure ones like find tag or ordinal payloads. Doing a "show exploits" or "show payloads" without dialogue on the differences adds little value. The Leveraging Metasploit on Penetration Tests section is one paragraph :-(
Chapter 2 is "Architecture, Environment, and Installation." There are 2-3 pages on locking down a system. Why is that included? Very random. Let me cover the installation covered in the book for you. Windows, double click the executable. *nix, download via svn. That's about the level of detail we get...sigh :-(
Chapter 3 is a whopping 7 pages including the FAQ section on "Metasploit Framework and Advanced Environment Configurations." That chapter covers what is in the directories of your msf installation and using the setg command.
Chapter 4 is "Advanced Payload and Add-on Modules." Covers some old information on meterpreter and some meterpreter basics, the stuff on the net covers it in far more detail. Decent coverage of the VNC Inject payload, crappy coverage of the PassiveX payload, ok coverage of auxiliary modules and a mention of db autopwn.
Chapter 5 is "Adding New Payloads." Chapter 5 is the best chapter in the book because it discusses something...here it goes...NEW! and related to MSF 3.x. Chapter 5 is an excellent chapter walking us thru building a SIP Invite spoofer auxiliary module. Had the whole book been of this caliber it would have been a 5 star book.
The case studies should have been rewritten to work with MSF 3.x, they are all for 2.x. They are good and contain the required detail (but I didn't not work through all the examples yet) Things are similar between the branches and you can probably muddle through the conversions but it makes no sense for the first half of the book to be about 3.x and the meat to be about 2.x. At a minimum a chapter or section on converting exploits from 2.x to 3.x was in order, but was not included.
I didn't find Appendix B, "Building a Test Lab for Penetration Testing" to be all that helpful either. I think it's a reprint from Penetration Tester's Open Source Toolkit v2, but can't confirm because I don't have that book.


Click Here to see more reviews about: Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code.This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an exploitation platform. With a solid understanding of MSF's capabilities, the book then details techniques for dramatically reducing the amount of time required for developing functional exploits.By working through a real-world vulnerabilities against popular closed source applications, the reader will learn how to use the tools and MSF to quickly build reliable attacks as standalone exploits. The section will also explain how to integrate an exploit directly into the Metasploit Framework by providing a line-by-line analysis of an integrated exploit module. Details as to how the Metasploit engine drives the behind-the-scenes exploitation process will be covered, and along the way the reader will come to understand the advantages of exploitation frameworks. The final section of the book examines the Meterpreter payload system and teaches readers to develop completely new extensions that will integrate fluidly with the Metasploit Framework. A November 2004 survey conducted by "CSO Magazine" stated that 42% of chief security officers considered penetration testing to be a security priority for their organizations The Metasploit Framework is the most popular open source exploit platform, and there are no competing books The book's companion Web site offers all of the working code and exploits contained within the book

Buy Now

Click here for more information about Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Read More...

Quantum SEO Solutions: Guide to Marketing Your Business Online Review

Quantum SEO Solutions: Guide to Marketing Your Business Online
Average Reviews:

(More customer reviews)
I've been working with Curtis Chappell for the past seven months to both improve the traffic to my website and increase the sales of my books.
Since engaging Quantum SEO Solutions to conduct an analysis of the on-page SEO and the purchasing process on the site, the traffic to my website has increased by over 1000% and my book sales have doubled!
This book walks you through the process of developing an internet marketing plan, and gives you several options to consider when implementing the plan.
If you cannot work directly with Quantum SEO Solutions, then this book is the next best thing!
Paul Harris
Director
Eastwood Harris Pty Ltd
Quantum SEO Solutions: Guide to Marketing Your Business Online

Click Here to see more reviews about: Quantum SEO Solutions: Guide to Marketing Your Business Online

