Last active
January 11, 2022 16:11
-
-
Save hvalls/d0e97169a08ef319369d09f253b6a7a8 to your computer and use it in GitHub Desktop.
My books
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ | |
{ | |
"title": "Zero Trust Networks: Building Secure Systems in Untrusted Networks", | |
"authors": "Evan Gilman, Doug Barth", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51FEu6AhMfL._SX379_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Zero-Trust-Networks-Building-Untrusted/dp/1491962194/" | |
}, | |
{ | |
"title": "Defensive Security Handbook: Best Practices for Securing Infrastructure", | |
"authors": "Lee Brotherston, Amanda Berlin", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51v0xZ-vJ4L._SX379_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Defensive-Security-Handbook-Practices-Infrastructure/dp/1491960388" | |
}, | |
{ | |
"title": "Agile Application Security: Enabling Security in a Continuous Delivery Pipeline", | |
"authors": "Laura Bell, Michael Brunton-Spall, Rich Smith, Jim Bird", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51+JBwXj8-L._SX379_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Agile-Application-Security-Enabling-Continuous/dp/1491938846" | |
}, | |
{ | |
"title": "Container Security: Fundamental Technology Concepts that Protect Containerized Applications", | |
"authors": "Liz Rice", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/41FyAvI2kbS._SX379_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Container-Security-Fundamental-Containerized-Applications/dp/1492056707/" | |
}, | |
{ | |
"title": "Practical Cloud Security: A Guide for Secure Design and Deployment", | |
"authors": "Chris Dotson", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51Cwg-pWwRL._SX379_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Practical-Cloud-Security-Secure-Deployment/dp/1492037516/ref=sr_1_1?" | |
}, | |
{ | |
"title": "The Software Architect Elevator: Redefining the Architect's Role in the Digital Enterprise", | |
"authors": "Gregor Hohpe", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/41pzCtPf7bL._SX331_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Software-Architect-Elevator-Redefining-Architects/dp/1492077542/" | |
}, | |
{ | |
"title": "Chaos Engineering: System Resiliency in Practice", | |
"authors": "Casey Rosenthal, Nora Jones", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51CDn9I5owL._SX379_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Chaos-Engineering-System-Resiliency-Practice/dp/1492043869/" | |
}, | |
{ | |
"title": "Structured Design: Fundamentals of a Discipline of Computer Program and Systems Design", | |
"authors": "Edward Yourdon, Yourdon Press, Larry L. Constantine", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51KfsnDgpLL._SX379_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.es/gp/product/0138544719/ref=ppx_yo_dt_b_asin_title_o00_s00?ie=UTF8&psc=1" | |
}, | |
{ | |
"title": "Fundamentals of Software Architecture: An Engineering Approach", | |
"authors": "Mark Richards, Neal Ford", | |
"picture": "https://d2t3xdwbh1v8qy.cloudfront.net/content/B0849MPK73/resources/199411134", | |
"link": "https://www.amazon.es/Fundamentals-Software-Architecture-Comprehensive-Characteristics/dp/1492043451/ref=sr_1_1" | |
}, | |
{ | |
"title": "Refactoring: Improving the Design of Existing Code", | |
"authors": "Martin Fowler", | |
"picture": "https://m.media-amazon.com/images/I/41odjJlPgHL.jpg", | |
"link": "https://www.amazon.es/Refactoring-Improving-Existing-Addison-Wesley-Signature-ebook/dp/B07LCM8RG2/ref=sr_1_fkmr0_1" | |
}, | |
{ | |
"title": "Test Driven Development: By Example", | |
"authors": "Kent Beck", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/41pO5GqNtzL._SX396_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.es/Driven-Development-Example-Addison-Wesley-Signature/dp/0321146530/ref=sr_1_1" | |
}, | |
{ | |
"title": "Microservices Patterns", | |
"authors": "Chris Richardson", | |
"picture": "https://m.media-amazon.com/images/I/51hiIEt6UEL.jpg", | |
"link": "https://www.amazon.co.uk/Microservices-Patterns-Examples-Java/dp/B07ZFZQGSK/ref=sr_1_1" | |
}, | |
{ | |
