#2 | Clean Architecture: A Craftsman's Guide to Software Structure and Design | 4.08 | 40 reads | |
#3 | Patterns of Enterprise Application Architecture - Martin Fowler
- David Rice
- Matthew Foemmel
- Edward Hieatt
- Robert Mee
| 4 | 14 reads | |
#4 | Concurrency in C# Cookbook: Asynchronous, Parallel, and Multithreaded Programming | 0 | 0 reads | |
#5 | Software Engineering at Google - Titus Winters
- Tom Manshreck
- Hyrum Wright
| 4.25 | 14 reads | |
#6 | The Go Programming Language - Alan A.A. Donovan
- Brian W. Kernighan
| 4.5 | 22 reads | |
#7 | Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems | 4.66 | 76 reads | |
#8 | Concurrency in Go: Tools and Techniques for Developers | 4 | 2 reads | |
#9 | Learning Domain-Driven Design: Aligning Software Architecture and Business Strategy | 4.5 | 3 reads | |
#10 | Fundamentals of Software Architecture: An Engineering Approach | 4 | 11 reads | |
#11 | Learning Test-Driven Development: A Polyglot Guide to Writing Uncluttered Code | 0 | 0 reads | |
#12 | | 3.5 | 3 reads | |
#13 | How Google Tests Software - James A. Whittaker
- Jason Arbon
- Jeff Carollo
| 3.5 | 3 reads | |
#14 | Software Architecture: the Hard Parts - Neal Ford
- Mark Richards
- Pramod Sadalage
- Zhamak Dehghani
| 3.08 | 10 reads | |
#15 | | 3.67 | 4 reads | |
#16 | Chaos Engineering: System Resiliency in Practice - Casey Rosenthal
- Nora Jones
| 0 | 0 reads | |
#17 | The Tangled Web: A Guide to Securing Modern Web Applications | 3.33 | 5 reads | |
#18 | | 0 | 0 reads | |
#19 | Database Management Systems - Raghu Ramakrishnan
- Johannes Gehrke
| 0 | 1 read | |
#20 | | 4.36 | 15 reads | |
#21 |  Malware Data Science Malware Data Science: Attack Detection and Attribution - Joshua Saxe
- Hillary Sanders
| 0 | 0 reads | |
#22 | How to Hack Like a Ghost: Breaching the Cloud | 0 | 0 reads | |
#23 | The Ghidra Book: The Definitive Guide | 0 | 1 read | |
#24 | Foundations of Information Security: A Straightforward Introduction | 0 | 0 reads | |
#25 | | 0 | 0 reads | |
#26 | Black Hat Python: Python Programming for Hackers and Pentesters | 0 | 1 read | |
#27 | Hacking The Art Of Exploitation | 3.86 | 13 reads | |
#28 | | 4.75 | 4 reads | |
#29 | Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer | 0 | 0 reads | |
#30 | Black Hat Go: Go Programming For Hackers and Pentesters - Tom Steele
- Chris Patten
- Dan Kottmann
| 4 | 1 read | |
#31 | Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation | 0 | 2 reads | |
#32 | Cryptography Engineering: Design Principles and Practical Applications - Niels Ferguson
- Bruce Schneier
- Tadayoshi Kohno
| 4 | 4 reads | |
#33 | Introduction to Modern Cryptography: Principles and Protocols - Jonathan Katz
- Yehuda Lindell
| 0 | 0 reads | |
#34 | Software Project Survival Guide | 3 | 1 read | |
#35 | Working Effectively with Legacy Code | 4.41 | 22 reads | |
#36 | | 4.33 | 5 reads | |
#37 | | 3.79 | 16 reads | |
#38 | Penetration Testing: A Hands-On Introduction to Hacking | 3 | 2 reads | |
#39 | Site Reliability Engineering: How Google Runs Production Systems | 4.33 | 27 reads | |
#40 | Information Dashboard Design | 4.13 | 8 reads | |
#41 | A Philosophy of Software Design | 4.15 | 35 reads | |
#42 | Hackable: How to Do Application Security Right | 0 | 1 read | |
#43 | | 0 | 0 reads | |
#44 | The DevOps Handbook - Gene Kim
- Jez Humble
- Patrick Debois
- John Willis
| 4.18 | 26 reads | |
#45 | Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems - Heather Adkins
- Betsy Beyer
- Paul Blankinship
- Ana Oprea
- Piotr Lewandowski
- Adam Stubblefield
| 4 | 2 reads | |
#46 | | 0 | 0 reads | |
#47 | | 0 | 1 read | |
#48 | Advanced Penetration Testing: Hacking the World's Most Secure Networks | 0 | 2 reads | |
#49 | | 5 | 3 reads | |
