Interesting and Useful Books I've ReadDamon Vessey·Apr 16, 2024·3 min readGray Hat Hacking The DevOps Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations Murach's PHP and MySQL Kubernetes and Docker - An Enterprise Guide: Effectively containerize applications, integrate enterprise systems, and scale applications in your enterprise Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems ng-book: The Complete Guide to Angular The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Java Concurrency in Practice Linux Pocket Guide: Essential Commands Designing Secure Software: A Guide for Developers Alice and Bob Learn Application Security Mastering Python Networking: Utilize Python packages and frameworks for network automation, monitoring, cloud, and management Practical Cryptography Cryptography Engineering: Design Principles and Practical Applications Introduction to Algorithms SQL Queries for Mere Mortals: A Hands-On Guide to Data Manipulation in SQL Continuous Delivery with Docker and Jenkins: Create secure applications by building complete CI/CD pipelines A Programmer's Guide to Computer Science: A virtual degree for the self-taught developer Clean Code: A Handbook of Agile Software Craftsmanship Microservices with Spring Boot and Spring Cloud - Second Edition: Build resilient and scalable microservices using Spring Cloud, Istio, and Kubernetes ASP.NET Core 6 and Angular - Fifth Edition: Full-stack web development with ASP.NET 6 and Angular 13 Understanding Cryptography: A Textbook for Students and Practitioners Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software The Ultimate Kali Linux Book - Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire A Common-Sense Guide to Data Structures and Algorithms, Second Edition: Level Up Your Core Programming Skills OCA: Oracle Certified Associate Java SE 8 Programmer I Study Guide OCP: Oracle Certified Professional Java SE 8 Programmer II Study Guide Cracking the Coding Interview Grokking Algorithms Black Hat Rust - Applied offensive security with the Rust programming language CompTIA Security+ All-in-One Exam Guide Exam SY0-601 C++ Primer CompTIA Network+ Certification All-in-One Exam Guide CCNA 200-301 Official Cert Guide Library CCNP and CCIE Collaboration Core CLCOR 350-801 Official Cert Guide Share this