Cover V05, I05
Article

may96.tar


Books: A User's Report

Elizabeth Zinkann

This month I reviewed an employment book utilizing the Internet, a Perl quick reference guide, an Internet security book, an Internet file format book, and a Windows 95 help book. Specifically, I enjoyed Hook Up, Get Hired by Joyce Lain Kennedy (John Wiley & Sons, Inc.), Perl 5 Desktop Reference by Johan Vromans (O'Reilly & Associates, Inc.), Actually Useful Internet Security Measures by Larry J. Hughes, Jr. (New Riders), Internet File Formats by Tim Kientzle (Coriolis Group Books), and The Windows 95 Bug Collection by Bruce Brown (Addison-Wesley). I also reviewed The IBM Dictionary of Computing on Disk from McGraw-Hill.

Hook Up, Get Hired! The Internet Job Search Revolution
by Joyce Lain Kennedy
John Wiley & Sons, Inc.
ISBN 0-471-11630-0
$12.95

The immense resource capabilities and the current popularity of the Internet make it an ideal tool for both employers and job seekers. Unlike printed classifieds, which change weekly, employment opportunities displayed online are updated as soon as a notice is submitted or withdrawn. Even the printed media utilizes the convenience of online access. CareerPath, a new service, features job listings from The Washington Post, San Jose Mercury News, Chicago Tribune, The New York Times, Los Angeles Times, and The Boston Globe. (CareerPath can be reached at http://www.careerpath.com.) For experienced computer users, the evolution of the Internet or commercial online service to a search utility is not surprising. However, the novice may experience some trepidation in using the information or in accessing it.

Joyce Lain Kennedy, a syndicated career columnist, addresses the questions, fears, and apprehension of both new and experienced users. She begins with an overview, detailing the role of the Internet in today's employment market. One of the most common misconceptions relates to locale; since the Internet is a vast network, any job discovered through a newsgroup or bulletin board service (BBS) must be in a different region. This is a common misrepresentation, because most positions discovered in this way are actually local. Realizing that most readers may skeptically approach this online search idea, the author describes some true experiences and also some examples of online junk ads. The user should recognize a legitimate offer versus one that appears too good to be true. ("Earn $50,000 an hour from the comfort of your own home !" I admit I exaggerated the actual offer.) Kennedy explains the different Internet resources (i.e., bulletin boards, newsgroups, discussion lists, and the various Internet utilities, including Gopher, telnet, and the World Wide Web), and also demonstrates how to use each tool.

The fourth chapter features sites that list job offerings, including temporary, permanent, full-time, part-time, and contract options. Kennedy discusses the choices of the commercial online services: America Online, CompuServe, Delphi, GEnie, and Prodigy. She also discusses how to access a BBS (Bulletin Board System) and details some of the best ones for job opportunities in three diverse groups: the private sector, technical, and federal. The author similarly examines newsgroups, mailing lists, telnet, and the World Wide Web. In addition to the online resources that list available jobs, several other options exist for the user: posting a resume, contacting employment consultants, and professional societies and trade organizations. Kennedy also addresses small business and marketing concerns, which hardware and software the user needs, some guidelines for online resumes, autopilots, and some organizational considerations. The Appendix itemizes online and offline references: books, publications, software, and the InterNIC (Internet Network Information Center) organization. She also includes a glossary to aid the reader with the Internet's many acronyms.

Hook Up, Get Hired! introduces an accepted practice to a new medium. Not too long ago, resumes were always typed or typeset, with careful attention to the color and weight of the paper. Now, the paper often belongs to the employer (whether by printer or fax machine) and the resume exists in cyberspace. The rules for writing resumes have changed as well as the formatting.

Kennedy, an established newspaper columnist and book author, provides a well-written guide for the job seeker. She uses interviews to illustrate online experiences and furnishes "NetNotes" throughout the book to assist the novice Internet traveler. This is a superb book, documenting new rules for existing techniques. No employer or job seeker should be without it.

Perl 5 Desktop Reference
by Johan Vromans
O'Reilly & Associates, Inc.
ISBN 1-56592-187-9
$6.95

Since its debut approximately 10 years ago, Perl (Practical Extraction and Report Language) has been preferred by the UNIX community as a superior programming utility. Whether it augments or replaces the shell programming language, both users and administrators appreciate Perl's scope and syntax.

With the popularity explosion of the Internet, World Wide Web programmers have also recognized Perl's advantages and rapidly applied it to CGI (Common Gateway Interface) scripts. The original Perl book, Programming Perl by Larry Wall and Randal L. Schwartz, defined the Perl language and its applications. This new little booklet, by Vromans, provides the user with a quick reference to Perl's syntax and features. It contains the commands and options for the language, including literals, variables, operators, statements, functions, regular expressions, and networking.

