TECHNICAL SKILLS

44 skills in this category
technical
The Algorithm Design Manual
The Algorithm Design Manual, 2nd Edition
Steven S. Skiena
The practical algorithm designer's reference — technique + problem catalog. Skiena's 'war stories' show how problems arise in practice. The Hitchhiker's Guide catalogs 75 classic problems with implementations.
technical
The Art of Multiprocessor Programming
The Art of Multiprocessor Programming
Maurice Herlihy & Nir Shavit
The definitive textbook on concurrent programming theory — linearizability, mutual exclusion algorithms, lock-free data structures, hardware primitives, and transactional memory. Combines rigorous theory with practical Java implementations.
technical
Black Hat Python, 2nd Edition
Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters
Justin Seitz & Tim Arnold
Python 3 offensive security tooling from scratch — raw sockets to Scapy to Windows internals. Covers networking, packet sniffing, web hacking, Burp extensions, GitHub C2, Windows trojaning (keylogger/shellcode/sandbox detection), data exfiltration, privilege escalation, and Volatility memory forensics.
technical
The Boost Graph Library
The Boost Graph Library: User Guide and Reference Manual
Jeremy G. Siek, Lie-Quan Lee & Andrew Lumsdaine
Generic C++ graph library: adjacency_list/adjacency_matrix graph classes, BFS/DFS/topological sort/Dijkstra/Bellman-Ford/Kruskal algorithms, property maps, visitor customization hooks, and the concepts-and-models generic programming design pattern that makes all BGL types interoperable.
technical
Core Techniques and Algorithms in Game Programming
Core Techniques and Algorithms in Game Programming
Daniel Sanchez-Crespo Dalmau
Comprehensive game programming reference: fixed-timestep game loop, component-entity architecture, game AI (FSM/A*/steering/influence maps), 3D pipeline (BSP/LOD/terrain), skeletal animation with IK, camera systems (FPS/third-person/cinematic), particle systems, and multiplayer networking with interpolation.
technical
C++ Concurrency in Action
C++ Concurrency in Action: Practical Multithreading
Anthony Williams
Complete guide to C++11 multithreading — from basic thread management and mutex patterns through lock-free data structures and the memory model. Williams is the primary author of the Boost Thread Library and C++11 concurrency proposals.
technical
C++ in a Nutshell
C++ in a Nutshell
Ray Lischner
Complete C++ reference: template mechanics (function/class templates, total/partial specialization, type deduction), type traits with tag dispatch, overload resolution rules, STL container selection guide, iterator categories and safety rules, erase-remove idiom, and custom container design with allocator support.
technical
C++ Network Programming
C++ Network Programming, Volume 1: Mastering Complexity with ACE and Patterns
Douglas C. Schmidt & Stephen D. Huston
Concurrent OO network programming in C++: server architecture patterns (iterative, thread-per-request, thread-per-connection, thread-pool, reactive select-based), process vs thread tradeoffs, synchronization primitives (mutex, RW-lock, condvar, semaphore), socket IPC, non-blocking I/O, and the ACE toolkit wrapper facade philosophy.
technical
The C++ Programming Language
The C++ Programming Language, 4th Edition
Bjarne Stroustrup
Definitive C++11 reference by Stroustrup: type system, uniform initialization, RAII/ownership, class design (Rule of Five), operator overloading, virtual dispatch, templates, generic programming, variadic templates, metaprogramming, STL containers/algorithms/iterators, lambdas, concurrency (threads/futures/atomics), and C++20 ranges.
technical
Programming Principles and Practice Using C++
Programming Principles and Practice Using C++
Bjarne Stroustrup
Stroustrup's C++ pedagogy textbook: class design from struct to class with invariants and pre/postconditions, deep copy semantics (copy constructor + assignment), vector internals (sz/elem/space capacity model, amortized push_back), RAII with exception safety guarantees (basic/strong/no-throw), grammar-to-recursive-descent-parser translation, and embedded systems C++ constraints (no new/delete/exceptions in hard real-time, pool allocators, bitfields).
technical
The C++ Standard Library
The C++ Standard Library: A Tutorial and Reference, 2nd Edition
Nicolai M. Josuttis
Complete C++11 Standard Library reference — containers with complexity analysis, 50+ algorithms, iterator categories, move semantics, lambdas, smart pointers, and strings. The definitive STL guide.
