Created
September 7, 2018 19:28
-
-
Save mosesrenegade/bea835b8d01666c5a827fb726de1a914 to your computer and use it in GitHub Desktop.
Reading List - Export list of some of the books on my kindle
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
.NET and COM: The Complete Interoperability Guide | |
@War: The Rise of the Military-Internet Complex | |
21st Century C: C Tips from the New School | |
3D Math Primer for Graphics and Game Development (Wordware Game Math Library) | |
A Guide to Claims-Based Identity and Access Control (Microsoft patterns & practices) | |
A Guide to Kernel Exploitation: Attacking the Core | |
A More Beautiful Question: The Power of Inquiry to Spark Breakthrough Ideas | |
A Primer of Analytic Number Theory: From Pythagoras to Riemann | |
Absolute FreeBSD, 2nd Edition: The Complete Guide to FreeBSD | |
Advanced C and C++ Compiling | |
Advanced Chrome Device Management & 2017 Essential Guide for Chromebook Users: Chrome for Work/Chrome for Education/Chrome for Kiosk/Chrome for Signage | |
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide (Open Source: Community Experience Distilled) | |
Advanced Windows Debugging | |
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare | |
An Introduction to Operating Systems: Concepts and Practice (GNU/LINUX), | |
Applied Cryptography: Protocols, Algorithms, and Source Code in C | |
Applied Mathematics for Database Professionals (Expert's Voice) | |
Applied Network Security Monitoring: Collection, Detection, and Analysis | |
ARM System Developer's Guide: Designing and Optimizing System Software (The Morgan Kaufmann Series in Computer Architecture and Design) | |
Assembly Language Step-by-Step: Programming with Linux | |
Batchography: The Art of Batch Files Programming | |
Beautiful Testing: Leading Professionals Reveal How They Improve Software (Theory in Practice) | |
C Programming Language: C PROGRAMMING LANG _p2 | |
C# 6.0 and the .NET 4.6 Framework | |
C# Deconstructed: Discover how C# works on the .NET Framework | |
CLR via C# (Developer Reference) | |
Code: The Hidden Language of Computer Hardware and Software (Developer Best Practices) | |
Complete Book of Chess Strategy: Grandmaster Techniques from A to Z | |
Confederate Ironclad vs Union Ironclad: Hampton Roads 1862 (Duel) | |
Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power | |
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon | |
Crimeware: Understanding New Attacks and Defenses (Symantec Press) | |
Cryptography Engineering: Design Principles and Practical Applications | |
Dark Territory: The Secret History of Cyber War | |
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It | |
Ender's Game (The Ender Quartet series Book 1) | |
Every Good Endeavor: Connecting Your Work to God's Work | |
Expert .NET 2.0 IL Assembler | |
Expert C Programming: Deep Secrets | |
Fearless: The Undaunted Courage and Ultimate Sacrifice of Navy SEAL Team SIX Operator Adam Brown | |
Fuzzing: Brute Force Vulnerability Discovery | |
Getting Help: The Complete and Authoritative Guide to Self-Assessment and Treatment of Mental Health Problems | |
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker | |
Graph Theory with Applications to Engineering and Computer Science (Dover Books on Mathematics) | |
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition | |
Gray Hat Python: Python Programming for Hackers and Reverse Engineers | |
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It | |
Hacking Exposed 7: Network Security Secrets and Solutions | |
Hacking: The Art of Exploitation, 2nd Edition | |
Hacking: The Next Generation: The Next Generation (Animal Guide) | |
How Linux Works, 2nd Edition: What Every Superuser Should Know | |
How to Write Your Own Remote Access Tools in C# | |
HTTP: The Definitive Guide: The Definitive Guide (Definitive Guides) | |
Implementing SSL / TLS Using Cryptography and PKI | |
Incident Response & Computer Forensics, Third Edition | |
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows (Developer Reference) | |
Introduction to 64 Bit Intel Assembly Language Programming for Linux: Second Edition | |
JavaScript: The Definitive Guide: Activate Your Web Pages (Definitive Guides) | |
Kerberos: The Definitive Guide: The Definitive Guide | |
Killing Pablo: The Hunt for the World's Greatest Outlaw | |
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground | |
Lawrence in Arabia: War, Deceit, Imperial Folly and the Making of the Modern Middle East (ALA Notable Books for Adults) | |
Learn C the Hard Way: Practical Exercises on the Computational Subjects You Keep Avoiding (Like C) (Zed Shaw's Hard Way Series) | |
Learning Linux Binary Analysis | |
Learning Python: Powerful Object-Oriented Programming (Animal Guide) | |
Learning Unix for OS X: Going Deep With the Terminal and Shell | |
Left of Bang: How the Marine Corps' Combat Hunter Program Can Save Your Life | |
Linkers and Loaders (The Morgan Kaufmann Series in Software Engineering and Programming) | |
Linux Device Drivers: Where the Kernel Meets the Hardware | |
Linux System Programming: Talking Directly to the Kernel and C Library | |
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management | |
