Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation |
The Passionate Programmer: Creating a Remarkable Career in Software Development |
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence |
Design Patterns - Erich Gamma
- Ralph Johnson
- John Vlissides
- Richard Helm
|
How to Avoid a Climate Disaster |
|
Code Craft: The Practice of Writing Excellent Code |
|
|
|
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto |
|
|
Malware Analyst's Cookbook and DVD - Michael Ligh
- Steven Adair
- Blake Hartstein
- Matthew Richard
|
The Grand Design - Stephen Hawking
- Leonard Mlodinow
|
Learn you some Erlang for great good! |
PMP Project Management Professional Exam Study Guide: 2021 Exam Update |
PMP Project Management Professional Practice Tests: 2021 Exam Update - Kim Heldman
- Vanina Mangano
|
Clojure for the Brave and True |
The art of electronics - Paul Horowitz
- Winfield Hill
|
|
|
Les Misérables - Victor Hugo
- Isabel Florence Hapgood (Translator)
|
Pragmatic Thinking and Learning: Refactor Your Wetware |
Multithreaded JavaScript: Concurrency Beyond the Event Loop - II Thomas Hunter
- Bryan English
|
The Art of 64-Bit Assembly, Volume 1 |
|
|
|
C++ Software Design C++ Software Design: Design Principles and Patterns for High-Quality Software |
The Innovators: How a Group of Hackers, Geniuses and Geeks Created the Digital Revolution |
How Games Move Us: Emotion by Design |
Trudeau: The Education of a Prime Minister |
Why People Die by Suicide |
Codename Revolution: The Nintendo Wii Platform - Steven E. Jones
- George K. Thiruvathukal
|
How Computers Really Work |
|
The Art of Failure : An Essay on the Pain of Playing Video Games |
|
The Future of the Mind: The Scientific Quest to Understand, Enhance, and Empower the Mind |
The Future of Humanity The Future of Humanity: Terraforming Mars, Interstellar Travel, Immortality, and Our Destiny Beyond |
|
A Play of Bodies: How We Perceive Videogames |
Kali Linux Penetration Testing Bible |
Weshalb Sie kein Buddhist sind - Dzongsar Jamyang Khyentse
|
The Rust Programming Language |
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems |
|
Designing Secure Software: A Guide for Developers |
Data Structures the Fun Way: An Amusing Adventure with Coffee-Filled Examples |
|
Programming Android with Kotlin: Achieving Structured Concurrency with Coroutines - Pierre-Olivier Laurence
- Amanda Hinchman-Dominguez
- Mike Dunn
- G. Meike
|
|
The Art of Memory Forensics - Michael Hale Ligh
- Andrew Case
- Jamie Levy
- AAron Walters
|
|
C++ Crash Course: A Fast-Paced Introduction |
|
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life |
|
Agile Principles, Patterns, and Practices in C# - Robert C. Martin
- Micah Martin
|
Clean Code: A Handbook of Agile Software Craftsmanship |
Clean Architecture: A Craftsman's Guide to Software Structure and Design |
Rest API Design Rulebook: Designing Consistent Restful Web Service Interfaces |
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats - Alex Matrosov
- Eugene Rodionov
- Sergey Bratus
|
Python Crash Course, 2nd Edition |
Dive Into Systems: A Gentle Introduction to Computer Systems - Suzanne J Matthews
- Tia Newhall
- Kevin C. Webb
|
|
Cyberjutsu: Cybersecurity for the Modern Ninja |
|
Web Security for Developers |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers - Kevin D. Mitnick
- William L. Simon
|
The Art of Deception - Kevin D. Mitnick
- William L. Simon
|
|
How To: Absurd Scientific Advice for Common Real-World Problems |
The Art of Software Testing |
Atari Age: The Emergence of Video Games in America |
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools |
Learning PHP, MySQL, JavaScript, and CSS: A Step-by-Step Guide to Creating Dynamic Websites |
|
Developer's Dilemma: The Secret World of Videogame Creators |
Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy |
Beautiful Code - Jon L. Bentley
- Brian W. Kernighan
- Charles Petzold
- Douglas Crockford
- Henry S. Warren Jr.
- Ashish Gulhati
- Lincoln Stein
- Jim Kent
- Jack Dongarra
- Poitr Luszczek
- Adam Kolawa
- Greg Kroah-Hartman
- Diomidis Spinellis
- Andrew Kuchling
- Travis E. Oliphant
- Ronald Mak
- Rogério Atem de Carvalho
- Rafael Monnerat
- Bryan Cantrill
- Jeffrey Dean
- Sanjay Ghemawat
- Simon Peyton Jones
- R. Kent Dybuig
- William R. Otte
- Douglas C. Schmidt
- Andrew Patzer
- Karl Fogel
- Tim Bray
- Elliotte Rusty Harold
- Michael C. Feathers
- Alberto Savoia
|
Cybersecurity Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity |
|
|
|
|
Communities of Play Communities of Play: Emergent Cultures in Multiplayer Games and Virtual Worlds |
Test-Driven Development with Python: Obey the Testing Goat: Using Django, Selenium, and JavaScript |
|
|
Game Wizards: The Epic Battle for Dungeons & Dragons |
|
AWS Certified Solutions Architect Study Guide with Online Labs: Associate SAA-C02 Exam |
CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies: Exam 350-401 |
Introduction to Computer Organization: An Under the Hood Look at Hardware and x86-64 Assembly |
|
|
|
Cybersecurity and Third-Party Risk: Third Party Threat Hunting |