To Learn

Position
Details
Rating
Readers Count
Controls
#2
Clean Architecture: A Craftsman's Guide to Software Structure and Design
Clean Architecture: A Craftsman's Guide to Software Structure and Design
  • Robert C. Martin
4.0840 reads
#3
Patterns of Enterprise Application Architecture
Patterns of Enterprise Application Architecture
  • Martin Fowler
  • David Rice
  • Matthew Foemmel
  • Edward Hieatt
  • Robert Mee
414 reads
#4
Concurrency in C# Cookbook: Asynchronous, Parallel, and Multithreaded Programming
Concurrency in C# Cookbook: Asynchronous, Parallel, and Multithreaded Programming
  • Stephen Cleary
00 reads
#5
Software Engineering at Google
Software Engineering at Google
  • Titus Winters
  • Tom Manshreck
  • Hyrum Wright
4.2514 reads
#6
The Go Programming Language
The Go Programming Language
  • Alan A.A. Donovan
  • Brian W. Kernighan
4.522 reads
#7
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
  • Martin Kleppmann
4.6676 reads
#8
Concurrency in Go: Tools and Techniques for Developers
Concurrency in Go: Tools and Techniques for Developers
  • Katherine Cox-Buday
42 reads
#9
Learning Domain-Driven Design: Aligning Software Architecture and Business Strategy
Learning Domain-Driven Design: Aligning Software Architecture and Business Strategy
  • Vladik Khononov
4.53 reads
#10
Fundamentals of Software Architecture: An Engineering Approach
Fundamentals of Software Architecture: An Engineering Approach
  • Neal Ford
  • Mark Richards
411 reads
#11
Learning Test-Driven Development: A Polyglot Guide to Writing Uncluttered Code
Learning Test-Driven Development: A Polyglot Guide to Writing Uncluttered Code
  • Saleem Siddiqui
00 reads
#12
Effective Typescript
Effective Typescript
  • Dan Vanderkam
3.53 reads
#13
How Google Tests Software
How Google Tests Software
  • James A. Whittaker
  • Jason Arbon
  • Jeff Carollo
3.53 reads
#14
Software Architecture: the Hard Parts
Software Architecture: the Hard Parts
  • Neal Ford
  • Mark Richards
  • Pramod Sadalage
  • Zhamak Dehghani
3.0810 reads
#15
How Linux works
How Linux works
  • Brian Ward
3.674 reads
#16
Chaos Engineering: System Resiliency in Practice
Chaos Engineering: System Resiliency in Practice
  • Casey Rosenthal
  • Nora Jones
00 reads
#17
The Tangled Web: A Guide to Securing Modern Web Applications
The Tangled Web: A Guide to Securing Modern Web Applications
  • Michal Zalewski
3.335 reads
#18
Bug Bounty Bootcamp
Bug Bounty Bootcamp
  • Vickie Li
00 reads
#19
Database Management Systems
Database Management Systems
  • Raghu Ramakrishnan
  • Johannes Gehrke
01 read
#20
Release It!
Release It!
  • Michael T. Nygard
4.3615 reads
#21
Cover 5

Malware Data Science

Malware Data Science: Attack Detection and Attribution
  • Joshua Saxe
  • Hillary Sanders
00 reads
#22
How to Hack Like a Ghost: Breaching the Cloud
How to Hack Like a Ghost: Breaching the Cloud
  • Sparc Flow
00 reads
#23
The Ghidra Book: The Definitive Guide
The Ghidra Book: The Definitive Guide
  • Chris Eagle
  • Kara Nance
01 read
#24
Foundations of Information Security: A Straightforward Introduction
Foundations of Information Security: A Straightforward Introduction
  • Jason Andress
00 reads
#25
Cover 0

Ethical Hacking

Ethical Hacking: A Hands-on Introduction to Breaking In
  • Daniel G. Graham
00 reads
#26
Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters
  • Justin Seitz
  • Tim Arnold
01 read
#27
Hacking The Art Of Exploitation
Hacking The Art Of Exploitation
  • Jon Erickson
3.8613 reads
#28
Cover 6

The Web Application Hacker's Handbook

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
  • Dafydd Stuttard
  • Marcus Pinto
4.754 reads
#29
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
  • Jean-Philippe Aumasson
00 reads
#30
Black Hat Go: Go Programming For Hackers and Pentesters
Black Hat Go: Go Programming For Hackers and Pentesters
  • Tom Steele
  • Chris Patten
  • Dan Kottmann
41 read
#31
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
  • James Forshaw
02 reads
#32
Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications
  • Niels Ferguson
  • Bruce Schneier
  • Tadayoshi Kohno
44 reads
#33
Introduction to Modern Cryptography: Principles and Protocols
Introduction to Modern Cryptography: Principles and Protocols
  • Jonathan Katz
  • Yehuda Lindell
00 reads
#34
Software Project Survival Guide
Software Project Survival Guide
  • Steve McConnell
31 read
#35
Working Effectively with Legacy Code
Working Effectively with Legacy Code
  • Michael C. Feathers
4.4122 reads
#36
Cover 0

Serious Cryptography

Serious Cryptography: A Practical Introduction to Modern Encryption
  • Jean-Philippe Aumasson
4.335 reads
#37
User Story Mapping
User Story Mapping
  • Jeff Patton
  • Peter Economy
3.7916 reads
#38
Penetration Testing: A Hands-On Introduction to Hacking
Penetration Testing: A Hands-On Introduction to Hacking
  • Georgia Weidman
32 reads
#39
Site Reliability Engineering: How Google Runs Production Systems
Site Reliability Engineering: How Google Runs Production Systems
    4.3327 reads
    #40
    Information Dashboard Design
    Information Dashboard Design
    • Stephen Few
    4.138 reads
    #41
    A Philosophy of Software Design
    A Philosophy of Software Design
    • John Ousterhout
    4.1535 reads
    #42
    Hackable: How to Do Application Security Right
    Hackable: How to Do Application Security Right
    • Ted Harrington
    01 read
    #43
    Cover 0

    Code Reviews 101

    Code Reviews 101
    • Giuliana Carullo
    00 reads
    #44
    The DevOps Handbook
    The DevOps Handbook
    • Gene Kim
    • Jez Humble
    • Patrick Debois
    • John Willis
    4.1826 reads
    #45
    Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
    Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
    • Heather Adkins
    • Betsy Beyer
    • Paul Blankinship
    • Ana Oprea
    • Piotr Lewandowski
    • Adam Stubblefield
    42 reads
    #46
    Violent Python
    Violent Python
    • TJ O'Connor
    00 reads
    #47
    Cover 1

    Linux Basics for Hackers

    Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
    • OccupyTheWeb
    01 read
    #48
    Advanced Penetration Testing: Hacking the World's Most Secure Networks
    Advanced Penetration Testing: Hacking the World's Most Secure Networks
    • Wil Allsopp
    02 reads
    #49
    Cover 0

    The Hacker Playbook 3

    The Hacker Playbook 3
    • Peter Kim
    53 reads
    #50
    Cover 3

    The Hacker Playbook 2

    The Hacker Playbook 2
    • Peter Kim
    00 reads
    #51
    Cover 4

    The Hacker Playbook

    The Hacker Playbook
    • Peter Kim
    00 reads
    #52
    Cover 6

    Penetration Testing Essentials

    Penetration Testing Essentials
    • Sean-Philip Oriyano
    00 reads
    #53
    Cybersecurity Blue Team Toolkit
    Cybersecurity Blue Team Toolkit
    • Nadean H. Tanner
    00 reads
    #54
    Malware Analyst's Cookbook and DVD
    Malware Analyst's Cookbook and DVD
    • Michael Ligh
    • Steven Adair
    • Blake Hartstein
    • Matthew Richard
    52 reads
    #55
    Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
    Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
    • Bruce Dang
    • Alexandre Gazet
    • Elias Bachaalany
    04 reads
    #56
    Kali Linux Penetration Testing Bible
    Kali Linux Penetration Testing Bible
    • Gus Khawaja
    00 reads
    #57
    Unauthorised Access: Physical Penetration Testing for IT Security Teams
    Unauthorised Access: Physical Penetration Testing for IT Security Teams
    • Wil Allsopp
    00 reads
    #58
    Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
    Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
    • Nick Furneaux
    01 read
    #59
    Cover 8

    Hacking Multifactor Authentication

    Hacking Multifactor Authentication
    • Roger A. Grimes
    00 reads
    #60
    The Art of Memory Forensics
    The Art of Memory Forensics
    • Michael Hale Ligh
    • Andrew Case
    • Jamie Levy
    • AAron Walters
    42 reads
    #61
    Applied Cryptography: Protocols, Algorithms, and Source Code in C
    Applied Cryptography: Protocols, Algorithms, and Source Code in C
    • Bruce Schneier
    3.758 reads
    #62
    Cover 5

    The Database Hacker's Handbook

    The Database Hacker's Handbook: Defending Database Servers
    • David Litchfield
    • Chris Anley
    • John Heasman
    • Bill Grindlay
    00 reads
    #63
    Cover 8