Low-Level Programming: C, Assembly, and Program Execution on Intel 64 Architecture | |
Mac OS X and iOS Internals: To the Apple's Core | |
Mac OS X Internals: A Systems Approach (paperback) | |
Malicious Cryptography: Exposing Cryptovirology | |
Malware Analyst's Cookbook: Tools and Techniques for Fighting Malicious Code | |
Managed Code Rootkits: Hooking into Runtime Environments | |
Mastering Assembly Programming: From instruction set to kernel module with Intel processor | |
Microsoft PowerShell, VBScript and JScript Bible | |
Modern X86 Assembly Language Programming: 32-bit, 64-bit, SSE, and AVX | |
MySQL (4th Edition) (Developer's Library) | |
Offensive Countermeasures: The Art of Active Defense | |
On Writing Well, 30th Anniversary Edition: An Informal Guide to Writing Nonfiction | |
OS X and iOS Kernel Programming | |
OS X Incident Response: Scripting and Analysis | |
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation | |
Professional JavaScript for Web Developers | |
Professional Linux Kernel Architecture | |
Programming in Objective-C (Developer's Library) | |
Programming Rust: Fast, Safe Systems Development | |
Programming Windows 8 Apps with HTML, CSS, and JavaScript | |
PUZZLED: 101 Cunning conundrums and sneaky solutions | |
Python for Kids: A Playful Introduction To Programming | |
Quantum: Einstein, Bohr and the Great Debate About the Nature of Reality | |
Red Team: How to Succeed By Thinking Like the Enemy | |
Reverse Deception: Organized Cyber Threat Counter-Exploitation | |
Reverse Engineering: Mechanisms, Structures, Systems & Materials | |
Rise of the Machines: A Cybernetic History | |
Rising Strong: How the Ability to Reset Transforms the Way We Live, Love, Parent, and Lead | |
Secure Coding in C and C++: Secure Coding in C and C+_2 (SEI Series in Software Engineering) | |
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More | |
Security Engineering: A Guide to Building Dependable Distributed Systems | |
Serious Cryptography: A Practical Introduction to Modern Encryption | |
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks | |
Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door | |
Speaker for the Dead (The Ender Quartet series Book 2) | |
SQL Injection Attacks and Defense | |
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery Book 1) | |
TCP/IP Sockets in C#: Practical Guide for Programmers (The Practical Guides) | |
The Art of Computer Virus Research and Defense: ART COMP VIRUS RES DEFENSE _p1 (Symantec Press) | |
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory | |
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities | |
The Craft of Research, Fourth Edition (Chicago Guides to Writing, Editing, and Publishing) | |
The Definitive Guide to HTML5 | |
The Definitive Guide to the Xen Hypervisor (Prentice Hall Open Source Software Development Series) | |
The Design and Implementation of the FreeBSD Operating System | |
The Docker Book: Containerization is the new virtualization | |
The Elements of Computing Systems: Building a Modern Computer from First Principles (The MIT Press) | |
The Hacker Playbook 2: Practical Guide To Penetration Testing | |
The Hacker Playbook: Practical Guide To Penetration Testing | |
The Happiness Advantage: How a Positive Brain Fuels Success in Work and Life | |
The Hardware Hacker: Adventures in Making and Breaking Hardware | |
The History of the Peloponnesian War | |
The IDA Pro Book, 2nd Edition | |
The Innovator's DNA: Mastering the Five Skills of Disruptive Innovators | |
The Linux Programming Interface: A Linux and UNIX System Programming Handbook | |
The Mac Hacker's Handbook | |
The Mammoth Book of Chess (Mammoth Books 199) | |
The Network Security Test Lab: A Step-by-Step Guide | |
The Practice of Network Security Monitoring: Understanding Incident Detection and Response | |
The Pragmatic Programmer: From Journeyman to Master | |
The Princess Bride: S. Morgenstern's Classic Tale of True Love and High Adventure | |
The Rootkit Arsenal: Escape and Evasion | |
The Shellcoder's Handbook: Discovering and Exploiting Security Holes | |
Threat Modeling: Designing for Security | |
Trojan Horse: A Jeff Aiken Novel (Jeff Aiken Series Book 2) | |
Understanding and Using C Pointers: Core Techniques for Memory Management | |
Understanding And Writing Compilers: A-Do-It-Yourself Guide | |
Understanding Linux Network Internals: Guided Tour to Networking on Linux | |
UNIX and Linux System Administration Handbook | |
VBScript, WMI, and ADSI Unleashed: Using VBScript, WMI, and ADSI to Automate Windows Administration | |
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | |
Windows Debugging: Practical Foundations | |
Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7 (Developer Reference) | |
Windows Internals, Part 1: System architecture, processes, threads, memory management, and more | |
Windows Internals, Part 2: Covering Windows Server 2008 R2 and Windows 7 (Developer Reference) | |
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell | |
Windows Sysinternals Administrator's Reference | |
Writing Compilers and Interpreters: A Software Engineering Approach | |
Zero Day: A Jeff Aiken Novel (Jeff Aiken Series Book 1) | |
Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment