13 Jun 2019
Books and courses
Audiobooks
Audiobooks
- Moneyland: Why Thieves and Crooks Now Rule the World and How to Take It Back – Oliver Bullough
- How to Be Right… in a world gone wrong – James O’Brien
- Whoops! Why Everyone Owes Everyone and No One Can Pay – John Lanchester
- Naked Money - A Revealing Look at What It Is and Why It Matters – Charles Wheelan
- Economics: The User’s Guide: (A Pelican Book) - Ha-Joon Chang
- Naked Statistics: Stripping the Dread from the Data – Charles Wheelan
- The Science of Yoga: The Risks and Rewards
- Why We Sleep: The New Science of Sleep and Dreams
- Mythos – Stephen Fry
- The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life – Mark Manson
- I, Partridge: We Need to Talk About Alan – Alan Partridge
- Flash Boys – Michael Lewis
- Forex: Strategies: Best Forex Trading Strategies for High Profit and Reduced Risk (Volume 2) – Matthew Maybury,
- Cryptocurrency: 3 in 1: Blockchain, Bitcoin, Ethereum – Mark Smith
- The Big Short: Inside the Doomsday Machine – Michael Lewis
- The Humans – Matt Haig
Pluralsight courses
- Data Science with R
- Beginning Data Visualization with R
- Exploratory Data Analysis with R
- Using Advanced Data Structures in Modern Applications
- Algorithms and Data Structures - Part 2
- Algorithms and Data Structures - Part 1
- Digital Audio Fundamentals
- An Introduction to Algorithmics
- Ethical Hacking: Cryptography
- Go Fundamentals
- SOLID Principles of Object Oriented Design
- C++ Unit Testing Fundamentals Using Catch
- C++ Advanced Topics
- Introduction to the Boost C++ Libraries
- AWS Developer: Getting Started
- Ethical Hacking: Vulnerability Analysis
- Hardware for CompTIA A+ (220-901)
- Understanding and Applying Financial Risk Modeling Techniques
- Introduction to Browser Security Headers
- Ethical Hacking: Hacking Mobile Platforms
- Ethical Hacking: Hacking Wireless Networks
- Ethical Hacking: Cloud Computing
- Getting Started with Analyzing Network Traffic Using Wireshark
- Troubleshooting with Wireshark: Analyzing and Decrypting TLS Traffic in Wireshark
- SSCP®: Network and Communications Security
- Ethical Hacking: System Hacking
- Ethical Hacking: Sniffing
- Ethical Hacking: Scanning Networks
- Ethical Hacking: Enumeration
- Ethical Hacking: Social Engineering
- Ethical Hacking: Reconnaissance/Footprinting
- Ethical Hacking: Hacking the Internet of Things (IoT)
- SSCP®: Cryptography
- Cryptography Fundamentals for Developers and Security Professionals
- Docker Deep Dive
- Getting Started with Docker
- Product Owner Fundamentals - Product Ownership from the Trenches
- Scrum Master Fundamentals - Growing Yourself and Your Team
- Big Scrum
- Product Owner Fundamentals - Plotting the Product Owner’s Career Path
- Scrum Master Fundamentals - Becoming a Great Scrum Master
- Agile Team Practices with Scrum
- Beautiful C++: STL Algorithms
- Practical C++14 and C++17 Features
- C++ Fundamentals - Part 2