Skip to content

Instantly share code, notes, and snippets.

@mosesrenegade
Created September 7, 2018 19:28
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save mosesrenegade/bea835b8d01666c5a827fb726de1a914 to your computer and use it in GitHub Desktop.
Save mosesrenegade/bea835b8d01666c5a827fb726de1a914 to your computer and use it in GitHub Desktop.
Reading List - Export list of some of the books on my kindle
.NET and COM: The Complete Interoperability Guide
@War: The Rise of the Military-Internet Complex
21st Century C: C Tips from the New School
3D Math Primer for Graphics and Game Development (Wordware Game Math Library)
A Guide to Claims-Based Identity and Access Control (Microsoft patterns & practices)
A Guide to Kernel Exploitation: Attacking the Core
A More Beautiful Question: The Power of Inquiry to Spark Breakthrough Ideas
A Primer of Analytic Number Theory: From Pythagoras to Riemann
Absolute FreeBSD, 2nd Edition: The Complete Guide to FreeBSD
Advanced C and C++ Compiling
Advanced Chrome Device Management & 2017 Essential Guide for Chromebook Users: Chrome for Work/Chrome for Education/Chrome for Kiosk/Chrome for Signage
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide (Open Source: Community Experience Distilled)
Advanced Windows Debugging
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
An Introduction to Operating Systems: Concepts and Practice (GNU/LINUX),
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Applied Mathematics for Database Professionals (Expert's Voice)
Applied Network Security Monitoring: Collection, Detection, and Analysis
ARM System Developer's Guide: Designing and Optimizing System Software (The Morgan Kaufmann Series in Computer Architecture and Design)
Assembly Language Step-by-Step: Programming with Linux
Batchography: The Art of Batch Files Programming
Beautiful Testing: Leading Professionals Reveal How They Improve Software (Theory in Practice)
C Programming Language: C PROGRAMMING LANG _p2
C# 6.0 and the .NET 4.6 Framework
C# Deconstructed: Discover how C# works on the .NET Framework
CLR via C# (Developer Reference)
Code: The Hidden Language of Computer Hardware and Software (Developer Best Practices)
Complete Book of Chess Strategy: Grandmaster Techniques from A to Z
Confederate Ironclad vs Union Ironclad: Hampton Roads 1862 (Duel)
Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Crimeware: Understanding New Attacks and Defenses (Symantec Press)
Cryptography Engineering: Design Principles and Practical Applications
Dark Territory: The Secret History of Cyber War
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Ender's Game (The Ender Quartet series Book 1)
Every Good Endeavor: Connecting Your Work to God's Work
Expert .NET 2.0 IL Assembler
Expert C Programming: Deep Secrets
Fearless: The Undaunted Courage and Ultimate Sacrifice of Navy SEAL Team SIX Operator Adam Brown
Fuzzing: Brute Force Vulnerability Discovery
Getting Help: The Complete and Authoritative Guide to Self-Assessment and Treatment of Mental Health Problems
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Graph Theory with Applications to Engineering and Computer Science (Dover Books on Mathematics)
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking Exposed 7: Network Security Secrets and Solutions
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Next Generation: The Next Generation (Animal Guide)
How Linux Works, 2nd Edition: What Every Superuser Should Know
How to Write Your Own Remote Access Tools in C#
HTTP: The Definitive Guide: The Definitive Guide (Definitive Guides)
Implementing SSL / TLS Using Cryptography and PKI
Incident Response & Computer Forensics, Third Edition
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows (Developer Reference)
Introduction to 64 Bit Intel Assembly Language Programming for Linux: Second Edition
JavaScript: The Definitive Guide: Activate Your Web Pages (Definitive Guides)
Kerberos: The Definitive Guide: The Definitive Guide
Killing Pablo: The Hunt for the World's Greatest Outlaw
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Lawrence in Arabia: War, Deceit, Imperial Folly and the Making of the Modern Middle East (ALA Notable Books for Adults)
Learn C the Hard Way: Practical Exercises on the Computational Subjects You Keep Avoiding (Like C) (Zed Shaw's Hard Way Series)
Learning Linux Binary Analysis
Learning Python: Powerful Object-Oriented Programming (Animal Guide)
Learning Unix for OS X: Going Deep With the Terminal and Shell
Left of Bang: How the Marine Corps' Combat Hunter Program Can Save Your Life
Linkers and Loaders (The Morgan Kaufmann Series in Software Engineering and Programming)
Linux Device Drivers: Where the Kernel Meets the Hardware
Linux System Programming: Talking Directly to the Kernel and C Library
