Book Name | Author | Rating* | Key Takeaways* |
---|---|---|---|
The Art of Software Security Assessment - Identifying and Preventing Software Vulnerabilities |
John McDonald, Justin Schuh, and Mark Dowd | * * * * * | TBD |
The Tangled Web - A Guide to Securing Modern Web Applications |
Michał Zalewski | * * * * * | TBD |
Web Application Obfuscation |
Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes, David Lindsay |
* * * * * | TBD |
Building Secure & Reliable Systems | Google Security | * * * * * | TBD |
How to Solve it | George Pólya | * * * * * | TBD |
Algorithms to Live By - The Computer Science of Human Decisions |
Brian Christian and Tom Griffiths | * * * * | TBD |
The Phoenix Project | Gene Kim Et al. | * * * * |
Big picture insights of how Tech and Business go hand in hand with DevOps making it possible to deliver products at speed. No technicalities of DevOps. Funnily Bashes InfoSec teams, which makes me laugh everytime when Sec Teams create a blocker for Devs on silly items. (But hey, Sec Teams can never be enough paranoid.) |
Securing DevOps: Security in the Cloud | Julien Vehent | * * * * | TBD |
The Art of Exploitation 2e | Jon Erickson | * * * * * | Notes are here. |
iOS Hacker's Handbook | Charlie Miller Et al. | TBD | Here are the notes. |
The Web Application Hacker's Handbook - Discovering and Exploiting Security Flaws |
Dafydd Stuttard and Marcus Pinto | * * * * * | TBD |
Permanent Record | Edward Snowden | TBD | TBD |
Surely You're Joking, Mr. Feynman | Richard Feynman | * * * * | TBD |
OAuth 2 in Action | Antonio Sanso and Justin Richer | * * * * | Easy and Quick Read, gives concrete info & terminilogy related to Oauth2. |