Want to know what's going on in my head? Here's what I've been reading:
Titles are listed in reverse cronological order of time of reading. The list starts at around January 2001. List far from complete.
If it's not obvious, it's probably worth noting that I read alot of computer books. So if you get a few entries into this list and conclude that I read alot of boring crap, well then you're right.
In the queue (acquired but not yet read, or currently reading):
Read:
- Wolfe, Tom. The Right Stuff
- Kelly, Jack. Gunpowder: Alchemy, Bombards, and Pyrotechnics : The History of the Explosive That Changed the World
- Wilson, Daniel H. How to Survive a Robot Uprising: Tips on defending yourself against the coming rebellion
- Chromatic. Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving
- Spolsky, Joel. Joel on Software
- Hiltzik, Michael. Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age
- Hafner, Katie. Where Wizards Stay Up Late: the origins of the Internet
- Battelle, John. The Search
- Raymond, Eric. The Art of Unix Programming
- Reinhardt, Robert. Macromedia Flash MX 2004 Bible
- Reinhardt, Robert. Macromedia Flash MX 2004 ActionScript Bible
- Torvalds, Linus. Just for Fun. Tale of an Accidental Revolutionary
- Hagen, William. Hacking the Tivo, Second Edition
- Botton, Alain de. Essays in Love
- Hyde, John. USB Design by Example: A Practical Guide to Building I/O Devices
- Kolesnikov, Oleg. Building Linux Virtual Private Networks
- Levy, Steven. crypto: how the code rebels beat the government - saving privacy in the digital age
- Orwell, George. 1984
- Bester, Alfred and Zelazny, Roger. Psycho Shop
- Bamford, James. Body of Secrets: Anatomy of the ultra-secret National Security Agency
- Leighton, Luke Kenneth Casson. DCE/RPC over SMB. Samba and Windows NT Domain Internals
- Van Wyk, Kenneth. Incident Response
- Tyson, Eric. Personal Finance for Dummies
- Bester, Alfred. The Demolished Man
- Ryan, Peter and Schneider, Steve. Modelling and analysis of security protocols
- Bester, Alfred. The Stars My Destination
- Marinacci, Barbara. Linus Pauling: In his own words
- Garfinkel, Simpson. Practical UNIX and Internet Security
- Freeman, Miller, et al. UNIX Security
- Wolf, Wayne. Computers as Components: Principles of Embedded Computing System Design
- Berger, Arnold S. Embedded Systems Design: An Introduction to Processes, Tools, and Techniques
- Viega, John and McGraw, Gary. Building Secure Software
- Anderson, Ross. Security Engineering: A Guide to Building Dependable Distributed Systems
- Barry, Dave. Dave Barry in Cyberspace
- Wall, Kurt, et al. Linux Programming Unleashed
- Schneier, Bruce. Secrets and Lies: Digital Security in a Networked World
- Hatch, Bruce, et al. Hacking Linux Exposed.
- Bovet, Daniel P. Understanding the Linux Kernel
- Rescorla, Eric. SSL and TLS
- Tolkien, J.R.R. Return of the King
- Tolkien, J.R.R. The Two Towers
- Tolkien, J.R.R. Fellowship of the Ring
- Stansel, Paul et al. Configuring Citrix Metaframe for Windows 2000 Terminal Services
- Friedl, Jeffrey E. F. Mastering Regular Expressions
- Gasser, Morrie. Building a Secure Computer System