| | 7 reads |
The Business Value of Developer Relations | 2018 | 1 read |
Superintelligence: Paths, Dangers, Strategies | 2014 | 41 reads |
| 2012 | 58 reads |
The Everything Store: Jeff Bezos and the Age of Amazon | 2013 | 64 reads |
| 2019 | 35 reads |
Reset: Over identiteit, gemeenschap en democratie | 2021 | 0 reads |
Ecomodernisme: Het nieuwe denken over groen en groei - Hidde Boersma
- Bart Coenen
- Marcel Crok
- Joost Van Kasteren
- Rypke Zeilmaker
| | 0 reads |
Atomic Habits: An Easy and Proven Way to Build Good Habits and Break Bad Ones | 2016 | 940 reads |
The Religion of Technology | 1997 | 2 reads |
| | 0 reads |
De tragiek van de macht: Brief aan Bart De Wever | 2020 | 0 reads |
The Age of Surveillance Capitalism | | 34 reads |
| 2007 | 7 reads |
Cryptography Engineering: Design Principles and Practical Applications - Niels Ferguson
- Bruce Schneier
- Tadayoshi Kohno
| 2010 | 1 read |
The Soul of a New Machine | 1981 | 37 reads |
The Timeless Way of Building - Christopher Alexander
- Professor in the Department of Architecture Christopher Alexander
| 1979 | 7 reads |
Software Project Survival Guide | 1997 | 1 read |
| 2002 | 4 reads |
| 2020 | 46 reads |
Database Management Systems - Raghu Ramakrishnan
- Johannes Gehrke
| 1997 | 1 read |
| 2005 | 0 reads |
Rework - Jason Fried
- David Heinemeier Hansson
| 2010 | 182 reads |
Programming Collective Intelligence: Building Smart Web 2.0 Applications | 2002 | 6 reads |
The Browser Hacker's Handbook - Christian Frichot
- Michele Orru
| 2014 | 0 reads |
Introduction to Modern Cryptography: Principles and Protocols - Jonathan Katz
- Yehuda Lindell
| 2007 | 0 reads |
| | 18 reads |
| 2003 | 23 reads |
Why Nations Fail: The Origins of Power, Prosperity, and Poverty - Daron Acemoğlu
- James A. Robinson
| 2012 | 58 reads |
Penetration Testing: A Hands-On Introduction to Hacking | 2014 | 0 reads |
Malware Data Science Malware Data Science: Attack Detection and Attribution - Joshua Saxe
- Hillary Sanders
| | 0 reads |
How to Hack Like a Ghost: Breaching the Cloud | | 0 reads |
Black Hat Python: Python Programming for Hackers and Pentesters | 2014 | 0 reads |
| | 0 reads |
The Ghidra Book: The Definitive Guide | | 1 read |
| 2021 | 0 reads |
| 2010 | 5 reads |
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground | 2012 | 22 reads |
Working Effectively with Legacy Code | 2004 | 12 reads |
Hacking The Art Of Exploitation | | 7 reads |
| 2008 | 1 read |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers - Kevin D. Mitnick
- William L. Simon
| 2005 | 9 reads |
Primer on Client-Side Web Security - Philippe De Ryck
- Lieven Desmet
- Frank Piessens
- Martin Johns
| 2014 | 0 reads |
| 2007 | 0 reads |
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data | 2017 | 20 reads |
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation | 2017 | 0 reads |
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer | | 0 reads |
Real-World Bug Hunting: A Field Guide to Web Hacking | 2019 | 1 read |
Practical Malware Analysis - Michael Sikorski
- Andrew Honig
| 2012 | 2 reads |
| | 0 reads |
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things - Fotios Chantzis
- Ioannis Stais
- Paulino Calderon
- Evangelos Deirmentzoglou
- Beau Woods
| | 0 reads |
Serious Cryptography: A Practical Introduction to Modern Encryption | | 0 reads |
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools | 2016 | 0 reads |
The Tangled Web: A Guide to Securing Modern Web Applications | 2011 | 3 reads |
Cyberjutsu: Cybersecurity for the Modern Ninja | | 0 reads |
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats - Alex Matrosov
- Eugene Rodionov
- Sergey Bratus
| 2019 | 0 reads |
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments | | 0 reads |
Black Hat Go: Go Programming For Hackers and Pentesters - Tom Steele
- Chris Patten
- Dan Kottmann
| | 0 reads |
| 2019 | 141 reads |
The Art of Deception - Kevin D. Mitnick
- William L. Simon
| 2001 | 16 reads |
Software Engineering at Google - Titus Winters
- Tom Manshreck
- Hyrum Wright
| 2020 | 7 reads |
| 2017 | 22 reads |
Agile Principles, Patterns, and Practices in C# - Robert C. Martin
- Micah Martin
| 2006 | 4 reads |
The High Frontier: Human Colonies in Space | 1977 | 2 reads |
Plan B 4.0: Mobilizing to Save Civilization | 2008 | 0 reads |
| | 0 reads |
CCCP: Cosmic Communist Constructions Photographed | | 0 reads |
| 2018 | 0 reads |
| 2011 | 8 reads |
The Atlas Six - Olivie Blake
- Roberta Verde (Translator)
| 2020 | 326 reads |
Moving to Mars: Design for the Red Planet | | 0 reads |
| 2006 | 7 reads |
The Innovators: How a Group of Hackers, Geniuses and Geeks Created the Digital Revolution | 2011 | 54 reads |
Against the odds : An autobiography | 1997 | 0 reads |
Hard Drive - James Wallace
- Jim Erickson
| 1993 | 1 read |
| 1954 | 733 reads |
Startup: A Silicon Valley Adventure | 1995 | 1 read |
| 1999 | 6 reads |
| | 3 reads |
| 1984 | 21 reads |
| 2004 | 3 reads |
| 2020 | 188 reads |
Pride and Prejudice and Zombies - Seth Grahame-Smith
- Jane Austen
| 1813 | 135 reads |
| 1811 | 1,413 reads |
| 2012 | 1 read |
The Girl with the Dragon Tattoo - Stieg Larsson
- Reg Keeland (Translator)
| 2005 | 1,017 reads |
| 1980 | 642 reads |
| 1965 | 2,247 reads |
The Count of Monte Cristo | 1830 | 585 reads |
Siddhartha - Hermann Hesse
- Hilda Rosner (Translator)
| 1922 | 562 reads |
| 2002 | 956 reads |
| 1945 | 2,456 reads |
| 1962 | 523 reads |
How to Avoid a Climate Disaster | 2021 | 71 reads |
| 2015 | 477 reads |
| | 0 reads |
| | 0 reads |
| | 0 reads |
| 2018 | 0 reads |
Being Mortal: Medicine and What Matters in the End | 2014 | 121 reads |