|
|
This Is How You Lose the Time War - Amal El-Mohtar
- Max Gladstone
|
How Linux Works: What Every Superuser Should Know |
So Good They Can't Ignore You |
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency |
The Thursday Murder Club - Richard Osman
- Petra Mrduljaš (Translator)
|
Dag liefje, met Mila gaat het goed en ik klungel lekker verder |
|
Getting Things Done: The Art of Stress-Free Productivity |
|
Hooked: How to Build Habit-Forming Products |
Code That Fits in Your Head: Heuristics for Software Engineering |
Information Dashboard Design |
Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation |
Software Architecture: the Hard Parts - Neal Ford
- Mark Richards
- Pramod Sadalage
- Zhamak Dehghani
|
Designing Data-Intensive Applications |
Learning Domain-Driven Design: Aligning Software Architecture and Business Strategy |
Modern Software Engineering |
|
How Google Tests Software - James A. Whittaker
- Jason Arbon
- Jeff Carollo
|
Secrets of a Buccaneer-Scholar |
The Principles of Product Development Flow |
A Philosophy of Software Design |
|
Site Reliability Engineering: How Google Runs Production Systems |
|
|
Fundamentals of Software Architecture: An Engineering Approach |
The Art of Strategy - Avinash K. Dixit
- Barry J. Nalebuff
|
|
|
|
|
Hackable: How to Do Application Security Right |
Het nationaalsocialisme als rancuneleer - Menno ter Braak
- Bas Heijne
|
Capitalist Realism: Is There No Alternative? |
|
The Three-Body Problem - Cixin Liu
- Ken Liu (Translator)
|
Hyperscale & Microcare - Nick Boucart
- Peter Verhasselt
|
Shape Up: Stop Running in Circles and Ship Work that Matters |
It Doesn't Have to Be Crazy at Work - Jason Fried
- David Heinemeier Hansson
|
Remote: Office Not Required - Jason Fried
- David Heinemeier Hansson
|
Waarom is het dat liefde zo is? |
|
|
|
|
How to Prevent the Next Pandemic |
The Righteous Mind: Why Good People Are Divided by Politics and Religion |
|
Grief is the Thing with Feathers |
|
The Boy Who Could Change the World |
|
Abolish Silicon Valley: How to Liberate Technology from Capitalism |
Eat Like You Care: An Examination of the Morality of Eating Animals - Gary L. Francione
- Anna E. Charlton
|
The Leprechauns of Software Engineering |
|
Slaughterhouse Slaughterhouse: The Shocking Story of Greed, Neglect, And Inhumane Treatment Inside the U.S. Meat Industry |
Some We Love, Some We Hate, Some We Eat: Why It's So Hard to Think Straight About Animals |
Farm Sanctuary Farm Sanctuary: Changing Hearts and Minds About Animals and Food |
The Omnivore's Dilemma: A Natural History of Four Meals |
|
The Anthropocene Reviewed |
|
The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win - Gene Kim
- Kevin Behr
- George Spafford
|
|
|
The DevOps Handbook - Gene Kim
- Jez Humble
- Patrick Debois
- John Willis
|
Ultralearning: Accelerate Your Career, Master Hard Skills and Outsmart the Competition |
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race |
Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems - Heather Adkins
- Betsy Beyer
- Paul Blankinship
- Ana Oprea
- Piotr Lewandowski
- Adam Stubblefield
|
|
|
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers |
|
|
|
|
|
Advanced Penetration Testing: Hacking the World's Most Secure Networks |
|
|
Malware Analyst's Cookbook and DVD - Michael Ligh
- Steven Adair
- Blake Hartstein
- Matthew Richard
|
Tribe of Hackers Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World - Marcus J. Carey
- Jennifer Jin
|
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity - Marcus J. Carey
- Jennifer Jin
|
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity - Marcus J. Carey
- Jennifer Jin
|
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto |
The Art of Attack: Attacker Mindset for Security Professionals |
Unauthorised Access: Physical Penetration Testing for IT Security Teams |
|
|
Threat Modeling: Designing for Security |
Tribe of Hackers Security Leaders - Marcus J. Carey
- Jennifer Jin
|
Kali Linux Penetration Testing Bible |
|
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation - Bruce Dang
- Alexandre Gazet
- Elias Bachaalany
|
The Art of Memory Forensics - Michael Hale Ligh
- Andrew Case
- Jamie Levy
- AAron Walters
|
Cybersecurity Blue Team Toolkit |