Computing
- Grammar
- [ ] GoalKicker. Linux Notes for Professionals.
- [ ] GoalKicker. Bash Notes for Professionals.
- [ ] Irianto, I. Learn Vim.
- [ ] Irianto, I. Gourmet Vim.
- [ ] GoalKicker. Git Notes for Professionals.
- [ ] Hack The Box. Intro to Blue Team.
- [ ] Hack The Box. Intro to Red Team.
- [ ] Hack The Box. OWASP Top 10 (2021).
- [ ] Kaggle. Intro to Programming.
- [ ] Kaggle. Python.
- [ ] GoalKicker. Python Notes for Professionals.
- [ ] Kaggle. Pandas.
- [ ] Kaggle. Data Cleaning.
- [ ] King, K. N. C Programming: A Modern Approach.
- [ ] Kernighan, B. W., & Ritchie, D. M. The C Programming Language.
- [ ] GoalKicker. C Notes for Professionals.
- [ ] Klabnik, S., & Nichols, C. The Rust Programming Language.
- [ ] Blandy, J. Programming Rust.
- [ ] Kaggle. Intro to SQL.
- [ ] Kaggle. Advanced SQL.
- [ ] GoalKicker. SQL Notes for Professionals.
- [ ] GoalKicker. JavaScript Notes for Professionals.
- [ ] GoalKicker. Node.js Notes for Professionals.
- [ ] Jones, D., & Hicks, J. Learn PowerShell in a Month of Lunches.
- [ ] GoalKicker. PowerShell Notes for Professionals.
- [ ] Troelsen, A. Pro C#.
- [ ] Hillegass, A., & Ward, M. Objective-C Programming: The Big Nerd Ranch Guide.
- [ ] USACO. Bronze.
- [ ] Kaggle. R Guide.
- [ ] Kaggle. JAX Guide.
- [ ] Kaggle. TensorFlow Guide.
- Logic
- [ ] Graham, R. L., Knuth, D. E., & Patashnik, O. Concrete Mathematics: A Foundation for Computer Science.
- [ ] Rosen, K. H. Elementary Number Theory and Its Applications.
- [ ] Diestel, R. Graph Theory.
- [ ] Graph Theory.
- [ ] Bryant, R. E., & O'Hallaron, D. R. Computer Systems: A Programmer's Perspective.
- [ ] Jorgensen, E. x86-64 Assembly with Ubuntu.
- [ ] Intel. 64 and IA-32 Architectures Software Developer Manuals.
- [ ] Yosifovich, P., et al. Windows Internals, Part 1.
- [ ] Dordal, P. An Introduction to Computer Networks.
- [ ] Benvenuti, C. Understanding Linux Network Internals.
- [ ] Cormen, T. H. Algorithms Unlocked.
- [ ] Skiena, S. S. The Algorithm Design Manual.
- [ ] MIT 6.006. Introduction to Algorithms.
- [ ] Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. Introduction to Algorithms.
- [ ] Levitin, A., & Levitin, M. Algorithmic Puzzles.
- [ ] Needham, M., & Hodler, A. E. Graph Algorithms.
- [ ] MIT 6.046J. Design and Analysis of Algorithms.
- [ ] MIT 6.851. Advanced Data Structures.
- [ ] Skiena, S. S. Advanced Algorithm Design.
- [ ] MIT 6.890. Algorithmic Lower Bounds.
- [ ] Leskovec, J., Rajaraman, A., & Ullman, J. D. Mining of Massive Datasets.
- [ ] Merritt, D. Adventure in Prolog.
- [ ] Covington, M. A. Coding Guidelines for Prolog.
- [ ] Covington, M. A. Natural Language Processing for Prolog Programmers.
- [ ] Yurichev, D. SAT/SMT by Example.
- [ ] Spaniel, W. Game Theory 101: The Complete Textbook.
- [ ] Nisan, N., et al. Algorithmic Game Theory.
- [ ] Kochenderfer, M. J., et al. Algorithms for Decision Making.
- [ ] Hack The Box. CPTS Preparation.
- [ ] Hack The Box. Binary Exploitation.
- [ ] Hack The Box. Reverse Engineering.
- [ ] Hack The Box. Detecting Active Directory Attacks.
- [ ] Hack The Box. Intro to Blockchain.
- [ ] Hack The Box. Mobile Exploitation.
- [ ] Hack The Box. Hardware Exploitation.
- [ ] Hack The Box. ICS and SCADA Exploitation.
- [ ] Hack The Box. Cloud Track.
- [ ] Hack The Box. AI and ML Exploitation.
- [ ] Kaggle. Intro to Machine Learning.
- [ ] Kaggle. Intermediate Machine Learning.
- [ ] Kaggle. Feature Engineering.
- [ ] Kaggle. Intro to Deep Learning.
- [ ] Kaggle. Computer Vision.
- [ ] Kaggle. Natural Language Processing Guide.
- [ ] Kaggle. Time Series.
- [ ] Kaggle. Transfer Learning for CV Guide.
- [ ] Kaggle. Intro to Game AI and Reinforcement Learning.
- [ ] USACO. Silver.
- [ ] USACO. Gold.
- Rhetoric
- [ ] Seacord, R. C. Secure Coding in C and C++.
- [ ] Laaksonen, A. Competitive Programmer's Handbook.
- [ ] Halim, S. Competitive Programming 3.
- [ ] Halim, S., & Halim, F. Competitive Programming 4: Books 1 & 2.
- [ ] Algorithmic Problem Solving (ICPC).
- [ ] Competitive Programming (Master Class).
- [ ] Chen, E. An Infinitely Large Napkin (v1.5).
- [ ] USACO. Platinum.
- [ ] USACO. Advanced.
- [ ] Yurichev, D. Reverse Engineering for Beginners.
- [ ] Eilam, E. Reversing: Secrets of Reverse Engineering.
- [ ] Sikorski, M., & Honig, A. Practical Malware Analysis.
- [ ] Chappell, L. Wireshark Network Analysis.
- [ ] UFMCS. The Red Team Handbook.
- [ ] Borges, A. Adversarial Tradecraft in Cybersecurity.
- [ ] Goldstein, E. Best of 2600.
- [ ] Hack The Box. Active Directory Exploitation.
- [ ] Hack The Box. Vulnlab Machines.
- [ ] Hack The Box. Synack Red Team.
- [ ] Hack The Box. Hottest CVEs.
- [ ] Hack The Box. Intro to Dante.
- [ ] Hack The Box. Intro to Zephyr.
- [ ] Hack The Box. Intro to Offshore.
- [ ] Hack The Box. Intro to Wanderer.
- [ ] Hack The Box. CREST CRT.
Theology
Zionism