The Checklist Manifesto: How to Get Things Right | 107 reads | 3.89 |
| 89 reads | 3.69 |
| 1 read | 5 |
| 0 reads | 0 |
| 0 reads | 0 |
| 3 reads | 3.67 |
| 2 reads | 4.5 |
Correction - Thomas Bernhard
- Sophie Wilkins (Translator)
| 3 reads | 5 |
| 4 reads | 5 |
The Three-Body Problem - Cixin Liu
- Ken Liu (Translator)
| 1,180 reads | 3.92 |
| 99 reads | 4.19 |
| 1,125 reads | 4.26 |
The Art of the Ridiculous Sublime: On David Lynch's Lost Highway | 2 reads | 4 |
Kibogo - Scholastique Mukasonga
- Mark Polizzotti (Translator)
| 1 read | 3 |
| 904 reads | 3.84 |
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life | 751 reads | 3.58 |
Understanding Understanding: Essays on Cybernetics and Cognition | 0 reads | 0 |
| 0 reads | 0 |
The Society of the Spectacle - Guy Debord
- Fredy Perlman (Translator)
| 30 reads | 4.08 |
The Dawn of Everything: A New History of Humanity - David Graeber
- David Wengrow
| 59 reads | 4.33 |
Capitalist Realism: Is There No Alternative? | 87 reads | 4.02 |
Debt: The First 5,000 Years | 80 reads | 4.19 |
Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy | 68 reads | 3.78 |
Learn Windows PowerShell in a Month of Lunches - Donald W. Jones
- Jeffrey Hicks
| 1 read | 0 |
Learn Azure in a Month of Lunches | 0 reads | 0 |
An Engineering Approach to Computer Networking: ATM Networks, the Internet, and the Telephone Network | 0 reads | 0 |
Penetration Testing: A Hands-On Introduction to Hacking | 0 reads | 0 |
The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity | 3 reads | 4.33 |
Neuromancer - William Gibson
- Giampaolo Cossato (Translator)
- Sandro Sandrelli (Translator)
| 667 reads | 3.86 |
When Einstein Walked with Gödel | 4 reads | 4 |
No One Is Talking About This | 82 reads | 3.82 |
| 21 reads | 4.12 |
| 1 read | 4 |
Advanced Penetration Testing: Hacking the World's Most Secure Networks | 0 reads | 0 |
| 0 reads | 0 |
Hacking The Art Of Exploitation | 7 reads | 3.8 |
It's Not All About Me: The Top Ten Techniques for Building Quick Rapport with Anyone | 3 reads | 3.33 |
| 1 read | 0 |
The Christmas Tree and the Wedding | 0 reads | 0 |
Understanding Computation | 0 reads | 0 |
Birds of New Jersey Field Guide | 0 reads | 0 |
The Invisible Life of Addie LaRue | 858 reads | 4.11 |
The Art of Living: The Classical Manual on Virtue, Happiness, and Effectiveness | 14 reads | 4 |
The Culture Industry - Theodor W. Adorno
- Theodor Wiesengrund Adorno
| 2 reads | 4 |
The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe Online | 1 read | 0 |
| 154 reads | 3.57 |
| 12 reads | 4.14 |
| 2 reads | 4 |
Understanding the Linux Kernel - Daniel Pierre Bovet
- Marco Cesati
| 1 read | 4 |
The C Programming Language - Brian W. Kernighan
- Dennis M. Ritchie
| 27 reads | 4.47 |
| 5 reads | 4 |
| 5 reads | 4.5 |
Network Programming with Go: Code Secure and Reliable Network Services from Scratch | 0 reads | 0 |
The Go Programming Language - Alan A.A. Donovan
- Brian W. Kernighan
| 14 reads | 4.8 |
Go: Design Patterns for Real-World Projects | 0 reads | 0 |
The Go Programming Language Phrasebook | 0 reads | 0 |
UNIX and Linux System Administration Handbook - Evi Nemeth
- Garth Snyder
- Trent R. Hein
- Ben Whaley
| 2 reads | 5 |
Terraform: Up & Running: Writing Infrastructure as Code | 1 read | 4 |
Modern System Administration: Building and Maintaining Reliable Systems | 0 reads | 0 |
| 0 reads | 0 |
| 142 reads | 3.59 |
| 11 reads | 4.38 |
The Houseguest and Other Stories | 13 reads | 3.93 |
| 1 read | 3 |
Python Tricks: A Buffet of Awesome Python Features | 3 reads | 4 |
| 0 reads | 0 |
Primitive Technology: A Survivalist's Guide to Building Tools, Shelters, and More in the Wild | 1 read | 5 |
| 1 read | 4.5 |
The Problems of Philosophy | 26 reads | 3.41 |
| 0 reads | 0 |
Practical SQL: A Beginner's Guide to Storytelling with Data | 0 reads | 0 |
| 0 reads | 0 |
Tribe of Hackers - Marcus J. Carey
- Jennifer Jin
| 1 read | 0 |
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto | 0 reads | 0 |
Hack-Proof Your Life Now! | 0 reads | 0 |
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers | 36 reads | 4.16 |
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage | 43 reads | 4.09 |
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali | 0 reads | 0 |
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race | 25 reads | 4 |
Stigma: The Machinery of Inequality | 0 reads | 0 |
The Secret to Superhuman Strength | 20 reads | 4.11 |
| 11 reads | 3.56 |
PowerShell for Office 365: Automate Office 365 administrative tasks - Martin Machado
- Prashant G Bhoyar
| 0 reads | 0 |
The Uninhabitable Earth: Life After Warming | 39 reads | 3.81 |
| 5 reads | 3.8 |
| 33 reads | 4.63 |
How Europe Underdeveloped Africa | 12 reads | 3.64 |
| 67 reads | 4.29 |
| 8 reads | 4.6 |
Clean: The New Science of Skin | 8 reads | 4.29 |
Les Hirondelles de Kaboul | 2 reads | 3 |
| 730 reads | 3.59 |
The Pearl That Broke Its Shell | 13 reads | 4.23 |
| 0 reads | 0 |
Transparence of the World - Jean Follain
- W.S. Merwin (Translator)
| 0 reads | 0 |
| 0 reads | 0 |
Drugs in Afghanistan: Opium, Outlaws and Scorpion Tales | 0 reads | 0 |
| 0 reads | 0 |
Afghanistan: A Companion and Guide - Bijan Omrani
- Matthew Leeming
| 0 reads | 0 |
Culture Warlords: Dispatches from the Dark Web of White Supremacy | 18 reads | 4 |