Wild: From Lost to Found on the Pacific Crest Trail | 4 |
| 3 |
The Invention of Solitude | 3 |
The Stranger in the Woods | 4 |
| 4 |
All Quiet on the Western Front - Erich Maria Remarque
- Arthur Wesley Wheen (Translator)
| 5 |
| 4 |
| 5 |
D DAY Through German Eyes - The Hidden Story of June 6th 1944 | 5 |
The Man in the High Castle | 4 |
| 3 |
Go Wild: Free Your Body and Mind from the Afflictions of Civilization - John J. Ratey
- Richard Manning
| 4 |
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life | 3 |
Kafka on the Shore - Haruki Murakami
- Philip Gabriel (Translator)
| 4 |
Time for Andrew: A Ghost Story | 2 |
| 4 |
| 3 |
| 4 |
| 4 |
Creativity, Inc.: Overcoming the Unseen Forces That Stand in the Way of True Inspiration | 4 |
| 3 |
Prepare to Meet Thy Doom: And More True Gaming Stories | 3 |
| 4 |
| 4 |
| 4 |
Code: The Hidden Language of Computer Hardware and Software | 4 |
| 2 |
What I Talk About When I Talk About Running | 4 |
Hard-Boiled Wonderland and the End of the World - Haruki Murakami
- Alfred Birnbaum (Translator)
| 4 |
| 2 |
Beastie Boys Book - Michael Diamond
- Adam Horovitz
| 5 |
Men Without Women - Haruki Murakami
- Ted Goossen (Translator)
- Philip Gabriel (Translator)
| 4 |
Blood, Sweat, and Pixels: The Triumphant, Turbulent Stories Behind How Video Games Are Made | 4 |
The Tangled Web: A Guide to Securing Modern Web Applications | 4 |
Making Games with Python & PyGame | 4 |
The Essential Calvin and Hobbes: A Calvin and Hobbes Treasury | 5 |
Scrum: The Art of Doing Twice the Work in Half the Time | 4 |
| 5 |
Ruby on Rails Tutorial: Learn Web Development With Rails | 3 |
| 5 |
Infrastructure as Code: Managing Servers in the Cloud | 2 |
Racing the Beam: The Atari Video Computer System | 4 |
| 2 |
| 2 |
The Tao Of Network Security Monitoring: Beyond Intrusion Detection | 4 |
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd Edition | 2 |
Extrusion Detection: Security Monitoring for Internal Intrusions | 4 |
Getting Started in Electronics | 4 |
Super Scratch Programming Adventure! (Covers Version 1.4): Learn to Program By Making Cool Games | 4 |
| 5 |
| 4 |
Making Fun Making Fun: Stories of Game Development - Volume 1 | 3 |
Hackers & Painters: Big Ideas from the Computer Age | 3 |
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell | 3 |
Spy the Lie - Philip Houston
- Michael Floyd
- Susan Carnicero
- Don Tennant
| 2 |
| 3 |
Red to Black: The Making of Rogue Legacy | 3 |
| 3 |
A Mind for Numbers: How to Excel at Math and Science | 4 |
| 4 |
Leading the Revolution: How to Thrive in Turbulent Times by Making Innovation a Way of Life | 2 |
| 4 |
Super Mario: How Nintendo Conquered America | 5 |
Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture | 5 |
| 4 |
Peak - Anders Ericsson
- Robert Pool
| 4 |
| 4 |
| 4 |
The Visible Ops Handbook: Starting ITIL in 4 Practical Steps - Kevin Behr
- Gene Kim
- George Spafford
| 4 |
| - |
| 2 |
The Mythical Man-Month: Essays on Software Engineering | 4 |
Time Management for System Administrators: Stop Working Late and Start Working Smart | 3 |
| 2 |
| 3 |
What If? Serious Scientific Answers to Absurd Hypothetical Questions | 5 |
Drive: The Surprising Truth About What Motivates Us | 4 |
What Got You Here Won't Get You There: How Successful People Become Even More Successful - Marshall Goldsmith
- Mark Reiter
- Marc Cashman
| 3 |
| 5 |
| 4 |
The New School of Information Security - Adam Shostack
- Andrew Stewart
| 3 |
The Three-Body Problem - Cixin Liu
- Ken Liu (Translator)
| 3 |
| 4 |
| 3 |
Team of teams - Stanley McChrystal
- David Silverman
| 5 |
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage | 3 |
Practical Object-Oriented Design in Ruby | 4 |
Herbie Hancock: Possibilities - Herbie Hancock
- Lisa Dickey
| 4 |
Lean Enterprise: How High Performance Organizations Innovate at Scale - Jez Humble
- Joanne Molesky
- Barry O'Reilly
| 3 |
Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation | 3 |
The Checklist Manifesto: How to Get Things Right | 4 |
| 5 |
How to Win Friends and Influence People | 4 |
The Hard Thing About Hard Things | 4 |
The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win - Gene Kim
- Kevin Behr
- George Spafford
| 5 |
| 4 |
| 4 |
| 3 |
Applied Network Security Monitoring: Collection, Detection, and Analysis | 5 |
The Art of Memory Forensics - Michael Hale Ligh
- Andrew Case
- Jamie Levy
- AAron Walters
| 4 |