74 reads | 3.82 | |
50 reads | 3.59 | |
42 reads | 4.02 | |
148 reads | 3.75 | |
35 reads | 3.92 | |
88 reads | 4.08 | |
98 reads | 4.17 | |
204 reads | 3.97 | |
14 reads | 4.2 | |
2 reads | 4 | |
0 reads | 0 | |
5 reads | 2.5 | |
7 reads | 4.6 | |
3 reads | 3.5 | |
20 reads | 3.82 | |
9 reads | 4.43 | |
21 reads | 3.75 | |
21 reads | 3.43 | |
25 reads | 3.59 | |
4 reads | 3.75 | |
25 reads | 4.5 | |
9 reads | 4 | |
1,862 reads | 4.4 | |
11 reads | 3.93 | |
0 reads | 0 | |
842 reads | 3.88 | |
0 reads | 0 | |
14 reads | 3.46 | |
15 reads | 3.23 | |
24 reads | 3.77 | |
224 reads | 3.89 | |
19 reads | 3.76 | |
1 read | 3 | |
4 reads | 4 | |
0 reads | 0 | |
0 reads | 0 | |
3 reads | 2.5 | |
13 reads | 4.15 | |
11 reads | 3.78 | |
56 reads | 3.55 | |
83 reads | 3.76 | |
14 reads | 3.5 | |
10 reads | 4 | |
3 reads | 3 | |
94 reads | 4.4 | |
32 reads | 3.48 | |
320 reads | 3.71 | |
23 reads | 3.15 | |
4 reads | 4.33 | |
1 read | 5 | |
188 reads | 3.91 | |
11 reads | 3.5 | |
11 reads | 4.27 | |
5 reads | 2 | |
22 reads | 3.65 | |
150 reads | 4.11 | |
3 reads | 4 | |
6 reads | 4 | |
685 reads | 3.83 | |
8 reads | 3.14 | |
20 reads | 4.22 | |
8 reads | 4 | |
61 reads | 3.65 | |
0 reads | 0 | |
6 reads | 4.17 | |
4 reads | 5 | |
10 reads | 4.43 | |
4 reads | 4.25 | |
3 reads | 4.5 | |
14 reads | 4.4 | |
3 reads | 4 | |
2 reads | 4 | |
10 reads | 4.2 | |
8 reads | 4 | |
9 reads | 3.83 | |
Make the Bread, Buy the Butter Make the Bread, Buy the Butter
| 4 reads | 4 |
29 reads | 4.32 | |
55 reads | 4.06 | |
1 read | 3 | |
0 reads | 0 | |
68 reads | 3.62 | |
36 reads | 4.03 | |
44 reads | 3.93 | |
1 read | 2 | |
103 reads | 4.04 | |
1 read | 4 | |
84 reads | 4.49 | |
Applied Cryptography Applied Cryptography: Protocols, Algorithms, and Source Code in C
| 4 reads | 4.5 |
383 reads | 3.96 | |
5 reads | 3.4 | |
140 reads | 3.82 | |
0 reads | 0 | |
300 reads | 3.67 | |
42 reads | 3.67 | |
2 reads | 4 | |
17 reads | 4.3 | |
3 reads | 4 | |
7 reads | 3 | |
43 reads | 4.33 | |
12 reads | 3.9 |