"title": "Diseño Ágil con TDD", | |
"authors": "Carlos Blé", | |
"picture": "https://d2sofvawe08yqg.cloudfront.net/tdd-en-castellano/hero2x?1576861322", | |
"link": "https://leanpub.com/tdd-en-castellano" | |
}, | |
{ | |
"title": "Building Evolutionary Architectures", | |
"authors": "Neal Ford, Rebecca Parsons & Patrick Kua", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/61kAEC%2BouJL._SX379_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Building-Evolutionary-Architectures-Support-Constant-ebook/dp/B075RR1XVG/ref=sr_1_1" | |
}, | |
{ | |
"title": "Designing Data-Intensive Applications", | |
"authors": "Martin Kleppmann", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/514xvNk9rTL._SX379_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Designing-Data-Intensive-Applications-Reliable-Maintainable/dp/1449373321/ref=sr_1_1" | |
}, | |
{ | |
"title": "Release It! Design and Deploy Production-Ready Software", | |
"authors": "Michael T. Nygard", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/414CRjLjwgL._SX403_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Michael-T-Nygard/dp/1680502395/ref=sr_1_1?__mk_es_US=ÅMÅŽÕÑ&keywords=release+it&qid=1567771299&s=gateway&sr=8-1" | |
}, | |
{ | |
"title": "Developer Hegemony: The Future of Labor", | |
"authors": "Erik Dietrich", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/412JfuUztBL.jpg", | |
"link": "https://www.amazon.com/Developer-Hegemony-Future-Erik-Dietrich-ebook/dp/B0722H41SG" | |
}, | |
{ | |
"title": "The Phoenix Project", | |
"authors": "Gene Kim, Kevin Behr, George Spafford", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51A028BIc0L._SX331_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Phoenix-Project-DevOps-Helping-Business/dp/0988262509/ref=sr_1_1?ie=UTF8&qid=1497795649&sr=8-1&keywords=The+Phoenix+Project" | |
}, | |
{ | |
"title": "The DevOps Handbook", | |
"authors": "Gene Kim, Patrick Debois, John Willis", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51Z6uQ57ilL._SX324_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/DevOps-Handbook-World-Class-Reliability-Organizations/dp/1942788002/ref=sr_1_1?ie=UTF8&qid=1497795677&sr=8-1&keywords=The+DevOps+Handbook" | |
}, | |
{ | |
"title": "Continuous Delivery", | |
"authors": "Jez Humble, David Farley", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51NbiDn81NL._SX385_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Continuous-Delivery-Deployment-Automation-Addison-Wesley/dp/0321601912/ref=sr_1_1?ie=UTF8&qid=1497795706&sr=8-1&keywords=Continuous+Delivery%3A+Reliable+Software+Releases+Through+Build%2C+Test%2C+and+Deployment+Automation" | |
}, | |
{ | |
"title": "Building Microservices", | |
"authors": "Sam Newman", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51m85J4Zi9L._SX378_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Building-Microservices-Designing-Fine-Grained-Systems/dp/1491950358/ref=sr_1_1?ie=UTF8&qid=1497794971&sr=8-1&keywords=Building+Microservices" | |
}, | |
{ | |
"title": "Grokking Algorithms", | |
"authors": "Aditya Bhargava", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/61uUPXbhMxL._SX397_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Grokking-Algorithms-illustrated-programmers-curious/dp/1617292230/ref=sr_1_3?s=books&ie=UTF8&qid=1510522123&sr=1-3&keywords=grokking+algorithms" | |
}, | |
{ | |
"title": "Clean Architecture", | |
"authors": "Robert C. Martin", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/41BjtnvIUQL._SX382_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Clean-Architecture-Craftsmans-Software-Structure/dp/0134494164/ref=sr_1_2?s=books&ie=UTF8&qid=1510522179&sr=1-2" | |
}, | |
{ | |
"title": "The Site Reliability Workbook", | |
"authors": "Betsy Beyer, Nial Richard Murphy, David Rensin, Kent Kawahara, Stephen Thorne", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51Cf8P7WTAL._SX379_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.co.uk/Site-Reliability-Workbook-Practical-Implement/dp/1492029505/" | |
}, | |
{ | |
"title": "Code Ahead: Volume 1", | |
"authors": "Yegor Bugayenko", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/41uDj9HcrDL._SX331_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.co.uk/Code-Ahead-1-Yegor-Bugayenko/dp/1982063742" | |
