Below is a list of books, RFCs, white papers, and other documents that I tend to keep on my desk or bookmarked in my browser because they contain a wealth of information and I find myself referring to them often.

Technical Books

Title Authors
AWS Certified Solutions Architect Official Study Guide: Associate Exam Joe Baron, Hisham Baz, Tim Bixler, Biff Gaut
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference Charles M. Kozierok
Rootkits and Bootkits Alex Matrosov, Eugene Rodionov, and Sergey Bratus
Serious Cryptography Jean-Philippe Aumasson
Attacking Network Protocols James Forshaw
Practical Binary Analysis Dennis Andriesse
Penetration Testing Georgia Weidman
Metasploit: The Penetration Tester's Guide David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni
The IDA Pro Book, 2nd Edition Chris Eagle
Routing TCP/IP, Volume 1 Jeff Doyle, Jennifer Carroll
Routing TCP/IP, Volume 2 Jeff Doyle, Jennifer Carroll
Pro DNS and BIND 10 Ron Aitchison
Network Warrior Gary A. Donahue
Secure Programming Cookbook for C and C++ John Viega and Matt Messier
Site Reliability Engineering: How Google Runs Production Systems Niall Richard Murphy, Betsy Beyer, Chris Jones, and Jennifer Petoff
Network Security Assessment: Know Your Network Chris McNab
The Database Hacker’s Handbook: Defending Database Servers David Litchfield, Chris Anley, John Heasman, Bill Grindlay
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes Chris Anley, John Heasman, Felix Linder, Gerardo Richarte
The Mac Hacker’s Handbook Charlie Miller, Dino Dai Zovi
The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws Dafydd Stuttard, Marcus Pinto
iOS Hacker’s Handbook Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser, Vincenzo lozzo, Ralf-Philip Weinmann
Programmer’s Guide to nCurses Dan Gookin
Unix Network Programming, Volume 1: The Sockets Networking API W. Stevens, Bill Fenner, Andrew Rudoff
Advanced Programming in the UNIX Environment W. Richard Stevens, Stephen A. Rago
The Practice of Cloud System Administration: Designing and Operating Large Distributed Systems Thomas Limoncelli, Strata Chalup, Christina Hogan
The Practice of System and Network Administration: DevOps and other Best Practices for Enterprise IT Thomas Limoncelli, Christina Hogan
The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations Gene Kim, Patrick Debois, John Willis, Jez Humble, John Allspaw
Amazon Web Services in Action Andreas Wittig, Michael Wittig
AWS Lambda in Action: Event-driven serverless applications Danilo Poccia
Serverless Architecture on AWS Peter Sbarski
Troubleshooting with the Windows Sysinternals Tools (2nd Edition) Russinovich Mark E., Margosis Aaron
API Security in Action Neil Madden
Bootstrapping Microservices with Docker, Kubernetes, and Terraform Ashley Davis
Systems Performance Enterprise and the Cloud, 2nd Edition Brendan Gregg

Request for Comments

Number Title
1918 Address Allocation for Private Internets
2822 Internet Message Format
2827 Defeating Denial of Service Attacks which employ IP Source Address Spoofing
3704 Ingress Filtering for Multihomed Networks
5635 Remote Triggered Black Hole Filtering with Unicast Reverse Path Forwarding (uRPF)
6177 IPv6 Address Assignment to End Sites