Interesting and Useful Books I've Read

Interesting and Useful Books I've Read

Gray Hat Hacking

The DevOps Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations

Murach's PHP and MySQL

Kubernetes and Docker - An Enterprise Guide: Effectively containerize applications, integrate enterprise systems, and scale applications in your enterprise

Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line

Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems

ng-book: The Complete Guide to Angular

The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide

Java Concurrency in Practice

Linux Pocket Guide: Essential Commands

Designing Secure Software: A Guide for Developers

Alice and Bob Learn Application Security

Mastering Python Networking: Utilize Python packages and frameworks for network automation, monitoring, cloud, and management

Practical Cryptography

Cryptography Engineering: Design Principles and Practical Applications

Introduction to Algorithms

SQL Queries for Mere Mortals: A Hands-On Guide to Data Manipulation in SQL

Continuous Delivery with Docker and Jenkins: Create secure applications by building complete CI/CD pipelines

A Programmer's Guide to Computer Science: A virtual degree for the self-taught developer

Clean Code: A Handbook of Agile Software Craftsmanship

Microservices with Spring Boot and Spring Cloud - Second Edition: Build resilient and scalable microservices using Spring Cloud, Istio, and Kubernetes

ASP.NET Core 6 and Angular - Fifth Edition: Full-stack web development with ASP.NET 6 and Angular 13

Understanding Cryptography: A Textbook for Students and Practitioners

Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters

Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire

A Common-Sense Guide to Data Structures and Algorithms, Second Edition: Level Up Your Core Programming Skills

OCA: Oracle Certified Associate Java SE 8 Programmer I Study Guide

OCP: Oracle Certified Professional Java SE 8 Programmer II Study Guide

Cracking the Coding Interview

Grokking Algorithms

Black Hat Rust - Applied offensive security with the Rust programming language

CompTIA Security+ All-in-One Exam Guide Exam SY0-601

C++ Primer

CompTIA Network+ Certification All-in-One Exam Guide

CCNA 200-301 Official Cert Guide Library

CCNP and CCIE Collaboration Core CLCOR 350-801 Official Cert Guide