{"id":162,"date":"2007-01-24T22:27:11","date_gmt":"2007-01-24T21:27:11","guid":{"rendered":"http:\/\/www.kill-9.it\/blog\/index.php\/must-readmust-have\/"},"modified":"2013-01-25T10:34:35","modified_gmt":"2013-01-25T09:34:35","slug":"must-readmust-have","status":"publish","type":"page","link":"https:\/\/www.kill-9.it\/blog\/index.php\/must-readmust-have\/","title":{"rendered":"Must read\/must have"},"content":{"rendered":"<p>Ci sono alcuni libri che vanno letti, e probabilmente anche posseduti &#8211; come per appropriarsi anche <em>fisicamente<\/em> di un po&#8217; della loro genialit&agrave;<br \/>\nHo aggiornato questa pagina dividendo i libri da leggere &#8220;anche a letto&#8221;  da quelli un poco piu` seriosi, se non altro perche` &#8220;Practical&#8230;Security&#8221; ad esempio pesa ~1.4Kg e potrebbe non essere agevole :)<\/p>\n<ul>\n<li><a href=\"http:\/\/www.amazon.it\/Advanced-Programming-Environment-Richard-Stevens\/dp\/0321525949\/ref=sr_1_1?ie=UTF8&#038;qid=1359105991&#038;sr=8-1\" target=\"_blank\">Advanced programming in the UNIX environment<\/a> \/ W. Richard Stevens<\/li>\n<li><a href=\"http:\/\/www.amazon.it\/TCP-IP-Illustrated-1-Protocols\/dp\/0321336313\/ref=sr_1_1?s=english-books&#038;ie=UTF8&#038;qid=1359106046&#038;sr=1-1\" target=\"_blank\">TCP\/IP illustrated Vol.1<\/a> \/ W. Richard Stevens<\/li>\n<li><a href=\"http:\/\/www.amazon.it\/Computer-Networks-International-Andrew-Tanenbaum\/dp\/0132553171\/ref=sr_1_1?s=english-books&#038;ie=UTF8&#038;qid=1359106070&#038;sr=1-1\" target=\"_blank\">Computer networks<\/a> \/ Andrew S. Tanenbaum<\/li>\n<li><a href=\"http:\/\/www.amazon.it\/Introduction-Algorithms-Thomas-H-Cormen\/dp\/0262533057\/ref=sr_1_1?s=english-books&#038;ie=UTF8&#038;qid=1359106099&#038;sr=1-1\" target=\"_blank\">Introduction to Algorithms<\/a> \/ Cormen &#8211; Leiserson &#8211; Rivest<\/li>\n<li><a href=\"http:\/\/www.amazon.it\/Practical-Unix-Internet-Security-3rd\/dp\/0596003234\/ref=sr_1_3?s=english-books&#038;ie=UTF8&#038;qid=1359106130&#038;sr=1-3\" target=\"_blank\">Practical Unix &#038; Internet Security<\/a> \/ Garfinkel &#8211; Spafford &#8211; Swartz<\/li>\n<\/ul>\n<ul>\n<li><a href=\"http:\/\/www.amazon.it\/Where-Wizards-Stay-Up-Late\/dp\/0684832674\/ref=sr_1_2?s=english-books&#038;ie=UTF8&#038;qid=1359106164&#038;sr=1-2\" target=\"_blank\">Where wizards stay up late<\/a> : <em>the origins of the Internet<\/em> \/ Katie Hafner and Matthew Lyon<\/li>\n<li><a href=\"http:\/\/www.amazon.it\/Cuckoos-Egg-Tracking-Computer-Espionage\/dp\/1416507787\/ref=sr_1_10?s=english-books&#038;ie=UTF8&#038;qid=1359106202&#038;sr=1-10\" target=\"_blank\">The Cuckoo&#8217;s egg<\/a> \/ Clifford Stoll<\/li>\n<li><a href=\"http:\/\/www.amazon.it\/Hackers-25th-Anniversary-Computer-Revolution\/dp\/1449388396\/ref=sr_1_1?s=english-books&#038;ie=UTF8&#038;qid=1359106248&#038;sr=1-1\" target=\"_blank\">Hackers<\/a>, <em>heroes of the computer revolution<\/em>\/ Steven Levy<\/li>\n<li><a href=\"http:\/\/www.amazon.it\/Takedown-Pursuit-Capture-Mitnick-Americas\/dp\/0786862106\/ref=sr_1_2?s=english-books&#038;ie=UTF8&#038;qid=1359106279&#038;sr=1-2\" target=\"_blank\">Takedown <\/a>\/ Shimomura and Markoff<\/li>\n<\/ul>\n<p>ce ne sono sicuramente altri che meriterebbero di essere inseriti, ma che anche rimanendo grandi classici sono diventati ormai obsoleti in tutto o in parte (penso a &#8220;<a href=\"http:\/\/www.amazon.it\/Firewalls-Internet-Security-Repelling-Hacker\/dp\/020163466X\/ref=sr_1_1?s=english-books&#038;ie=UTF8&#038;qid=1359106372&#038;sr=1-1\" target=\"_blank\">Firewalls and Internet security<\/a>&#8221; di Cheswick &#038; Bellovin ormai del 1994, oppure &#8220;<a href=\"http:\/\/www.amazon.it\/Operating-System-Concepts-Abraham-Silberschatz\/dp\/1118063333\/ref=sr_1_3?s=english-books&#038;ie=UTF8&#038;qid=1359106408&#038;sr=1-3\" target=\"_blank\">Operating Systems Concepts<\/a>&#8221; di Silbershatz, Peterson &#038; Galvin arrivato alla sua nona edizione).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ci sono alcuni libri che vanno letti, e probabilmente anche posseduti &#8211; come per appropriarsi anche fisicamente di un po&#8217; della loro genialit&agrave; Ho aggiornato questa pagina dividendo i libri da leggere &#8220;anche a letto&#8221; da quelli un poco piu` seriosi, se non altro perche` &#8220;Practical&#8230;Security&#8221; ad esempio pesa ~1.4Kg e potrebbe non essere agevole &hellip; <a href=\"https:\/\/www.kill-9.it\/blog\/index.php\/must-readmust-have\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Must read\/must have&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":5,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-162","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.kill-9.it\/blog\/index.php\/wp-json\/wp\/v2\/pages\/162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kill-9.it\/blog\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kill-9.it\/blog\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kill-9.it\/blog\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kill-9.it\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=162"}],"version-history":[{"count":4,"href":"https:\/\/www.kill-9.it\/blog\/index.php\/wp-json\/wp\/v2\/pages\/162\/revisions"}],"predecessor-version":[{"id":546,"href":"https:\/\/www.kill-9.it\/blog\/index.php\/wp-json\/wp\/v2\/pages\/162\/revisions\/546"}],"wp:attachment":[{"href":"https:\/\/www.kill-9.it\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}