Hacker News Books

40,000 HackerNews book recommendations identified using NLP and deep learning

Scroll down for comments...

Cryptoassets: The Innovative Investor's Guide to Bitcoin and Beyond

Chris Burniske and Jack Tatar

4.6 on Amazon

3 HN comments

Fate: Return to Avalon: Takeuchi Takashi Art Works

Type-Moon and Takeuchi Takashi

? on Amazon

3 HN comments

Mastering Ethereum: Building Smart Contracts and DApps

Andreas M. Antonopoulos and Gavin Wood Ph. D.

4.6 on Amazon

3 HN comments

Fundamentals of Software Architecture: An Engineering Approach

Mark Richards, Neal Ford, et al.

4.6 on Amazon

3 HN comments

Algorithms of Oppression: How Search Engines Reinforce Racism

Safiya Umoja Noble

4.7 on Amazon

3 HN comments

Storytelling with Data: Let's Practice!

Cole Nussbaumer Knaflic

4.6 on Amazon

3 HN comments

Introduction to Machine Learning with Python: A Guide for Data Scientists

Andreas C. Müller and Sarah Guido

4.5 on Amazon

3 HN comments

Think Like a Programmer: An Introduction to Creative Problem Solving

V. Anton Spraul

4.7 on Amazon

3 HN comments

Logo Design Love: A Guide to Creating Iconic Brand Identities, 2nd Edition

David Airey

4.7 on Amazon

3 HN comments

Python 3 Object-Oriented Programming: Build robust and maintainable software with object-oriented design patterns in Python 3.8, 3rd Edition

Dusty Phillips

4.4 on Amazon

3 HN comments

Threat Modeling: Designing for Security

Adam Shostack

4.5 on Amazon

3 HN comments

Introduction to Statistics: An Intuitive Guide for Analyzing Data and Unlocking Discoveries

Jim Frost

4.3 on Amazon

3 HN comments

Ansible for DevOps: Server and configuration management for humans

Jeff Geerling

4.6 on Amazon

3 HN comments

Technology Strategy Patterns: Architecture as Strategy

Eben Hewitt

4.3 on Amazon

3 HN comments

Making Embedded Systems: Design Patterns for Great Software

Elecia White

4.6 on Amazon

3 HN comments

Prev Page 10/16 Next
Sorted by relevance

dsaccoonJuly 17, 2017

Sure. I've not read Threat Modeling, Malware Analyst's Cookbook and DVD, Unauthorized Access, Secrets and Lies and CEH v9 Study Guide.

getdavidhigginsonAug 17, 2015

There's a more recent book out titled "The 7 Qualities of Highly Secure Software" (2012) http://amazon.decenturl.com/secure-software Worth a read

There's also "Threat Modeling: Designing for Security" http://amazon.decenturl.com/threat-modeling (2014)

viraptoronJuly 17, 2017

> Threat Modeling: Designing for Security

Very pleasant read. It's the kind of book I'd expect at university. Some background / history, explanations, presenting both the used and the slightly obsolete methods, (with explanation why they're worse) some practical hints. It's a good threat modelling 101 book in my opinion.

Built withby tracyhenry

.

Follow me on