technical
Cracking the Coding Interview
Cracking the Coding Interview, 6th Edition
Gayle Laakmann McDowell
Comprehensive technical interview prep: Big O analysis, data structures (hash tables, trees, graphs, heaps, tries), algorithm patterns (sorting, searching, DP, recursion, bit manipulation), system design, and behavioral storytelling — with company-specific interview guidance.
technical
Cult of the Dead Cow
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
Joseph Menn
History of cDc (Cult of the Dead Cow), the pioneering hacking supergroup that coined hacktivism, built Back Orifice to force Windows security reckoning, testified to Congress under hacker handles, and whose alumni (Mudge/Dildog/Weld Pond) built the modern professional infosec industry.
technical
DAX Mastery
The Definitive Guide to DAX, 2nd Edition
Alberto Ferrari, Marco Russo
Expert DAX from Ferrari & Russo — the definitive reference. Master evaluation contexts, CALCULATE mechanics, iterators, time intelligence, and advanced data modeling patterns.
technical
Domain-Driven Design
Domain-Driven Design: Tackling Complexity in the Heart of Software
Eric Evans
Tactical and strategic patterns for software where domain complexity is the central challenge. Evans' canonical text distilled into actionable design guidance.
technical
Effective Modern C++
Effective Modern C++
Scott Meyers
42 guidelines for effective C++11/14: type deduction (templates/auto/decltype), modern initialization, nullptr/constexpr/override/noexcept, smart pointers, rvalue references, move semantics, perfect forwarding, lambdas, and concurrency with futures and thread_local.
technical
Effective STL
Effective STL: 50 Specific Ways to Improve Your Use of the Standard Template Library
Scott Meyers
50 specific guidelines for correct, efficient STL usage. Meyers covers the non-obvious pitfalls: container selection traps, iterator invalidation, erase-remove idiom, equality vs equivalence in associative containers, sort algorithm selection, and functor design rules.
technical
Elementary Functions: Algorithms and Implementation
Elementary Functions: Algorithms and Implementation, 2nd Ed.
Jean-Michel Muller
Rigorous treatment of transcendental function implementation: IEEE 754 fundamentals (ULPs, rounding modes, FMA, subnormals), polynomial approximation via Chebyshev/Remez minimax, Horner/Estrin evaluation, range reduction (Cody-Waite, Payne-Hanek for large arguments), CORDIC for sin/cos/atan, and correct-rounding via Ziv's multilevel strategy.
technical
The Ethics of Hacking
The Ethics of Hacking: An Ethical Framework for Political Hackers
Ross W. Bellaby
Academic ethical framework for political hacking using just-war theory analogues. Argues hacking is justified when protecting vital interests (physical integrity, autonomy, liberty, privacy) and the state fails its protective duty. Six criteria: just cause, right intention, legitimate authority, last resort, proportionality, discrimination.
technical
Foundations of Python Network Programming
Foundations of Python Network Programming
John Goerzen
Python network programming fundamentals: TCP/UDP socket clients/servers, DNS resolution, HTTP/web client and HTML parsing, SMTP/POP/IMAP email, FTP, database clients (DB-API 2.0), SSL/TLS, and concurrency (forking/threading/select/asyncio).
technical
Evading EDR
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems
Matt Hand
Windows EDR internals from kernel callbacks to AMSI — how sensors work, what they see, and the architectural principles behind robust detection engineering. Required reading for both detection engineers and red teamers.
technical
Gray Hat Hacking
Gray Hat Hacking: The Ethical Hacker's Handbook, 6th Edition
Allen Harper, Ryan Linn, Moses Frost, et al
Comprehensive ethical hacking handbook covering exploit development (Linux/Windows/kernel), C2 deployment and EDR evasion, PowerShell living-off-the-land, Active Directory attacks (Kerberoasting, BloodHound, persistence), IoT/embedded hardware attacks, SDR, cloud hacking (AWS/Azure/containers/Kubernetes), and threat hunting with MITRE ATT&CK.
