Vol. III · Issue 06 · May 2026ISSN 2814-9921
Full catalog · Volume III

The catalog

Every manual in print, sorted by editorial rating. Filter by section, difficulty, or search the index below.

12 manuals
Sorted by editorial rating
Applied Cryptography for Backend Engineers
Featured
Security & Cryptography

Applied Cryptography for Backend Engineers

Stop rolling your own, and stop ignoring the ones who did

by Kenji Voss
4.9$21.99
Bare-Metal C for Modern ARM
Featured
Embedded & Firmware

Bare-Metal C for Modern ARM

Bring-up, linker scripts, and the boot you cannot debug

by Lior Hadar
4.9$24.99
Serving LLMs in Production
Featured
Machine Learning Systems

Serving LLMs in Production

GPUs, batching, and the latency budget you forgot about

by Dr. Priya Anand
4.9$26.99
The Kubernetes On-Call Handbook
Featured
DevOps & SRE

The Kubernetes On-Call Handbook

Production playbooks for engineers carrying the pager

by Dr. Mariana Okafor
4.8$22.99
The Lakehouse Pattern
Featured
Data Engineering

The Lakehouse Pattern

Iceberg, Delta, and the architecture that replaced your warehouse

by Sofía Restrepo
4.8$23.99
Postgres Internals For Operators
Featured
Distributed Systems

Postgres Internals For Operators

MVCC, vacuum, and the planner you cannot ignore

by Mateo Eriksson
4.8$22.99
Observability Without Vendor Lock-In
Featured
DevOps & SRE

Observability Without Vendor Lock-In

OpenTelemetry, Prometheus, and the cost of every signal

by Dr. Mariana Okafor
4.7$18.99
RTOS Internals: FreeRTOS and Zephyr Compared
Embedded & Firmware

RTOS Internals: FreeRTOS and Zephyr Compared

Schedulers, IPC, and the design choices behind your kernel

by Lior Hadar
4.7$17.99
Vector Search At Scale
Machine Learning Systems

Vector Search At Scale

ANN indexes, recall budgets, and the database under your RAG

by Dr. Priya Anand
4.7$19.99
Consensus In Practice
Distributed Systems

Consensus In Practice

Raft, Paxos, and the systems engineers ship at 2am

by Mateo Eriksson
4.7$21.99
Threat Modeling in Practice
Security & Cryptography

Threat Modeling in Practice

STRIDE, attack trees, and the meeting that prevents the breach

by Kenji Voss
4.6$16.99
Streaming Pipelines That Survive Outages
Data Engineering

Streaming Pipelines That Survive Outages

Kafka, Flink, and the operational reality of exactly-once

by Sofía Restrepo
4.6$19.99