}, | |
{ | |
"title": "Spring in Action", | |
"authors": "Craig Walls", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51gHy16h5TL._SX397_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Spring-Action-Covers-4/dp/161729120X/ref=sr_1_1?ie=UTF8&qid=1497794651&sr=8-1&keywords=spring+in+action" | |
}, | |
{ | |
"title": "A Philosophy of Software Design", | |
"authors": "John Ousterhout ", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51om7fyjggL._SX405_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/John-Ousterhout/dp/1732102201/ref=sr_1_1?__mk_es_US=ÅMÅŽÕÑ&keywords=philosofy+software&qid=1567771445&s=gateway&sr=8-1" | |
}, | |
{ | |
"title": "The Art of Software Architecture", | |
"authors": "Stephen T. Albin", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51zR8I3gHJL._SX404_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Art-Software-Architecture-Methods-Techniques/dp/0471228869/ref=sr_1_1?ie=UTF8&qid=1497794706&sr=8-1&keywords=The+Art+of+Software+Architecture%3A+Design+methods+and+techniques" | |
}, | |
{ | |
"title": "Facts and fallacies of software engineering", | |
"authors": "Robert L. Glass", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/41gPk86GALL._SX396_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Facts-Fallacies-Software-Engineering-Robert/dp/0321117425/ref=sr_1_1?ie=UTF8&qid=1497794799&sr=8-1&keywords=Facts+and+fallacies+of+software+engineering" | |
}, | |
{ | |
"title": "Object Thinking", | |
"authors": "David West", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/41e3C51xqkL._SX408_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Object-Thinking-Developer-Reference-David/dp/0735619654/ref=sr_1_1?ie=UTF8&qid=1497794854&sr=8-1&keywords=Object+Thinking" | |
}, | |
{ | |
"title": "Extreme programming explained: Embrace change", | |
"authors": "Kent Beck", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51l1X81fhiL._SX396_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Extreme-Programming-Explained-Embrace-Change/dp/0321278658/ref=sr_1_1?ie=UTF8&qid=1497794885&sr=8-1&keywords=Extreme+programming+explained%3A+Embrace+change" | |
}, | |
{ | |
"title": "Docker: Up & Running", | |
"authors": "Karl Matthias", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51UJQu7uSwL._SX331_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Docker-Shipping-Reliable-Containers-Production/dp/1491917571/ref=sr_1_1?ie=UTF8&qid=1497795011&sr=8-1&keywords=Docker%3A+Up+%26+Running" | |
}, | |
{ | |
"title": "Ansible for DevOps", | |
"authors": "Jeff Geerling", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51nPvzqg9aL._SX382_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Ansible-DevOps-Server-configuration-management/dp/098639341X/ref=sr_1_1?ie=UTF8&qid=1497795092&sr=8-1&keywords=Ansible+for+DevOps" | |
}, | |
{ | |
"title": "Java Generics and Collections", | |
"authors": "Maurice Naftalin, Philip Wadler", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51Jklhlz7ML._SX387_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Java-Generics-Collections-Development-Process/dp/0596527756/ref=sr_1_1?ie=UTF8&qid=1497795131&sr=8-1&keywords=java+generics" | |
}, | |
{ | |
"title": "Mastering CoreOS", | |
"authors": "Sreenivas Makam", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51A44LsJTQL._SX404_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Mastering-CoreOS-Sreenivas-Makam/dp/1785288121/ref=sr_1_1?ie=UTF8&qid=1497795162&sr=8-1&keywords=Sreenivas+Makam" | |
}, | |
{ | |
"title": "Infrastructure as Code", | |
"authors": "Kief Morris", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51mdLvzYz9L._SX379_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Infrastructure-Code-Managing-Servers-Cloud/dp/1491924357/ref=sr_1_1?ie=UTF8&qid=1497795193&sr=8-1&keywords=infrastructure+as+code" | |
}, | |
{ | |
"title": "Domain Driven Design: Tackling complexity in the heart of software development", | |
