Details
Rating
TheBigCH
Rating
Controls
Red Team
Red Team
  • Micah Zenko
3.52.0
Influx
Influx
  • Daniel Suarez
4.183.0
Slaughterhouse 5
Slaughterhouse 5
  • Kurt Vonnegut
4.084.0
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
  • Clifford Stoll
4.193.0
Herbie Hancock: Possibilities
Herbie Hancock: Possibilities
  • Herbie Hancock
  • Lisa Dickey
44.0
Team of teams
Team of teams
  • Stanley McChrystal
  • David Silverman
4.45.0
Lean Enterprise: How High Performance Organizations Innovate at Scale
Lean Enterprise: How High Performance Organizations Innovate at Scale
  • Jez Humble
  • Joanne Molesky
  • Barry O'Reilly
3.673.0
The Checklist Manifesto: How to Get Things Right
The Checklist Manifesto: How to Get Things Right
  • Atul Gawande
3.874.0
Ready Player One
Ready Player One
  • Ernest Cline
3.965.0
How To Win Friends and Influence People
How to Win Friends and Influence People
  • Dale Carnegie
3.924.0
Practical Object Oriented Design in Ruby
Practical Object Oriented Design in Ruby
  • Sandi Metz
4.664.0
Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation
Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation
  • Jez Humble
  • David Farley
4.293.0
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
  • Ben Horowitz
4.174.0
The Book
The Book
  • Alan Watts
44.0
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
  • Gene Kim
  • Kevin Behr
  • George Spafford
4.165.0
Countdown to Zero Day
Countdown to Zero Day
  • Kim Zetter
3.854.0
Spam Nation
Spam Nation
  • Brian Krebs
3.473.0
The Art of Memory Forensics
The Art of Memory Forensics
  • Michael Hale Ligh
  • Andrew Case
  • Jamie Levy
  • AAron Walters
44.0
Reamde
Reamde
  • Neal Stephenson
3.912.0
The Killer Angels: The Classic Novel of the Civil War
The Killer Angels
  • Michael Shaara
4.194.0
Applied Network Security Monitoring: Collection, Detection, and Analysis
Applied Network Security Monitoring: Collection, Detection, and Analysis
  • Chris Sanders
  • Jason Smith
55.0
Zero Day
Zero Day
  • Mark E. Russinovich
3.653.0
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
  • Tobias Klein
44.0
Cover 0

The Pragmatic CSO

The Pragmatic CSO
  • Mike Rothman
33.0
First, Break All The Rules
First, Break All The Rules
  • Marcus Buckingham
  • Curt Coffman
3.712.0
The Book of Atrus
The Book of Atrus
  • Rand Miller
  • Robyn Miller
  • David Wingrove
3.633.0
Kill Decision
Kill Decision
  • Daniel Suarez
4.13.0
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
  • Parmy Olson
3.894.0
Zero Day Threat
Zero Day Threat
  • Byron Acohido
  • Jon Swartz
2.53.0
A Walk in the Woods: Rediscovering America Along the Appalachian Trail
A Walk in the Woods: Rediscovering America on the Appalachian Trail
  • Bill Bryson
44.0
A Short History of Nearly Everything
A Short History of Nearly Everything
  • Bill Bryson
4.234.0
ChiRunning
ChiRunning
  • Danny Dreyer
  • Katherine Dreyer
3.632.0
Wherever You Go, There You Are: Mindfulness Meditation in Everyday Life
Wherever You Go, There You Are: Mindfulness Meditation in Everyday Life
  • Jon Kabat-Zinn
3.953.0
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers
  • Bill Gardner
44.0
Ghost in the Wires
Ghost in the Wires
  • Kevin D. Mitnick
3.983.0
The Hitchhiker's Guide to the Galaxy
The Hitchhiker's Guide to the Galaxy
  • Douglas Adams
4.245.0
Nmap Network Scanning
Nmap Network Scanning Official Nmap Project Guide To Network Discovery And Security Scanning
  • Gordon Lyon
55.0
Malware Analyst's Cookbook and DVD
Malware Analyst's Cookbook and DVD
  • Michael Ligh
  • Steven Adair
  • Blake Hartstein
  • Matthew Richard
55.0
Reversing Secrets of Reverse Engineering
Reversing
  • Eldad Eilam
44.0
The Scarlet Letter and Other Writings
The Scarlet Letter
  • Nathaniel Hawthorne
3.152.0