Reading List
I tend to read a lot of technical books. These lists are books I have read recently that are relevant to this blog.
###Data Mining/Machine Learning
- A First Course in Statistical Programming with R by W. John Braun, Duncan J. Murdoch
- Data Analysis with Open Source Tools by Philipp K. Janert
- Data Mining, Second Edition: Practical Machine Learning Tools and Techniques, Second Edition (The Morgan Kaufmann Series in Data Management Systems) by Ian H. Witten, Eibe Frank
- Machine Learning for Hackers by Drew Conway, John Myles White
- Mahout in Action by Sean Owen, Robin Anil, Ted Dunning, Ellen Friedman
- Programming Collective Intelligence: Building Smart Web 2.0 Applications by Toby Segaran
- Search Patterns: Design for Discovery by Peter Morville, Jeffery Callender
- Graph Databases by Ian Robinson, Jim Webber, and Emil Eifrem
- Agile Data Science: Building Data Analytics Applications with Hadoop by Russell Jurney
###Big Data/Cloud Computing
- Big Data by Nathan Marz
- Cassandra: The Definitive Guide by Eben Hewitt
- Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide by David S. Linthicu
- Data-Intensive Text Processing with MapReduce (Synthesis Lectures on Human Language Technologies) by Jimmy Lin
- Hadoop: The Definitive Guide by Tom White
- Pro Hadoop (Expert’s Voice in Open Source) by Jason Venner
- Service Oriented Architecture with Java: Using SOA and web services to build powerful Java applications by Binildas A. Christudas, Malhar Barai, Vincenzo Caselli
- I Heart Logs: Event Data, Stream Processing, and Data Integration by Jay Kreps
###Security/Hacking/Forensics
- Beautiful Security: Leading Security Experts Explain How They Think by Andy Oram, John Viega
- Endpoint Security by Mark Kadrich
- Extrusion Detection: Security Monitoring for Internal Intrusions by Richard Bejtlich
- Hacking Exposed Linux, 3rd Edition by ISECOM
- Hacking: The Next Generation (Animal Guide) by Nitesh Dhanjani, Billy Rios, Brett Hardin
- Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century by Ryan Trost
- Security Log Management: Identifying Patterns in the Chaos by Jacob Babbin, Dave Kleiman, Everett F. Carter Jr., Jeremy Faircloth, Mark Burnett, Esteban Gutierrez
- SiLK Analyst Handbook (PDF)
- Network Security Through Data Analysis: Building Situational Awareness by Michael S Collins
###Security/Intel
- The Definitive Book of Body Language by Barbara Pease, Allan Pease
- The Next 100 Years: A Forecast for the 21st Century by George Friedman
- What Every BODY is Saying: An Ex-FBI Agent’s Guide to Speed-Reading People by Joe Navarro, Marvin Karlins
- You Can Read Anyone by David J. Lieberman
###Python
- Python Phrasebook Brad Dayley
###Other
- Art of Innovation by Tom Kelley
- Emotional Intelligence by Daniel Goleman
- Git in the Trenches by Peter Savage
- Social Intelligence: The New Science of Human Relationships by Daniel Goleman
- The Back of the Napkin (Expanded Edition): Solving Problems and Selling Ideas with Pictures by Dan Roam
- The Ten Faces of Innovation: Strategies for Heightening Creativity by Tom Kelley