Curtis Chappell coaches local business owners on how to tap into the power of the Internet to find more new customers and create a more profitable business.Learn how to become the #1 authority online in your market by following this 5-point plan for online market domination:* Search Engines - Get Listed in the Big 3 (Google, Yahoo, Bing)* Dominate - Your site appears in local, natural and paid search results* Move -Up - Dominate the search engines by making your site search engine friendly* Lead the Pack - Use videos, press releases, articles, social content sites, online classifieds, online business directories, and online review sites to make the search engine articles fall in love with your site.* Your Phone Rings Off the Hook - Your customers can find you - and you see the results in your increased profitability.Quantum SEO Solutions: Guide to Marketing Your Business Online is essential reading for any business owner who wants to understand how to use the internet to leverage their business online.Take control of your internet marketing and start building an online business profile that will both make you more money and give you a less stressful lifestyle!Get Your Business Found Faster!

Buy Now

Click here for more information about Quantum SEO Solutions: Guide to Marketing Your Business Online

Read More...

MacBook Pro Portable Genius Review

MacBook Pro Portable Genius
Average Reviews:

(More customer reviews)
I am a recent convert to the MAC and although I would never go back to a PC the change over left me with a lot of questions that no one seemed to be able to answer. I tried the Apple store,but they were always putting you on hold; I tried Macbook for dummies but I felt as dumb after as I did before. My salvation came in the form of the "Portable genius" by Brad Miser. It is as easy read and answers all of the questions that you don't know to ask. I highly recommend it for anyone using a Mac!
Bob Peiffer

Click Here to see more reviews about: MacBook Pro Portable Genius

You have the world's top-of-line laptop, and now you want to know how to get the most from it. MacBook Pro Portable Genius is here to give you the best tips and tricks for taking your MacBook Pro to its full potential. Learn to add more data storage, set up a network, communicate effectively with iChat, run Windows applications on Leopard, and more. With full-color images and insider secrets, the MacBook Pro Portable Genius is your essential guide to getting the most from your state of the art laptop.

Buy Now

Click here for more information about MacBook Pro Portable Genius

Read More...

Blog Power and Social Media Handbook (Volume 2) Review

Blog Power and Social Media Handbook (Volume 2)
Average Reviews:

(More customer reviews)
I'm the first to admit that I've come late to the social media party but I don't to have to wade through chapters and chapters of info just to figure out what I *need* to know about blogging, Facebook, and Twitter. Gallagher's book is simple, straightforward, and practical, and helped me write more effective blog posts, and more re-Tweetable content on Twitter. Today everyone in business needs to know how to use social media effectively (even if you don't really care about it) and this book spells it out even for techno-phobes. I'll be relying on her easy-to-read and easy-to-implement advice in the future.

Click Here to see more reviews about: Blog Power and Social Media Handbook (Volume 2)

Blogs are here to stay. There are over 100 million of them in use. Social networking and social media have transformed communication today. "Blog Power andSocial Media Handbook" helps you learn where it began, what it does, and the steps you need to get on-board.

Buy Now

Click here for more information about Blog Power and Social Media Handbook (Volume 2)

Read More...

Middle-Class Lifeboat: Careers and Life Choices for Navigating a Changing Economy Review

Middle-Class Lifeboat: Careers and Life Choices for Navigating a Changing Economy
Average Reviews:

(More customer reviews)
I bought this because I'm extremely worried about my career in this economy. (I'm a Hair Salon Owner and a Stylist) I've been doing this for a long time and I love it. But we have been hit by this economy so hard that I thought I would get this book to prepare for hard times. Get a 2nd job. Most of the Careers listed aren't safe or feasable. I have a Massage Therapist working for me and also network with 5 others and they are taking 2nd and 3rd jobs to even bring home any money. This is a luxury for people right now. Mobile services! Again, most people can't afford a Personal Shopper; an Errand Service. Cleaning Services are being cut back when it is something you can do yourself. A few years ago, these were good, (just good) suggestions. Times have changed and people are looking for real ways to survive. I think they needed to update the information and really think about people that are living pay check to pay check. Most of these people are who we'd be marketing to. If they are living pay check to pay check then a massage, a haircut, personal shoppers, errand services, personal chefs, cleaning services, interior decorating, etc. will not be their sweet spot. They are going to buy the necessities and that is about it. I would do your own research, because this info is too old to deal with these economic conditions.