"authors": "Eric J. Evans", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51sZW87slRL._SX375_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Domain-Driven-Design-Tackling-Complexity-Software/dp/0321125215/ref=sr_1_1?ie=UTF8&qid=1497795343&sr=8-1&keywords=Domain+Driven+Design%3A+Tackling+complexity+in+the+heart+of+software+development" | |
}, | |
{ | |
"title": "Functional and Reactive Domain Modeling", | |
"authors": "Debasish Ghosh", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51cngFZrhiL._SX396_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Functional-Reactive-Domain-Modeling-Debasish/dp/1617292249/ref=sr_1_1?ie=UTF8&qid=1497795367&sr=8-1&keywords=Ghosh%2C+Debasish" | |
}, | |
{ | |
"title": "Software Engineering: A practitioner's Approach", | |
"authors": "Roger S. Pressman", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/41ii%2B5PhUAL._SX396_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Software-Engineering-Practitioners-Approach-International/dp/0071267824/ref=sr_1_4?ie=UTF8&qid=1497795239&sr=8-4&keywords=Software+Engineering%3A+A+practitioner%27s+Approach" | |
}, | |
{ | |
"title": "Beggining iPhone Development with Swift 2", | |
"authors": "David Mark, Kim Topley, Jack Nutting, Fredrik Olsson, Jeff LaMarche", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51eK5mB2CnL._SX348_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Beginning-iPhone-Development-Swift-Exploring-ebook/dp/B01JFZRVWK/ref=sr_1_3?ie=UTF8&qid=1497795289&sr=8-3&keywords=David+Mark%2C+Kim+Topley%2C+Jack+Nutting%2C+Fredrik+Olsson%2C+Jeff+LaMarche" | |
}, | |
{ | |
"title": "Beggining Android 4 Application Development", | |
"authors": "Wei-Meng Lee", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51D5TrJk2vL._SX396_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Beginning-Android-4-Application-Development/dp/1118199545/ref=sr_1_1?ie=UTF8&qid=1497795310&sr=8-1&keywords=beginning+android+4+application+development" | |
}, | |
{ | |
"title": "Elegant Objects Vol. 1", | |
"authors": "Yegor Bugayenko", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/41moXb5PntL._SX327_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Elegant-Objects-1-Yegor-Bugayenko/dp/1519166915/ref=sr_1_1?ie=UTF8&qid=1497795393&sr=8-1&keywords=Elegant+Objects+Vol.+1" | |
}, | |
{ | |
"title": "Elegant Objects Vol. 2", | |
"authors": "Yegor Bugayenko", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/41HfA99ykbL._SX332_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Elegant-Objects-2-Yegor-Bugayenko/dp/1534908307/" | |
}, | |
{ | |
"title": "Cracking the Coding Interview", | |
"authors": "Gayle Laakmann McDowell", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51l5XzLln%2BL._SX348_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Cracking-Coding-Interview-Programming-Questions/dp/0984782850/ref=sr_1_1?ie=UTF8&qid=1497795414&sr=8-1&keywords=Cracking+the+Coding+Interview" | |
}, | |
{ | |
"title": "POJO's in Action", | |
"authors": "Chris Richardson", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51Os0JJuk4L._SX398_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/POJOs-Action-Developing-Applications-Lightweight/dp/1932394583/ref=sr_1_1?ie=UTF8&qid=1497795450&sr=8-1&keywords=POJO%27s+in+Action" | |
}, | |
{ | |
"title": "XML in a nutshell", | |
"authors": "Elliotte Rusty Harold", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/419YFBHOXZL._SX335_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Nutshell-Third-Elliotte-Rusty-Harold/dp/0596007647/ref=sr_1_1?ie=UTF8&qid=1497795470&sr=8-1&keywords=XML+in+a+nutshell" | |
}, | |
{ | |
"title": "Hacking: The art of exploitation", | |
"authors": "Jon Erickson", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/61VBaAS4IbL._SX383_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441/ref=sr_1_1?ie=UTF8&qid=1497795515&sr=8-1&keywords=Hacking%3A+The+art+of+exploitation" | |
}, | |
{ | |
"title": "Unlocking Android", | |
"authors": "Frank Ableson", | |
"picture": "https://images-na.ssl-images-amazon.com/images/I/51Z8%2BZ3n6IL._SX397_BO1,204,203,200_.jpg", | |
"link": "https://www.amazon.com/Unlocking-Android-Frank-Ableson/dp/1933988673/ref=sr_1_3?ie=UTF8&qid=1497795590&sr=8-3&keywords=android%3A+developers+guide" | |
} | |
] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment