Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation | 0 |
The Passionate Programmer: Creating a Remarkable Career in Software Development | 0 |
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence | 0 |
Design Patterns - Erich Gamma
- Ralph Johnson
- John Vlissides
- Richard Helm
| 4.03 |
How to Avoid a Climate Disaster | 4.21 |
| 5 |
Code Craft: The Practice of Writing Excellent Code | 0 |
| 0 |
| 0 |
| 0 |
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto | 0 |
| 0 |
| 3.5 |
Malware Analyst's Cookbook and DVD - Michael Ligh
- Steven Adair
- Blake Hartstein
- Matthew Richard
| 5 |
The Grand Design - Stephen Hawking
- Leonard Mlodinow
| 3.91 |
Learn you some Erlang for great good! | 0 |
PMP Project Management Professional Exam Study Guide: 2021 Exam Update | 0 |
PMP Project Management Professional Practice Tests: 2021 Exam Update - Kim Heldman
- Vanina Mangano
| 0 |
Clojure for the Brave and True | 3.5 |
The art of electronics - Paul Horowitz
- Winfield Hill
| 4.5 |
| 3 |
| 4.5 |
Les Misérables - Victor Hugo
- Isabel Florence Hapgood (Translator)
| 4.19 |
Pragmatic Thinking and Learning: Refactor Your Wetware | 4.22 |
Multithreaded JavaScript: Concurrency Beyond the Event Loop - II Thomas Hunter
- Bryan English
| 0 |
The Art of 64-Bit Assembly, Volume 1 | 0 |
| 0 |
| 5 |
| 0 |
C++ Software Design C++ Software Design: Design Principles and Patterns for High-Quality Software | 0 |
The Innovators: How a Group of Hackers, Geniuses and Geeks Created the Digital Revolution | 3.96 |
How Games Move Us: Emotion by Design | 4 |
Trudeau: The Education of a Prime Minister | 0 |
Why People Die by Suicide | 3 |
Codename Revolution: The Nintendo Wii Platform - Steven E. Jones
- George K. Thiruvathukal
| 0 |
How Computers Really Work | 0 |
| 0 |
The Art of Failure : An Essay on the Pain of Playing Video Games | 4 |
| 0 |
The Future of the Mind: The Scientific Quest to Understand, Enhance, and Empower the Mind | 3.75 |
The Future of Humanity The Future of Humanity: Terraforming Mars, Interstellar Travel, Immortality, and Our Destiny Beyond | 0 |
| 0 |
A Play of Bodies: How We Perceive Videogames | 0 |
Kali Linux Penetration Testing Bible | 0 |
Weshalb Sie kein Buddhist sind - Dzongsar Jamyang Khyentse
| 4.25 |
The Rust Programming Language | 4.5 |
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems | 4.65 |
| 0 |
Designing Secure Software: A Guide for Developers | 0 |
Data Structures the Fun Way: An Amusing Adventure with Coffee-Filled Examples | 0 |
| 0 |
Programming Android with Kotlin: Achieving Structured Concurrency with Coroutines - Pierre-Olivier Laurence
- Amanda Hinchman-Dominguez
- Mike Dunn
- G. Meike
| 0 |
| 0 |
The Art of Memory Forensics - Michael Hale Ligh
- Andrew Case
- Jamie Levy
- AAron Walters
| 4 |
| 0 |
C++ Crash Course: A Fast-Paced Introduction | 0 |
| 0 |
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life | 3.58 |
| 0 |
Agile Principles, Patterns, and Practices in C# - Robert C. Martin
- Micah Martin
| 4.33 |
Clean Code: A Handbook of Agile Software Craftsmanship | 4.12 |
Clean Architecture: A Craftsman's Guide to Software Structure and Design | 4.18 |
Rest API Design Rulebook: Designing Consistent Restful Web Service Interfaces | 0 |
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats - Alex Matrosov
- Eugene Rodionov
- Sergey Bratus
| 0 |
Python Crash Course, 2nd Edition | 0 |
Dive Into Systems: A Gentle Introduction to Computer Systems - Suzanne J Matthews
- Tia Newhall
- Kevin C. Webb
| 0 |
| 1 |
Cyberjutsu: Cybersecurity for the Modern Ninja | 0 |
| 4.13 |
Web Security for Developers | 0 |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers - Kevin D. Mitnick
- William L. Simon
| 3.25 |
The Art of Deception - Kevin D. Mitnick
- William L. Simon
| 3.33 |
| 4 |
How To: Absurd Scientific Advice for Common Real-World Problems | 4 |
The Art of Software Testing | 0 |
Atari Age: The Emergence of Video Games in America | 0 |
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools | 0 |
Learning PHP, MySQL, JavaScript, and CSS: A Step-by-Step Guide to Creating Dynamic Websites | 0 |
| 4 |
Developer's Dilemma: The Secret World of Videogame Creators | 0 |
Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy | 3.7 |
Beautiful Code - Jon L. Bentley
- Brian W. Kernighan
- Charles Petzold
- Douglas Crockford
- Henry S. Warren Jr.
- Ashish Gulhati
- Lincoln Stein
- Jim Kent
- Jack Dongarra
- Poitr Luszczek
- Adam Kolawa
- Greg Kroah-Hartman
- Diomidis Spinellis
- Andrew Kuchling
- Travis E. Oliphant
- Ronald Mak
- Rogério Atem de Carvalho
- Rafael Monnerat
- Bryan Cantrill
- Jeffrey Dean
- Sanjay Ghemawat
- Simon Peyton Jones
- R. Kent Dybuig
- William R. Otte
- Douglas C. Schmidt
- Andrew Patzer
- Karl Fogel
- Tim Bray
- Elliotte Rusty Harold
- Michael C. Feathers
- Alberto Savoia
| 3.67 |
Cybersecurity Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity | 0 |
| 0 |
| 0 |
| 0 |
| 3.57 |
Communities of Play Communities of Play: Emergent Cultures in Multiplayer Games and Virtual Worlds | 0 |
Test-Driven Development with Python: Obey the Testing Goat: Using Django, Selenium, and JavaScript | 0 |
| 0 |
| 5 |
Game Wizards: The Epic Battle for Dungeons & Dragons | 4 |
| 0 |
AWS Certified Solutions Architect Study Guide with Online Labs: Associate SAA-C02 Exam | 0 |
CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies: Exam 350-401 | 0 |
Introduction to Computer Organization: An Under the Hood Look at Hardware and x86-64 Assembly | 0 |
| 5 |
| 0 |
| 4.5 |
Cybersecurity and Third-Party Risk: Third Party Threat Hunting | 0 |