#50 | | 0 | 0 reads | |
#51 | | 0 | 0 reads | |
#52 | | 0 | 0 reads | |
#53 | Cybersecurity Blue Team Toolkit | 0 | 0 reads | |
#54 | Malware Analyst's Cookbook and DVD - Michael Ligh
- Steven Adair
- Blake Hartstein
- Matthew Richard
| 5 | 2 reads | |
#55 | Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation - Bruce Dang
- Alexandre Gazet
- Elias Bachaalany
| 0 | 4 reads | |
#56 | Kali Linux Penetration Testing Bible | 0 | 0 reads | |
#57 | Unauthorised Access: Physical Penetration Testing for IT Security Teams | 0 | 0 reads | |
#58 | Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence | 0 | 1 read | |
#59 | | 0 | 0 reads | |
#60 | The Art of Memory Forensics - Michael Hale Ligh
- Andrew Case
- Jamie Levy
- AAron Walters
| 4 | 2 reads | |
#61 | Applied Cryptography: Protocols, Algorithms, and Source Code in C | 3.75 | 8 reads | |
#62 | | 0 | 0 reads | |
#63 | | 0 | 0 reads | |
#64 | Programming Collective Intelligence: Building Smart Web 2.0 Applications | 3.33 | 10 reads | |
#65 | | 3.67 | 4 reads | |
#66 | | 0 | 1 read | |
#67 | Primer on Client-Side Web Security - Philippe De Ryck
- Lieven Desmet
- Frank Piessens
- Martin Johns
| 0 | 0 reads | |
#68 | Practical Forensic Imaging: Securing Digital Evidence with Linux Tools | 0 | 2 reads | |
#69 | Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things - Fotios Chantzis
- Ioannis Stais
- Paulino Calderon
- Evangelos Deirmentzoglou
- Beau Woods
| 0 | 0 reads | |
#70 | Practical Malware Analysis - Michael Sikorski
- Andrew Honig
| 4.5 | 4 reads | |
#71 | Real-World Bug Hunting: A Field Guide to Web Hacking | 4.33 | 4 reads | |
#72 | Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats - Alex Matrosov
- Eugene Rodionov
- Sergey Bratus
| 0 | 1 read | |
#73 | Cyberjutsu: Cybersecurity for the Modern Ninja | 0 | 0 reads | |
#74 | | 0 | 0 reads | |
#75 | Modern Software Engineering | 4.25 | 13 reads | |
#76 | Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation | 4.29 | 20 reads | |
#77 | Threat Modeling: Designing for Security | 0 | 3 reads | |
#78 | Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments | 0 | 2 reads | |
#79 | The Rust Programming Language - Steve Klabnik
- Carol Nichols
| 4.46 | 30 reads | |
#80 | Hyperscale & Microcare - Nick Boucart
- Peter Verhasselt
| 0 | 0 reads | |
#81 | | 3 | 2 reads | |
#82 | Surviving Other People's Web APIs | 0 | 0 reads | |
#83 | Understanding Distributed Systems | 4.33 | 4 reads | |
#84 | | 4 | 3 reads | |
#85 | | 0 | 0 reads | |
#86 | | 0 | 0 reads | |
#87 | Designing Secure Software: A Guide for Developers | 0 | 0 reads | |
#88 | Web Security for Developers | 0 | 0 reads | |
#89 |  The IDA Pro Book The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler | 5 | 2 reads | |
#90 | The Practice of Network Security Monitoring: Understanding Incident Detection and Response | 0 | 0 reads | |
#91 | Clean Code: A Handbook of Agile Software Craftsmanship | 4.11 | 132 reads | |
#92 | Agile Principles, Patterns, and Practices in C# - Robert C. Martin
- Micah Martin
| 4.5 | 5 reads | |
#93 | Extreme Programming Explained: Embrace Change | 4.29 | 20 reads | |
#94 | Refactoring: Improving the Design of Existing Code | 3.97 | 47 reads | |
#95 | Code That Fits in Your Head: Heuristics for Software Engineering | 3 | 3 reads | |
#96 | Software Craftsman, The: Professionalism, Pragmatism, Pride | 0 | 3 reads | |
#97 | The Car Hacker's Handbook: A Guide for the Penetration Tester | 0 | 2 reads | |
#98 | Practical Packet Analysis | 5 | 2 reads | |
#99 | Kubernetes: Up and Running - Kelsey Hightower
- Brendan Burns
- Joe Beda
| 4.2 | 6 reads | |
#100 | Designing Distributed Systems: Patterns and Paradigms for Scalable, Reliable Services | 3 | 2 reads | |
#101 | | 0 | 0 reads | |