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
Low-Level Programming: C, Assembly, and Program Execution on Intel 64 Architecture
Mac OS X and iOS Internals: To the Apple's Core
Mac OS X Internals: A Systems Approach (paperback)
Malicious Cryptography: Exposing Cryptovirology
Malware Analyst's Cookbook: Tools and Techniques for Fighting Malicious Code
Managed Code Rootkits: Hooking into Runtime Environments
Mastering Assembly Programming: From instruction set to kernel module with Intel processor
Microsoft PowerShell, VBScript and JScript Bible
Modern X86 Assembly Language Programming: 32-bit, 64-bit, SSE, and AVX
MySQL (4th Edition) (Developer's Library)
Offensive Countermeasures: The Art of Active Defense
On Writing Well, 30th Anniversary Edition: An Informal Guide to Writing Nonfiction
OS X and iOS Kernel Programming
OS X Incident Response: Scripting and Analysis
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Professional JavaScript for Web Developers
Professional Linux Kernel Architecture
Programming in Objective-C (Developer's Library)
Programming Rust: Fast, Safe Systems Development
Programming Windows 8 Apps with HTML, CSS, and JavaScript
PUZZLED: 101 Cunning conundrums and sneaky solutions
Python for Kids: A Playful Introduction To Programming
Quantum: Einstein, Bohr and the Great Debate About the Nature of Reality
Red Team: How to Succeed By Thinking Like the Enemy
Reverse Deception: Organized Cyber Threat Counter-Exploitation
Reverse Engineering: Mechanisms, Structures, Systems & Materials
Rise of the Machines: A Cybernetic History
Rising Strong: How the Ability to Reset Transforms the Way We Live, Love, Parent, and Lead
Secure Coding in C and C++: Secure Coding in C and C+_2 (SEI Series in Software Engineering)
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Security Engineering: A Guide to Building Dependable Distributed Systems
Serious Cryptography: A Practical Introduction to Modern Encryption
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door
Speaker for the Dead (The Ender Quartet series Book 2)
SQL Injection Attacks and Defense
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery Book 1)
TCP/IP Sockets in C#: Practical Guide for Programmers (The Practical Guides)
The Art of Computer Virus Research and Defense: ART COMP VIRUS RES DEFENSE _p1 (Symantec Press)
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Craft of Research, Fourth Edition (Chicago Guides to Writing, Editing, and Publishing)
The Definitive Guide to HTML5
The Definitive Guide to the Xen Hypervisor (Prentice Hall Open Source Software Development Series)
The Design and Implementation of the FreeBSD Operating System
The Docker Book: Containerization is the new virtualization
The Elements of Computing Systems: Building a Modern Computer from First Principles (The MIT Press)
The Hacker Playbook 2: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing
The Happiness Advantage: How a Positive Brain Fuels Success in Work and Life
The Hardware Hacker: Adventures in Making and Breaking Hardware
The History of the Peloponnesian War
The IDA Pro Book, 2nd Edition
The Innovator's DNA: Mastering the Five Skills of Disruptive Innovators
The Linux Programming Interface: A Linux and UNIX System Programming Handbook
The Mac Hacker's Handbook
The Mammoth Book of Chess (Mammoth Books 199)
The Network Security Test Lab: A Step-by-Step Guide
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
The Pragmatic Programmer: From Journeyman to Master
The Princess Bride: S. Morgenstern's Classic Tale of True Love and High Adventure
The Rootkit Arsenal: Escape and Evasion
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Threat Modeling: Designing for Security
Trojan Horse: A Jeff Aiken Novel (Jeff Aiken Series Book 2)
Understanding and Using C Pointers: Core Techniques for Memory Management
Understanding And Writing Compilers: A-Do-It-Yourself Guide
Understanding Linux Network Internals: Guided Tour to Networking on Linux
UNIX and Linux System Administration Handbook
VBScript, WMI, and ADSI Unleashed: Using VBScript, WMI, and ADSI to Automate Windows Administration
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Windows Debugging: Practical Foundations
Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7 (Developer Reference)
Windows Internals, Part 1: System architecture, processes, threads, memory management, and more
Windows Internals, Part 2: Covering Windows Server 2008 R2 and Windows 7 (Developer Reference)
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
Windows Sysinternals Administrator's Reference
Writing Compilers and Interpreters: A Software Engineering Approach
Zero Day: A Jeff Aiken Novel (Jeff Aiken Series Book 1)
Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment