AWS Certified Solutions Architect Official Study Guide: Associate Exam |
Joe Baron, Hisham Baz, Tim Bixler, Biff Gaut |
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference |
Charles M. Kozierok |
Rootkits and Bootkits |
Alex Matrosov, Eugene Rodionov, and Sergey Bratus |
Serious Cryptography |
Jean-Philippe Aumasson |
Attacking Network Protocols |
James Forshaw |
Practical Binary Analysis |
Dennis Andriesse |
Penetration Testing |
Georgia Weidman |
Metasploit: The Penetration Tester's Guide |
David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni |
The IDA Pro Book, 2nd Edition |
Chris Eagle |
Routing TCP/IP, Volume 1 |
Jeff Doyle, Jennifer Carroll |
Routing TCP/IP, Volume 2 |
Jeff Doyle, Jennifer Carroll |
Pro DNS and BIND 10 |
Ron Aitchison |
Network Warrior |
Gary A. Donahue |
Secure Programming Cookbook for C and C++ |
John Viega and Matt Messier |
Site Reliability Engineering: How Google Runs Production Systems |
Niall Richard Murphy, Betsy Beyer, Chris Jones, and Jennifer Petoff |
Network Security Assessment: Know Your Network |
Chris McNab |
The Database Hacker’s Handbook: Defending Database Servers |
David Litchfield, Chris Anley, John Heasman, Bill Grindlay |
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes |
Chris Anley, John Heasman, Felix Linder, Gerardo Richarte |
The Mac Hacker’s Handbook |
Charlie Miller, Dino Dai Zovi |
The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws |
Dafydd Stuttard, Marcus Pinto |
iOS Hacker’s Handbook |
Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser, Vincenzo lozzo, Ralf-Philip Weinmann |
Programmer’s Guide to nCurses |
Dan Gookin |
Unix Network Programming, Volume 1: The Sockets Networking API |
W. Stevens, Bill Fenner, Andrew Rudoff |
Advanced Programming in the UNIX Environment |
W. Richard Stevens, Stephen A. Rago |
The Practice of Cloud System Administration: Designing and Operating Large Distributed Systems |
Thomas Limoncelli, Strata Chalup, Christina Hogan |
The Practice of System and Network Administration: DevOps and other Best Practices for Enterprise IT |
Thomas Limoncelli, Christina Hogan |
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations |
Gene Kim, Patrick Debois, John Willis, Jez Humble, John Allspaw |
Amazon Web Services in Action |
Andreas Wittig, Michael Wittig |
AWS Lambda in Action: Event-driven serverless applications |
Danilo Poccia |
Serverless Architecture on AWS |
Peter Sbarski |
Troubleshooting with the Windows Sysinternals Tools (2nd Edition) |
Russinovich Mark E., Margosis Aaron |
API Security in Action |
Neil Madden |
Bootstrapping Microservices with Docker, Kubernetes, and Terraform |
Ashley Davis |
Systems Performance Enterprise and the Cloud, 2nd Edition |
Brendan Gregg |