Vromans furnishes a complete resource in a pocket reference size. (Perl 5 Desktop Reference is approximately the same size as Smileys by David W. Sanderson and Dale Dougherty.) This book should be on every UNIX and Internet programmer's and administrator's desktop.

Actually Useful Internet Security Measures
by Larry J. Hughes, Jr.
New Riders
ISBN 1-56205-508-9
$32.00

Stories of intruders invading Internet systems accompany almost every Internet history. New reports appear almost daily. The weaknesses of the Internet are not only generally known, but are also specifically detailed. Yet, break-ins continue to occur. In the introduction to Actually Useful Internet Security Techniques, Hughes briefly recounts his own experience with invaders from cyberspace. Through the pursuit of his trespassers, the author researched several different security concepts and tools. In this book, Hughes not only presents these ideas and applications to system and network administrators, but also to the general Internet user.

Under ordinary circumstances, everyone recognizes security and how to practice it, whether it is locking doors, or double-checking the lights. However, as soon as the modem connects the user's personal computer to an online service or the Internet, security concerns fade into the background. Because most users access the Internet from familiar and usually secure surroundings, it is easy for the the user to feel completely protected and safe. Unfortunately, this is not the case. To educate the user, Hughes begins with The Foundations of Internet Security and defines the essential concepts: authentication, access control, integrity, and confidentiality. He examines the OSI (Open Systems Interconnection) Reference Model and the Internet TCP/IP (Transmission Control Protocol/Internet Protocol) Model. A basic understanding of the transmission process illustrates its most vulnerable segments.

Electronic mail (email) remains the most popular service of the Internet, but the idea that someone else could possible read your messages and perhaps alter them is disturbing, to say the least. Two of the basic tenets of security, data confidentiality and integrity, protect email. Hughes addresses these issues and discusses the practices of cryptology, including cryptography and cryptanalysis. He explains encryption, ciphers, hash functions, public-key cryptosystems, and some familiar algorithms. The following chapters define authentication, its features, techniques, uses, and the Kerberos authentication system. Part II, Communications and Data-Sharing Applications, evaluates Messaging Mail and News, Virtual Terminal Services, File Sharing, and The X Window System. The author examines the potential security risks associated with each topic and available solutions.

In the third section, Firewalls and Web Security, Hughes discusses World Wide Web Security, An Overview of SATAN, Network Security Issues, and Actually Useful Security Tools. The World Wide Web Security chapter illustrates common mistakes and security considerations connected with the NCSA (National Center for Supercomputer Applications) HyperText Transfer Protocol Daemon (httpd). An Overview of SATAN details the Security Administration Tool for Analyzing Networks (SATAN) developed by Dan Farmer and Wierse Venema. SATAN provides security auditors and network and system administrators with a tool that scans systems for possible security weaknesses. Hughes outlines its uses, configuration, instructions, and vulnerabilities. Network Security Issues examines authentication, integrity, confidentiality, and access control relative to the Internet's network, transport, and application protocol layers. The concluding chapter, Actually Useful Security Tools, lists the utilities available on the Internet, their locations, and descriptions according to their specific topics. Part IV includes the Appendices, Security-Related Organizations and Usenet Newsgroups as well as a Glossary, Bibligraphy, and the Index.

Actually Useful Internet Security Techniques is an outstanding book, debuting at an opportune time. Hughes not only demonstrates the problems, but also presents possible solutions and where to obtain the numerous utilities. This book provides an introduction to security measures for the user, a practical reference for the administrator, and a complement to the more technical security books. Actually Useful Internet Security Techniques is a valuable resource for every user and administrator on the Internet.

Internet File Formats
by Tim Kientzle
Coriolis Group Books
ISBN 1-883577-56-X
$39.99
CD-ROM Included

The popularity of the Internet often can be linked to the speed and convenience of email and the immense amount of resources that a user can access. However, when a user downloads a desired file, he or she is often confused by its format and frustrated by attempts to open it. Internet File Formats addresses this problem for PC, Macintosh, and UNIX platforms.

Kientzle divides the formats into six basic sections: text and document, graphics, compression and archiving, encoding, sound, and movie formats. The introductory chapters recount the history of different formats on the Internet and the evolution of standards. They also address the problems of identifying specific formats and describe helpful file format resources available on the Internet. Each individual chapter features a description of the format, relevant instructions, and tells when to use it. The first page of each chapter encapsulates the important information in boxed outline format (names, extensions, use, the author's reference, and any utilities presented on the accompanying CD-ROM.) Kientzle discusses approximately 100 different extensions, detailing how each works and giving specific information regarding the particular type of format. Chapters on document formats may include a primer with syntax information, how to generate paragraphs, text styles, tables, headings, and more. In contrast, graphic formats chapters indicate how to recognize and utilize a specific format as well as when to use it. Kientzle examines all of the most popular formats plus many of the lesser known ones. The Appendices feature the following additional topics: About the CD-ROM, About Files, About File Formats, About Transferring Files, and A Binary Dump Program. The accompanying CD-ROM provides shareware for conversion, transferring, compressing, decompressing, creating, and viewing assorted types of files for PC, Macintosh, and UNIX workstations.

