13 Jun 2019

Books and courses

Audiobooks

Audiobooks

  • Moneyland: Why Thieves and Crooks Now Rule the World and How to Take It Back – Oliver Bullough
  • How to Be Right… in a world gone wrong – James O’Brien
  • Whoops! Why Everyone Owes Everyone and No One Can Pay – John Lanchester
  • Naked Money - A Revealing Look at What It Is and Why It Matters – Charles Wheelan
  • Economics: The User’s Guide: (A Pelican Book) - Ha-Joon Chang
  • Naked Statistics: Stripping the Dread from the Data – Charles Wheelan
  • The Science of Yoga: The Risks and Rewards
  • Why We Sleep: The New Science of Sleep and Dreams
  • Mythos – Stephen Fry
  • The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life – Mark Manson
  • I, Partridge: We Need to Talk About Alan – Alan Partridge
  • Flash Boys – Michael Lewis
  • Forex: Strategies: Best Forex Trading Strategies for High Profit and Reduced Risk (Volume 2) – Matthew Maybury,
  • Cryptocurrency: 3 in 1: Blockchain, Bitcoin, Ethereum – Mark Smith
  • The Big Short: Inside the Doomsday Machine – Michael Lewis
  • The Humans – Matt Haig

Pluralsight courses

  • Data Science with R
  • Beginning Data Visualization with R
  • Exploratory Data Analysis with R
  • Using Advanced Data Structures in Modern Applications
  • Algorithms and Data Structures - Part 2
  • Algorithms and Data Structures - Part 1
  • Digital Audio Fundamentals
  • An Introduction to Algorithmics
  • Ethical Hacking: Cryptography
  • Go Fundamentals
  • SOLID Principles of Object Oriented Design
  • C++ Unit Testing Fundamentals Using Catch
  • C++ Advanced Topics
  • Introduction to the Boost C++ Libraries
  • AWS Developer: Getting Started
  • Ethical Hacking: Vulnerability Analysis
  • Hardware for CompTIA A+ (220-901)
  • Understanding and Applying Financial Risk Modeling Techniques
  • Introduction to Browser Security Headers
  • Ethical Hacking: Hacking Mobile Platforms
  • Ethical Hacking: Hacking Wireless Networks
  • Ethical Hacking: Cloud Computing
  • Getting Started with Analyzing Network Traffic Using Wireshark
  • Troubleshooting with Wireshark: Analyzing and Decrypting TLS Traffic in Wireshark
  • SSCP®: Network and Communications Security
  • Ethical Hacking: System Hacking
  • Ethical Hacking: Sniffing
  • Ethical Hacking: Scanning Networks
  • Ethical Hacking: Enumeration
  • Ethical Hacking: Social Engineering
  • Ethical Hacking: Reconnaissance/Footprinting
  • Ethical Hacking: Hacking the Internet of Things (IoT)
  • SSCP®: Cryptography
  • Cryptography Fundamentals for Developers and Security Professionals
  • Docker Deep Dive
  • Getting Started with Docker
  • Product Owner Fundamentals - Product Ownership from the Trenches
  • Scrum Master Fundamentals - Growing Yourself and Your Team
  • Big Scrum
  • Product Owner Fundamentals - Plotting the Product Owner’s Career Path
  • Scrum Master Fundamentals - Becoming a Great Scrum Master
  • Agile Team Practices with Scrum
  • Beautiful C++: STL Algorithms
  • Practical C++14 and C++17 Features
  • C++ Fundamentals - Part 2