technical
Gray Hat Python
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Justin Seitz
Python for Windows security tooling — debugger internals, all three breakpoint types, function hooking, DLL/code injection, fuzzing with Sulley, and IDAPython automation. Uses ctypes to interface directly with the Windows API.
technical
The Hacker Playbook 3
The Hacker Playbook 3: Practical Guide to Penetration Testing (Red Team Edition)
Peter Kim
Red team operations playbook — from recon through web exploitation, AD attack paths, lateral movement, and social engineering. Includes lab exercises and real-world attack chains against simulated environments.
technical
Hacking & Security
Hacking & Security: The Comprehensive Guide to Penetration Testing and Cybersecurity
Michael Kofler et al
Comprehensive pentesting reference covering Kali Linux toolchain (nmap/hydra/Wireshark/Burp/Metasploit/Empire/Sliver), offline attacks (physical access, BitLocker/LUKS, password reset), web testing (Juice Shop, OWASP methodology), network attacks (ARP poisoning, Responder, pass-the-hash), and defensive hardening (10 steps, CVSS prioritization).
technical
Hacking APIs
Hacking APIs: Breaking Web Application Programming Interfaces
Corey J. Ball
Complete API security testing methodology — from discovery through authentication attacks, BOLA/BFLA, mass assignment, injection, GraphQL-specific attacks, and rate limit bypass. Includes a comprehensive testing checklist.
technical
Hacking: The Art of Exploitation
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
Low-level exploitation from first principles — C programming, x86 memory layout, buffer overflows, format strings, shellcode writing, network hacking, and countermeasure bypasses. Erickson explains the 'why' behind techniques rather than just the 'how'.
technical
Hacking Kubernetes
Hacking Kubernetes: Threat-Driven Analysis and Defense
Andrew Martin & Michael Hausenblas
Threat-driven Kubernetes security guide: pod hardening (securityContext/capabilities/seccomp), RBAC audit and privilege escalation paths, network policies (default deny), supply chain (Trivy/cosign/SBOM), container runtime isolation (gVisor/Kata), secrets management (Vault/External Secrets), OPA/Gatekeeper policy, and Falco intrusion detection.
technical
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot & Scott A. Vanstone
The rigorous academic reference for applied cryptography — block/stream ciphers, cipher modes (ECB/CBC/CTR/GCM), hash functions (birthday bound, collision resistance), RSA (OAEP/PSS), DH/ECDH, ECC, digital signatures (DSA/ECDSA/EdDSA), authentication protocols, key establishment, and cryptographic attack taxonomy.
technical
The Hardware Hacking Handbook
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
Jasper van Woudenberg & Colin O'Flynn
Comprehensive hardware security attack guide — finding debug interfaces (JTAG/UART), firmware extraction (SPI/JTAG), fault injection techniques (voltage/clock/EM/optical), power analysis attacks (SPA/DPA/CPA with Python), real-world examples (PS3, Trezor One, Philips Hue), and countermeasure design.
technical
Linux Device Drivers
Linux Device Drivers, 3rd Edition
Jonathan Corbet, Alessandro Rubini & Greg Kroah-Hartman
The definitive Linux driver development guide — char drivers (file_operations, ioctl, blocking I/O, poll), kernel synchronization (mutex/spinlock/completions), interrupt handling (top/bottom half), DMA (streaming/coherent), block drivers, network drivers (sk_buff), and the Linux device model (kobject/sysfs).
technical
Understanding Linux Network Internals
Understanding Linux Network Internals
Christian Benvenuti
Deep dive into Linux kernel networking internals: sk_buff socket buffer lifecycle (allocation, pointer manipulation, stack traversal), net_device NIC driver registration, softirq receive/transmit path (NAPI), IPv4 forwarding and fragmentation, ARP/neighboring subsystem state machine, and routing table FIB lookup with route cache.
technical
The Definitive Guide to Linux Network Programming
The Definitive Guide to Linux Network Programming
Keir Davis, John W. Turner & Nathan Yocom
Linux socket programming from first principles: Berkeley socket API lifecycle, three server architectures (iterative/select/fork), TCP vs UDP and stateful vs stateless protocol design, OpenSSL TLS integration (SSL_CTX/SSL layer setup), and secure C coding (buffer overflow prevention, unsafe function replacements, error-handling wrappers).