    The Browser Hacker's Handbook

    The Browser Hacker's Handbook
    • Christian Frichot
    • Michele Orru
    00 reads
    #64
    Programming Collective Intelligence: Building Smart Web 2.0 Applications
    Programming Collective Intelligence: Building Smart Web 2.0 Applications
    • Toby Segaran
    3.3310 reads
    #65
    Security Engineering
    Security Engineering
    • Ross J. Anderson
    3.674 reads
    #66
    Street Coder
    Street Coder
    • Sedat Kapanoglu
    01 read
    #67
    Primer on Client-Side Web Security
    Primer on Client-Side Web Security
    • Philippe De Ryck
    • Lieven Desmet
    • Frank Piessens
    • Martin Johns
    00 reads
    #68
    Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
    Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
    • Bruce Nikkel
    02 reads
    #69
    Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
    Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
    • Fotios Chantzis
    • Ioannis Stais
    • Paulino Calderon
    • Evangelos Deirmentzoglou
    • Beau Woods
    00 reads
    #70
    Practical Malware Analysis
    Practical Malware Analysis
    • Michael Sikorski
    • Andrew Honig
    4.54 reads
    #71
    Real-World Bug Hunting: A Field Guide to Web Hacking
    Real-World Bug Hunting: A Field Guide to Web Hacking
    • Peter Yaworski
    4.334 reads
    #72
    Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
    Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
    • Alex Matrosov
    • Eugene Rodionov
    • Sergey Bratus
    01 read
    #73
    Cyberjutsu: Cybersecurity for the Modern Ninja
    Cyberjutsu: Cybersecurity for the Modern Ninja
    • Ben McCarty
    00 reads
    #74
    Cover 0

    A Graduate Course in Applied Cryptography

    A Graduate Course in Applied Cryptography
    • Dan Boneh
    • Victor Shoup
    00 reads
    #75
    Modern Software Engineering
    Modern Software Engineering
    • David Farley
    4.2513 reads
    #76
    Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation
    Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation
    • Jez Humble
    • David Farley
    4.2920 reads
    #77
    Threat Modeling: Designing for Security
    Threat Modeling: Designing for Security
    • Adam Shostack
    03 reads
    #78
    Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
    Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
    • Matt Burrough
    02 reads
    #79
    The Rust Programming Language
    The Rust Programming Language
    • Steve Klabnik
    • Carol Nichols
    4.4630 reads
    #80
    Hyperscale & Microcare
    Hyperscale & Microcare
    • Nick Boucart
    • Peter Verhasselt
    00 reads
    #81
    Servers for Hackers
    Servers for Hackers
    • Chris Fidao
    32 reads
    #82
    Surviving Other People's Web APIs
    Surviving Other People's Web APIs
    • Phil Sturgeon
    00 reads
    #83
    Understanding Distributed Systems
    Understanding Distributed Systems
    • Roberto Vitillo
    4.334 reads
    #84
    Cover 0

    Distributed Systems with Node.js

    Distributed Systems with Node.js: Building Enterprise-Ready Backend Services
    • II Thomas Hunter
    43 reads
    #85
    Cover 6

    The Hardware Hacking Handbook

    The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
    • Jasper van Woudenberg
    • Colin O'Flynn
    00 reads
    #86
    The Art of Cyberwarfare
    The Art of Cyberwarfare
    • Jon DiMaggio
    00 reads
    #87
    Designing Secure Software: A Guide for Developers
    Designing Secure Software: A Guide for Developers
    • Loren Kohnfelder
    00 reads
    #88
    Web Security for Developers
    Web Security for Developers
    • Malcolm McDonald
    00 reads
    #89
    Cover 6

    The IDA Pro Book

    The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
    • Chris Eagle
    52 reads
    #90
    The Practice of Network Security Monitoring: Understanding Incident Detection and Response
    The Practice of Network Security Monitoring: Understanding Incident Detection and Response
    • Richard Bejtlich
    00 reads
    #91
    Clean Code: A Handbook of Agile Software Craftsmanship
    Clean Code: A Handbook of Agile Software Craftsmanship
    • Robert C. Martin
    4.11132 reads
    #92
    Agile Principles, Patterns, and Practices in C#
    Agile Principles, Patterns, and Practices in C#
    • Robert C. Martin
    • Micah Martin
    4.55 reads
    #93
    Extreme Programming Explained: Embrace Change
    Extreme Programming Explained: Embrace Change
    • Kent Beck
    • Cynthia Andres
    4.2920 reads
    #94
    Refactoring: Improving the Design of Existing Code
    Refactoring: Improving the Design of Existing Code
    • Martin Fowler
    3.9747 reads
    #95
    Code That Fits in Your Head: Heuristics for Software Engineering
    Code That Fits in Your Head: Heuristics for Software Engineering
    • Mark Seemann
    33 reads
    #96
    Software Craftsman, The: Professionalism, Pragmatism, Pride
    Software Craftsman, The: Professionalism, Pragmatism, Pride
    • Sandro Mancuso
    03 reads
    #97
    The Car Hacker's Handbook: A Guide for the Penetration Tester
    The Car Hacker's Handbook: A Guide for the Penetration Tester
    • Craig Smith
    02 reads
    #98
    Practical Packet Analysis
    Practical Packet Analysis
    • Chris Sanders
    52 reads
    #99
    Kubernetes: Up and Running
    Kubernetes: Up and Running
    • Kelsey Hightower
    • Brendan Burns
    • Joe Beda
    4.26 reads
    #100
    Designing Distributed Systems: Patterns and Paradigms for Scalable, Reliable Services
    Designing Distributed Systems: Patterns and Paradigms for Scalable, Reliable Services
    • Brendan Burns
    32 reads
    #101
    Cover 7

    Practical Monitoring

    Practical Monitoring: Effective Strategies for the Real World
    • Mike Julian
    00 reads