Here is a non-exhaustive list of books I’ve enjoyed, in no particular order. I keep this list primarily as a reminder that for many of these authors, I’ve only read a single work, and that I should spend more time reading broadly within the work of authors I like.
Robert Nystrom
- Crafting Interpreters (currently reading)
Albert Camus
- The Stranger
- The Myth of Sisyphus (currently reading)
Ursula K. Le Guin
- A Wizard of Earthsea
- The Tombs of Atuan
- The Farthest Shore
- Tehanu
- Tales from Earthsea
- The Other Wind
Nicole Perlroth
- This Is How They Tell Me the World Ends
Agatha Christie
- And Then There Were None
- Murder on the Orient Express
- Death on the Nile
- The Murder of Roger Ackroyd
Roald Dahl
- Charlie and the Chocolate Factory
- The BFG
- Fantastic Mr. Fox
- The Wonderful Story of Henry Sugar
- Matilda
Dennis Andriesse
- Practical Binary Analysis
Douglas Adams
- The Hitchhiker’s Guide to the Galaxy
- The Restaurant at the End of the Universe
- Life, the Universe and Everything
Joseph Conrad
- Heart of Darkness
Oscar Wilde
- The Picture of Dorian Gray
Stephen King
- The Outsider
- The Shining
Ernest Hemingway
- The Old Man and the Sea
Fyodor Dostoevsky
- The Brothers Karamazov
J.D. Salinger
- The Catcher in the Rye
J.K. Rowling
- Harry Potter and the Order of the Phoenix
- Harry Potter and the Deathly Hallows
- Harry Potter and the Chamber of Secrets
- Harry Potter and the Prisoner of Azkaban
- Harry Potter and the Goblet of Fire
- Harry Potter and the Half-Blood Prince
- Harry Potter and the Sorcerer’s Stone
Isaac Asimov
- I, Robot
- Foundation
- Foundation and Empire
- Second Foundation
- Foundation’s Edge
- Foundation and Earth
Stephen Hawking
- A Brief History of Time
Rick Riordan
- The Battle of the Labyrinth
- The Sea of Monsters
- The Last Olympian
- The Titan’s Curse
- The Lost Hero
- The House of Hades
- The Lightning Thief
John Boyne
- The Boy in the Striped Pajamas
Dafydd Stuttard
- The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws
Rolf Oppliger
- Contemporary Cryptography
R.J. Palacio
- Wonder
J.R.R. Tolkien
- The Hobbit, Part One
- The Hobbit, or There and Back Again
- The Hobbit
- The Fellowship of the Ring
- The Two Towers
- The Return of the King
- The Silmarillion
Anthony Burgess
- A Clockwork Orange
Paulo Coelho
- The Alchemist
- Veronika Decides to Die
Steinbeck
- Of Mice and Men
Orwell
- Animal Farm
- 1984
Gustavo Mercado
- The Filmmaker’s Eye
Alex Karp
- The Technological Republic
Elecia White
- Making Embedded Systems: Design Patterns for Great Software
Tobias Klein
- Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers
Jasper van Woudenberg & Colin O’Flynn
- The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
Jean-Philippe Aumasson
- Serious Cryptography
Miyazaki
- Starting Point
Eldad Eilam
- Secrets of Reverse Engineering
Goethe
- Elective Affinities
- Erlkönig
Kafka
- Metamorphosis
Bulgakov
- Heart of a Dog
Gogol
- The Nose
Zweig
- The Royal Game
- Joseph Fouche: Portrait of a Politician
Michael Sikorski & Andrew Honig
- Practical Malware Analysis