Jack D. Herrington

"engineer and author"
(REAL NAME)
 
Helpful votes received on reviews: 100% (26 of 26)
Location: Silicon Valley, CA
Anniversary: June 13
Birthday: July 18
In My Own Words:
You can keep up with Jack's work and his writing at http://jackherrington.com.

Jack Herrington is an engineer, author and presenter who lives and works in the Bay Area. His mission is to expose his fellow engineers to new technologies. That covers a broad spectrum, from demonstrating programs that write other programs in the book Code Generation in Action. Providing techniques for building custom… Read more

Interests
Flex, Ajax, PHP, ASP.NET, Rails, Ruby
 

Reviews

Top Reviewer Ranking: 372,501 - Total Helpful Votes: 26 of 26
Service-Oriented Architecture: A Field Guide to In&hellip by Thomas Erl
If you think about the software development world as architects and engineers. Where architects take a very high level view of the world and don't get into fine grained implementation details. Then if you consider yourself this kind of architect, you will get a lot out of this book.
Though the book is fairly long (~500 pages) the depth of the content is still at the 'field guide' level. This means that the book focuses more on understanding the components of SOA at a holistic level without getting too deep into implementation details.
The first chapter of the book does delve into the basics of the XML core technologies (XML, XML validation, XSL, etc.). After that the book stays at… Read more
Know Your Enemy: Learning about Security Threats (&hellip by Honeynet Project  The
This is a fascinating read about how understanding hacking, from gathering the data, to the forensic analysis. The second part, on the forensic analysis is very detailed and well written.
The root idea is very simple, put an attractive target on the Internet, wait until it's hacked (and it will be), and then analyze the attack. The first part of the book covers the construction of these attractive 'honeypots'. The second part covers how to analyze the inevitable attack. The third part, which is the most high level, is about the culture of hacking and hackers.
I would recommend this book to anyone involved in securing systems on the open internet who has a good understanding of the… Read more
Defend I.T.: Security by Example by Ajay Gupta
This is not a book for the technically feint of heart. It starts out with almost no introduction at all into mapping target networks with nmap and never stops for a breath. There is a reasonable amount of explanation, but the heart of the book is in demonstrating hacking techniques at the system and command line level. Graphics are used well to smooth over some of the more difficult topics, which is why I gave the book four stars.
The majority of the book, the first four parts, is dedicated to a command level explanation of various types of exploits, largely in the Unix environment. The last part of the book covers the social and legal aspects of hacking and the security response to… Read more