{"id":5804,"date":"2023-11-15T18:47:29","date_gmt":"2023-11-15T10:47:29","guid":{"rendered":"https:\/\/www.alfredivy.sg\/blogger\/?p=5804"},"modified":"2024-04-03T11:08:44","modified_gmt":"2024-04-03T03:08:44","slug":"technical-books-i-recommend","status":"publish","type":"post","link":"https:\/\/www.alfredivy.sg\/blogger\/2023\/11\/technical-books-i-recommend\/","title":{"rendered":"Recommended Technical books"},"content":{"rendered":"\n<p>Here are some books that I recommend reading.<\/p>\n\n\n\n<p><strong>DNS and Bind by Cricket Liu and Paul Albitz<\/strong><\/p>\n\n\n\n<p>The Internet runs on DNS and search engines.  And also the famous joke &#8220;It is always the DNS&#8221;<\/p>\n\n\n\n<p><strong>Scalable Web Architecture and Distributed Systems by Kate Matsudaira<\/strong> <a href=\"https:\/\/aosabook.org\/en\/index.html\" data-type=\"link\" data-id=\"https:\/\/aosabook.org\/en\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">link<\/a><\/p>\n\n\n\n<p>This book covers how large Internet applications are deployed to service thousands of users.<\/p>\n\n\n\n<p><strong>The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography<\/strong><\/p>\n\n\n\n<p>As in the title.  Regular patterns will help hackers to break the cypher.<\/p>\n\n\n\n<p><strong>Pro Git by Scott Chacon and Ben Straub<\/strong><\/p>\n\n\n\n<p>GIT is a version control software that is the backbone of any software development.  Without it will be a painful endeavour. <strong><a href=\"https:\/\/git-scm.com\/book\" target=\"_blank\" rel=\"noreferrer noopener\">link<\/a><\/strong> <\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here are some books that I recommend reading. DNS and Bind by Cricket Liu and Paul Albitz The Internet runs on DNS and search engines. And also the famous joke &#8220;It is always the DNS&#8221; Scalable Web Architecture and Distributed&hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,422],"tags":[577,578,19],"class_list":["post-5804","post","type-post","status-publish","format-standard","hentry","category-it","category-self-improvement","tag-cryptography","tag-distributed-systems","tag-dns"],"_links":{"self":[{"href":"https:\/\/www.alfredivy.sg\/blogger\/wp-json\/wp\/v2\/posts\/5804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.alfredivy.sg\/blogger\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.alfredivy.sg\/blogger\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.alfredivy.sg\/blogger\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.alfredivy.sg\/blogger\/wp-json\/wp\/v2\/comments?post=5804"}],"version-history":[{"count":4,"href":"https:\/\/www.alfredivy.sg\/blogger\/wp-json\/wp\/v2\/posts\/5804\/revisions"}],"predecessor-version":[{"id":5994,"href":"https:\/\/www.alfredivy.sg\/blogger\/wp-json\/wp\/v2\/posts\/5804\/revisions\/5994"}],"wp:attachment":[{"href":"https:\/\/www.alfredivy.sg\/blogger\/wp-json\/wp\/v2\/media?parent=5804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.alfredivy.sg\/blogger\/wp-json\/wp\/v2\/categories?post=5804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.alfredivy.sg\/blogger\/wp-json\/wp\/v2\/tags?post=5804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}