Essentialism: The Disciplined Pursuit Of Less

@xdoubleu
Added on

2011 • 672 Readers • 260 pages 3.8

The Omnivore's Dilemma: A Natural History of Four Meals

@xdoubleu
Added on

2006 • 513 Readers • 480 pages 4.1

The Anthropocene Reviewed

@xdoubleu
Added on

2019 • 841 Readers • 305 pages 4.4

Code Reviews 101

Code Reviews 101
ByGiuliana Carullo
@xdoubleu
Added on

2 Readers

Bonus Level

Bonus Level
ByRonald Meeus
@xdoubleu
Added on

1 Reader • 464 pages

The DevOps Handbook

The DevOps Handbook
ByGene Kim,Jez Humble,+2 more
@xdoubleu
Added on

2015 • 90 Readers • 437 pages 4.2

The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win

#1 of 2 in The Phoenix Project

@xdoubleu
Added on

2013 • 439 Readers 4.1

How to Fix Copyright

How to Fix Copyright
ByWilliam Patry
@xdoubleu
Added on

2012 • 1 Reader • 336 pages

Ultralearning: Accelerate Your Career, Master Hard Skills and Outsmart the Competition

@xdoubleu
Added on

2019 • 192 Readers • 283 pages 4

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

@xdoubleu
Added on

2021 • 143 Readers • 505 pages 4.1

American Kingpin

American Kingpin
ByNick Bilton
@xdoubleu
Added on

2018 • 215 Readers • 352 pages 4.3

Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems

@xdoubleu
Added on

10 Readers • 555 pages 4

Sandworm

Sandworm
ByAndy Greenberg
@xdoubleu
Added on

2019 • 150 Readers 4.2

Violent Python

Violent Python
ByTJ O'Connor
@xdoubleu
Added on

2012 • 9 Readers • 288 pages

Cult of the Dead Cow

@xdoubleu
Added on

2019 • 35 Readers • 251 pages 3.5

@xdoubleu
Added on

2015 • 8 Readers 4

Penetration Testing Essentials
BySean-Philip Oriyano
@xdoubleu
Added on

2016 • 1 Reader • 496 pages

@xdoubleu
Added on

2014 • 3 Readers

@xdoubleu
Added on

10 Readers 5

Malware Analyst's Cookbook and DVD

Malware Analyst's Cookbook and DVD
ByMichael Ligh,Steven Adair,+2 more
@xdoubleu
Added on

2010 • 6 Readers • 747 pages 5

Liars and Outliers

Liars and Outliers
ByBruce Schneier
@xdoubleu
Added on

2012 • 27 Readers • 348 pages 3.5

Threat Modeling: Designing for Security

@xdoubleu
Added on

2014 • 14 Readers • 624 pages 5

Tribe of Hackers Security Leaders

Tribe of Hackers Security Leaders
ByMarcus J. Carey,Jennifer Jin
@xdoubleu
Added on

2020 • 2 Readers • 320 pages

Applied Cryptography: Protocols, Algorithms, and Source Code in C

@xdoubleu
Added on

1993 • 24 Readers • 784 pages 3.8

Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity

@xdoubleu
Added on

2 Readers

Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity

@xdoubleu
Added on

2 Readers

Cybersecurity Blue Team Toolkit

@xdoubleu
Added on

2019 • 1 Reader • 364 pages

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

@xdoubleu
Added on

2014 • 10 Readers

The Art of Attack: Attacker Mindset for Security Professionals

@xdoubleu
Added on

1 Reader

Kali Linux Penetration Testing Bible

@xdoubleu
Added on

1 Reader

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

@xdoubleu
Added on

2018 • 2 Readers • 320 pages

Unauthorised Access: Physical Penetration Testing for IT Security Teams

@xdoubleu
Added on

2009 • 3 Readers

Secrets & Lies

@xdoubleu
Added on

2000 • 21 Readers • 408 pages 4.3

The Art of Memory Forensics

The Art of Memory Forensics
ByMichael Hale Ligh,Andrew Case,+2 more
@xdoubleu
Added on

2014 • 5 Readers • 912 pages 4