Recommended Books
Note
A “small” and non-exhaustive list of recommended books, no (affiliate) links (ok, maybe just Libgen), use your favorite online store (or not). Constantly updated (January, 2022).
Computers
- Modern Operating Systems by Andrew S. Tanenbaum, Herbert Bos
- Computer Systems: A Programmer’s Perspective by Randal E. Bryant, David R. O’Hallaron
Security
- Data Hiding - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocol by Michael Raggo and Chet Hosmer
- Ghost in the Wires by Kevin Mitnick
- Kali Linux Wireless Penetration Testing by Vivek Tamachandran and Cameron Buchanan
- The Art of Invisibility by Kevin Mitnick, Robert Vamosi
- The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers by Kevin D. Mitnick, William L. Simon
- Threat Modeling by Adam Shostack
- Spy the Lie: Former CIA Officers Teach You How to Detect Deception by Philip Houston, Michael Floyd and Susan Carnicero
- UNIX and Linux System Administration Handbook by Evi Nemeth, Garth Snyder and Trent R. Hein
- The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power by Shoshana Zuboff
- Defensive Security Handbook: Best Practices for Securing Infrastructure by Lee Brotherston and Amanda Berlin
- Advanced Penetration Testing: Hacking the World’s Most Secure Networks by Wil Allsopp
- Hiding from the Internet: Eliminating Personal Online Information by Michael Bazzell
- The Shellcoder’s Handbook: Discovering and Exploiting Security Holes by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte
- The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime by Scott Augenbaum
- Computer Hacking Beginners Guide - How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack by Alan T. Norman
- Cybersecurity in Digital Transformation: Scope and Applications by Dietmar P.F. Möller
- Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK Framework and open source tools by Valentina Palacín
- Practical Hardware Pentesting - A Guide to Attacking Embedded Systems and Protecting Them Against the Most Common Hardware Attacks by Jean-Georges Valle
- Cyberjutsu: Cybersecurity for the Modern Ninja by Ben McCarty
- How to Hack Like a Ghost: Breaching the Cloud by Sparc Flow
- The Complete Team Field Manual by Allyson Brian
- Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks by Aditya K. Sood
- How Cybersecurity Really Works: A Hands-On Guide for Total Beginners by Sam Grubb
- Assessing and Insuring Cybersecurity Risk by Ravi Das
- Designing Secure Systems by Michael Melone
Space
- Surviving Orbit the DIY Way: Testing the Limits Your Satellite Can and Must Match by Sandy Antunes
- DIY Satellite Platforms: Building a Space-Ready General Base Picosatellite for Any Mission by Sandy Antunes
- DIY Instruments for Amateur Space: Inventing Utility for Your Spacecraft Once it Achieves Orbit by Sandy Antunes
- DIY Comms and Control for Amateur Space: Talking and Listening to Your Satellite by Sandy Antunes
Literature
- The Teachings of Don Juan: A Yaqui Way of Knowledge by Carlos Castaneda
- A Separate Reality: Further Conversations with Don Juan by Carlos Castaneda
- The Last Days of Night by Graham Moore
- Propaganda by Edward L. Bernays
- The Telomere Effect: A Revolutionary Approach to Living Younger, Healthier, Longer by Dr. Elizabeth Blackburn