Internet File Formats presents practical instruction, programs, and answers for the Internet user. It is clearly written and easily understood. The concepts of varied file formats, when one format is preferable over another, and the principles of compression, archiving, and encoding are reasonably explained. Kientzle displays his extensive knowledge as he presents the advantages and disadvantages of each format. Every Internet user should read (and reference) this superb book.

The Windows 95 Bug Collection
by Bruce Brown
Addison-Wesley
ISBN 0-201-48995-3
$14.95

Windows 95 is the most recent Windows upgrade, and depending on the current PC hardware and software used, installation of it may or may not cause problems. To make the transition from Windows 3.1 to Windows 95 easier, Bruce Brown, editor and publisher of BugNet has assembled a list of the known bugs in Windows 95 and solutions to these problems.

If the reader has not installed Windows 95, but intends to upgrade in the near future, it is important to remember that the success rate for installation without major difficulty is 95% percent. This book addresses the various problems and compatibility questions with different hardware and software products. Brown includes eight major topics, their identified problems, and workaround solutions: installation, utilities, hardware, communcations, games, publishing, working with numbers, and Windows 95 itself. The beginning categories need no explanation, but the last (working with numbers) details problems primarily discovered in the different spreadsheet, accounting, and database applications and how to avoid them. Windows 95 Itself examines the idiosyncrasies of the upgrade with basic commands that the user previously employed in Windows 3.1.

The Windows 95 Bug Collection features a simple way to escape unnecessary stress and avoid headaches. The bugs have been documented and reproduced, and the provided solutions work. Brown introduces each section with a brief (three to four page) description of the errors addressed in that section. He also includes the Bug/Fix Success Rates for the specific topic, the section's Biggest Problem, and its Biggest Surprise. The individual problems and workarounds follow the introduction. The first page of each error/solution segment displays a footnote with the Bug and Fix List Legend so the reader does not have to keep checking the book's preface to determine a symbol's interpretation. The number of possible conflicts is amazing; the accompanying solutions are comforting. Brown has furnished the user and administrator with an expert tool for installing and configuring Windows 95. Administrators and users will appreciate The Windows 95 Bug Collection and use it often. It is a practical and effective book.

IBM Dictionary of Computing on Disk
McGraw-Hill
ISBN 0-07-852800-3
$34.95

Most computing professionals do not know the meaning of every acronym at the first or even the second glance. They may be able to deduce the definition by the context of the sentence, but sometimes even that is doubtful. The best computer professionals know where to look for the information, and a computing dictionary is usually the first place to check. However, due to the rapid changes in the computer industry and its terminology, a current dictionary is almost impossible to maintain.

The IBM Dictionary of Computing on Disk can solve that problem. It includes the basic dictionary and updates as needed, so the user can possess the most up-to-date reference possible. The four disks include both DOS and Windows versions of the software. Both utilize multiple search choices. The user can seek a term using a menu, a term search, a "sounds like" phonetic search, or an alphabetic search. Once the word or phrase is accessed, the user can find other definitions by browsing sequentially or by limiting the dictionary to the results of the initial search. He or she can copy the information to a word processing program or Windows clipboard, notebook, or write program. Choosing a search by definition will identify the occurrences within the selected text.

I implemented this as a Windows program and quickly learned a few minor techniques, such as clearing the search screen between two separate searches. (One search endeavored to find world + wide + web + Backus + Naur + Java. Surprisingly, there was no match.) The menu approach took longer than the other search procedures (which was due to the input method). However, the retrieved data was correct and detailed a low-level hardware approach. I discovered some specific Internet terms missing. However, some of the Internet terms I originally couldn't find appeared under their full names (HyperText was there; HTML was not.) The other absent definitions are very recent terms. This software dictionary contains 18,000 technical entries and remains a worthwhile product for anyone requiring precise technical jargon. The IBM Dictionary of Computing was originally designed for the use of IBM staff and is also compatible with the OS/2 operating system.

About the Author

Elizabeth Zinkann has been involved in the UNIX and C environment for the past 11 years. She is currently a UNIX and C consultant, and one of her specialties is UNIX education. In addition to her computer science background, she also has a degree in English. Elizabeth can be reached via America Online (ezinkann@aol.com).