The Essential Calvin and Hobbes: A Calvin and Hobbes Treasury | 4.76 |
Getting Started in Electronics | 4 |
Super Scratch Programming Adventure! (Covers Version 1.4): Learn to Program By Making Cool Games | 3.5 |
| 2 |
| 2 |
The Tangled Web: A Guide to Securing Modern Web Applications | 3.33 |
The Tao Of Network Security Monitoring: Beyond Intrusion Detection | 4 |
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition | 2 |
Making Fun Making Fun: Stories of Game Development - Volume 1 | 3.5 |
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life | 3.58 |
Spy the Lie - Philip Houston
- Michael Floyd
- Susan Carnicero
- Don Tennant
| 3.09 |
| 3 |
| 3 |
Red to Black: The Making of Rogue Legacy | 3 |
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell | 3.83 |
Hackers & Painters: Big Ideas from the Computer Age | 3.83 |
| 4.03 |
Leading the Revolution: How to Thrive in Turbulent Times by Making Innovation a Way of Life | 2 |
Super Mario: How Nintendo Conquered America | 3.63 |
| 4 |
| 3 |
Peak - Anders Ericsson
- Robert Pool
| 4.12 |
Code: The Hidden Language of Computer Hardware and Software | 4.28 |
A Mind for Numbers: How to Excel at Math and Science | 4.06 |
| 4 |
| 4.06 |
Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture | 4.16 |
| 4 |
What If? Serious Scientific Answers to Absurd Hypothetical Questions | 4.23 |
| 3.19 |
Time Management for System Administrators: Stop Working Late and Start Working Smart | 4.25 |
The Visible Ops Handbook: Starting ITIL in 4 Practical Steps - Kevin Behr
- Gene Kim
- George Spafford
| 4 |
The Mythical Man-Month: Essays on Software Engineering | 4.03 |
Drive: The Surprising Truth About What Motivates Us | 3.9 |
| 3.53 |
| 3.25 |
| 4.18 |
The New School of Information Security - Adam Shostack
- Andrew Stewart
| 3 |
What Got You Here Won't Get You There: How Successful People Become Even More Successful - Marshall Goldsmith
- Mark Reiter
- Marc Cashman
| 3.8 |
| 3 |
| 4.14 |
The Three-Body Problem - Cixin Liu
- Ken Liu (Translator)
| 3.92 |
| 4.1 |
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage | 4.11 |
Herbie Hancock: Possibilities - Herbie Hancock
- Lisa Dickey
| 4 |
Team of teams - Stanley McChrystal
- David Silverman
| 4.72 |
Lean Enterprise: How High Performance Organizations Innovate at Scale - Jez Humble
- Joanne Molesky
- Barry O'Reilly
| 3.5 |
The Checklist Manifesto: How to Get Things Right | 3.82 |
| 3.94 |
How to Win Friends and Influence People | 3.94 |
Practical Object-Oriented Design in Ruby | 4.71 |
Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation | 4.27 |
The Hard Thing About Hard Things | 4.13 |
| 3.96 |
The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win - Gene Kim
- Kevin Behr
- George Spafford
| 4.16 |
| 3.84 |
| 3.17 |
The Art of Memory Forensics - Michael Hale Ligh
- Andrew Case
- Jamie Levy
- AAron Walters
| 4 |
| 3.96 |
Applied Network Security Monitoring: Collection, Detection, and Analysis | 5 |
| 4.24 |
| 3.43 |
First, Break All The Rules - Marcus Buckingham
- Curt Coffman
| 3.74 |
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security | 4 |
The Book of Atrus - Rand Miller
- Robyn Miller
- David Wingrove
| 3.6 |
| 3 |
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency | 3.81 |
| 3.91 |
| 3 |
| 4.04 |
A Short History of Nearly Everything | 4.23 |
ChiRunning - Danny Dreyer
- Katherine Dreyer
| 3.33 |
Wherever You Go, There You Are: Mindfulness Meditation in Everyday Life | 3.87 |
Google Hacking for Penetration Testers | 4 |
| 3.63 |
World War Z: An Oral History of the Zombie War | 3.91 |
The C Programming Language - Brian W. Kernighan
- Dennis M. Ritchie
| 4.42 |
| 3.74 |
| 4 |
| 3.94 |
The Hitchhiker's Guide to the Galaxy | 4.25 |
| 3.66 |
| 5 |
| 3 |
| 2 |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers - Kevin D. Mitnick
- William L. Simon
| 3.25 |
| 4.08 |
Going Long: Legends, Oddballs, Comebacks & Adventures | 2 |
Malware Analyst's Cookbook and DVD - Michael Ligh
- Steven Adair
- Blake Hartstein
- Matthew Richard
| 5 |
| 3 |
| 4 |
| 3 |
| 3 |
The IDA Pro Book The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler | 5 |
Stealing the Network: How to Own a Continent - Russ Rogers
- Paul Craig
- Joe Grand
| 3 |
Born to Run: A Hidden Tribe, Superathletes, and the Greatest Race the World Has Never Seen | 4.33 |
| 3.92 |
The Art of Deception - Kevin D. Mitnick
- William L. Simon
| 3.33 |
Siddhartha - Hermann Hesse
- Hilda Rosner (Translator)
| 3.95 |
Windows Sysinternals Administrator's Reference - Mark E. Russinovich
- Aaron Margosis
| 4 |