technical
Mastering Bitcoin
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Andreas M. Antonopoulos
Bitcoin protocol internals from first principles — keys, addresses, UTXO model, Script language, P2P network, Merkle trees, mining, and consensus. Antonopoulos frames Bitcoin as a decentralized trust network, not just digital money.
technical
Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing, 4th Edition
Vijay Kumar Velu
Advanced Kali Linux pentesting guide: OSINT/stealth recon, wireless attacks (WPA2/WPS/Evil Twin), web exploitation (Burp/sqlmap/BeEF), cloud exploitation (AWS IAM/S3), AV evasion (Veil/fileless/UAC bypass), Metasploit, lateral movement (CrackMapExec/ProxyChains), privilege escalation, and Kerberos golden ticket attack.
technical
Mastering Malware Analysis
Mastering Malware Analysis, 2nd Edition
Alexey Kleymenov & Amr Thabet
Complete malware analysis methodology — from triage through static/dynamic/reverse engineering analysis. Covers anti-analysis bypass, APT techniques, MITRE ATT&CK mapping, IoT malware, and report writing.
technical
Mathematics for Computer Science
Mathematics for Computer Science
Eric Lehman & Tom Leighton
MIT's discrete mathematics course textbook — proof techniques (induction, contradiction), number theory (modular arithmetic, Fermat/Euler), graph theory (trees, coloring, planar, Hall's theorem), recurrences (Master Theorem, linear recurrences), counting (combinations, inclusion-exclusion, pigeonhole), probability (Bayes, independence, birthday paradox), random variables (binomial, geometric), expected value (linearity), and tail bounds (Markov, Chernoff).
technical
Pearls of Functional Algorithm Design
Pearls of Functional Algorithm Design
Richard Bird
30 algorithm 'pearls' derived from specifications using equational reasoning in Haskell. Bird demonstrates that efficiency emerges from algebraic manipulation of a correct-but-naive specification — no separate proofs needed.
technical
Red Team Field Manual (RTFM)
Red Team Field Manual (RTFM)
Ben Clark
Compact operator field reference — Linux/Windows command syntax for post-exploitation, networking (tunneling, proxies, pivots), file operations, web attacks, databases, scripting one-liners, and wireless — organized for fast lookup during active engagements.
technical
Social Engineering: The Science of Human Hacking
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
The complete human hacking framework — from OSINT and target profiling through influence, elicitation, and nonverbals, to the M.A.P.P. defense program. Hadnagy draws on Cialdini, Ekman, and Dreeke to build a science-grounded SE methodology.
technical
TCP/IP Illustrated, Volume 1
TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition
Kevin R. Fall & W. Richard Stevens
The definitive protocol reference — every TCP/IP protocol explained with packet captures and field-by-field analysis. Covers IPv4/IPv6, ARP, ICMP, UDP, TCP (connection, reliability, congestion control), DNS, NAT, and protocol-layer attacks.
technical
Twisted Network Programming Essentials
Twisted Network Programming Essentials, 2nd Edition
Jessica McKellar & Abe Fettig
Twisted event-driven networking for Python: reactor pattern, Protocol/Factory/Transport layering, Deferred callback chains, LineReceiver state machines, Twisted Web server and client, SSH via Conch, and testing with Trial's StringTransport mock.
technical
Understanding the Linux Kernel
Understanding the Linux Kernel, 3rd Edition
Daniel P. Bovet & Marco Cesati
Comprehensive deep-dive into Linux 2.6 kernel internals — memory addressing (paging/segmentation), process management (task_struct, context switch, CoW), scheduling, synchronization primitives, memory management (buddy/slab), VFS, device drivers, page cache, IPC, and ELF execution.
technical
ZAP Cookbook
Zed Attack Proxy Cookbook
Ryan Soper, Nestor N Torres, Ahmed Almoailu
Practical OWASP ZAP recipes for web app pentesting: Docker/GUI setup, Python API automation, spidering (traditional + AJAX), authentication bypass, IDOR, cookie security, CSRF, session hijacking, XSS/SQLi/SSTI/SSRF/command injection fuzzing, business logic manipulation, report generation, and CI/CD integration.