Click Here to see more reviews about: Middle-Class Lifeboat: Careers and Life Choices for Navigating a Changing Economy


A comprehensive guide to safeguard your livelihood, income, and standard of living through the ups and downs of any economy.

Most Americans, no matter what their economic circumstances, identify themselves as middle class. A recent Gallup poll showed that 63% consider themselves upper-middle or middle class. And they are feeling burned out and squeezed, under pressure to bring home more and more money just to maintain their standard of living. Middle Class Lifeboat is an answer to that pressure, a comprehensive guide to living a more stress-free lifestyle.

Part I: Safeguarding Your Livelihood: profiles the 53 best jobs to have to be self- sufficient whether the economy is up or down.
Part II: Safeguarding Your Income: 6 ways to extend your earnings, that don't always involve money.
Part III : Safeguarding Your Standard of Living: 10 off-the-grid lifestyle choices to increase your quality of life


Buy Now

Click here for more information about Middle-Class Lifeboat: Careers and Life Choices for Navigating a Changing Economy

Read More...

Phishing: Cutting the Identity Theft Line Review

Phishing: Cutting the Identity Theft Line
Average Reviews:

(More customer reviews)
Phishing is the scourge of the internet right now. Rachael Lininger and Russell Dean Vines have done a pretty good job in helping individuals and companies understand the problem with their book Phishing - Cutting The Identity Theft Line (Wiley).
Chapter List: Phishing for Phun and Profit; Bait and Switch: Phishing Emails; False Fronts: Phishing Websites; Are You Owned: Understanding Phishing Spyware; Gloom and Doom: You Can't Stop Phishing Completely; Helping Your Organization Avoid Phishing; Fighting Back: How Your Organization Can Respond To Attack; Avoiding the Hook: Consumer Education; Help! I'm a Phish! Consumer Response; Glossary of Phishing-Related Terms; Useful Websites; Identity Theft Affidavit; Index
It used to be I'd see one or two "requests" a week to update my personal information for places like eBay or Citibank. Now it's closer to two or three a day. I'm well aware that these phishing attempts are scams meant to commit identity theft, but apparently we internet-savvy people are in the minority. Lininger and Vines have written a very readable and understandable guide to phishing that can easily be given to nearly anyone to help them protect themselves. The uninitiated will quickly grasp the idea that they shouldn't be responding to emails like these, and as a result they'll be much safer. People who are internet-savvy will learn the tricks that are used by the phishers to make links appear to be something other than what they truly are. Even organizations can benefit from the chapters on what they should do if they find that their servers have been co-opted to run a phishing scam.
Very practical material with the benefit of being a book that's fun to read. This is information that needs to be in the hands of all internet users these days...

Click Here to see more reviews about: Phishing: Cutting the Identity Theft Line

"Phishing" is the hot new identity theft scam. An unsuspecting victim receives an e-mail that seems to come from a bank or other financial institution, and it contains a link to a Web site where s/he is asked to provide account details. The site looks legitimate, and 3 to 5 percent of people who receive the e-mail go on to surrender their information-to crooks. One e-mail monitoring organization reported 2.3 billion phishing messages in February 2004 alone.
If that weren't enough, the crooks have expanded their operations to include malicious code that steals identity information without the computer user's knowledge. Thousands of computers are compromised each day, and phishing code is increasingly becoming part of the standard exploits.Written by a phishing security expert at a top financial institution, this unique book helps IT professionals respond to phishing incidents. After describing in detail what goes into phishing expeditions, the author provides step-by-step directions for discouraging attacks and responding to those that have already happened.
In Phishing, Rachael Lininger:

Offers case studies that reveal the technical ins and outs of impressive phishing attacks.
Presents a step-by-step model for phishing prevention.
Explains how intrusion detection systems can help prevent phishers from attaining their goal-identity theft.
Delivers in-depth incident response techniques that can quickly shutdown phishing sites.


Buy Now

Click here for more information about Phishing: Cutting the Identity Theft Line

Read More...