| AWS Certified Solutions Architect Official Study Guide: Associate Exam |
Joe Baron, Hisham Baz, Tim Bixler, Biff Gaut |
| The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference |
Charles M. Kozierok |
| Rootkits and Bootkits |
Alex Matrosov, Eugene Rodionov, and Sergey Bratus |
| Serious Cryptography |
Jean-Philippe Aumasson |
| Attacking Network Protocols |
James Forshaw |
| Practical Binary Analysis |
Dennis Andriesse |
| Penetration Testing |
Georgia Weidman |
| Metasploit: The Penetration Tester's Guide |
David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni |
| The IDA Pro Book, 2nd Edition |
Chris Eagle |
| Routing TCP/IP, Volume 1 |
Jeff Doyle, Jennifer Carroll |
| Routing TCP/IP, Volume 2 |
Jeff Doyle, Jennifer Carroll |
| Pro DNS and BIND 10 |
Ron Aitchison |
| Network Warrior |
Gary A. Donahue |
| Secure Programming Cookbook for C and C++ |
John Viega and Matt Messier |
| Site Reliability Engineering: How Google Runs Production Systems |
Niall Richard Murphy, Betsy Beyer, Chris Jones, and Jennifer Petoff |
| Network Security Assessment: Know Your Network |
Chris McNab |
| The Database Hacker’s Handbook: Defending Database Servers |
David Litchfield, Chris Anley, John Heasman, Bill Grindlay |
| The Shellcoder’s Handbook: Discovering and Exploiting Security Holes |
Chris Anley, John Heasman, Felix Linder, Gerardo Richarte |
| The Mac Hacker’s Handbook |
Charlie Miller, Dino Dai Zovi |
| The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws |
Dafydd Stuttard, Marcus Pinto |
| iOS Hacker’s Handbook |
Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser, Vincenzo lozzo, Ralf-Philip Weinmann |
| Programmer’s Guide to nCurses |
Dan Gookin |
| Unix Network Programming, Volume 1: The Sockets Networking API |
W. Stevens, Bill Fenner, Andrew Rudoff |
| Advanced Programming in the UNIX Environment |
W. Richard Stevens, Stephen A. Rago |
| The Practice of Cloud System Administration: Designing and Operating Large Distributed Systems |
Thomas Limoncelli, Strata Chalup, Christina Hogan |
| The Practice of System and Network Administration: DevOps and other Best Practices for Enterprise IT |
Thomas Limoncelli, Christina Hogan |
| The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations |
Gene Kim, Patrick Debois, John Willis, Jez Humble, John Allspaw |
| Amazon Web Services in Action |
Andreas Wittig, Michael Wittig |
| AWS Lambda in Action: Event-driven serverless applications |
Danilo Poccia |
| Serverless Architecture on AWS |
Peter Sbarski |
| Troubleshooting with the Windows Sysinternals Tools (2nd Edition) |
Russinovich Mark E., Margosis Aaron |
| API Security in Action |
Neil Madden |
| Bootstrapping Microservices with Docker, Kubernetes, and Terraform |
Ashley Davis |
| Systems Performance Enterprise and the Cloud, 2nd Edition |
Brendan Gregg |