Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation | 0 reads |
The Passionate Programmer: Creating a Remarkable Career in Software Development | 0 reads |
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence | 0 reads |
Design Patterns - Erich Gamma
- Ralph Johnson
- John Vlissides
- Richard Helm
| 40 reads |
How to Avoid a Climate Disaster | 73 reads |
| 1 read |
Code Craft: The Practice of Writing Excellent Code | 0 reads |
| 0 reads |
| 0 reads |
| 0 reads |
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto | 0 reads |
| 0 reads |
| 5 reads |
Malware Analyst's Cookbook and DVD - Michael Ligh
- Steven Adair
- Blake Hartstein
- Matthew Richard
| 1 read |
The Grand Design - Stephen Hawking
- Leonard Mlodinow
| 62 reads |
Learn you some Erlang for great good! | 0 reads |
PMP Project Management Professional Exam Study Guide: 2021 Exam Update | 0 reads |
PMP Project Management Professional Practice Tests: 2021 Exam Update - Kim Heldman
- Vanina Mangano
| 0 reads |
Clojure for the Brave and True | 4 reads |
The art of electronics - Paul Horowitz
- Winfield Hill
| 5 reads |
| 1 read |
| 2 reads |
Les Misérables - Victor Hugo
- Isabel Florence Hapgood (Translator)
| 278 reads |
Pragmatic Thinking and Learning: Refactor Your Wetware | 10 reads |
Multithreaded JavaScript: Concurrency Beyond the Event Loop - II Thomas Hunter
- Bryan English
| 0 reads |
The Art of 64-Bit Assembly, Volume 1 | 0 reads |
| 0 reads |
| 1 read |
| 0 reads |
C++ Software Design C++ Software Design: Design Principles and Patterns for High-Quality Software | 0 reads |
The Innovators: How a Group of Hackers, Geniuses and Geeks Created the Digital Revolution | 54 reads |
How Games Move Us: Emotion by Design | 2 reads |
Trudeau: The Education of a Prime Minister | 0 reads |
Why People Die by Suicide | 2 reads |
Codename Revolution: The Nintendo Wii Platform - Steven E. Jones
- George K. Thiruvathukal
| 0 reads |
How Computers Really Work | 0 reads |
| 1 read |
The Art of Failure : An Essay on the Pain of Playing Video Games | 2 reads |
| 0 reads |
The Future of the Mind: The Scientific Quest to Understand, Enhance, and Empower the Mind | 7 reads |
The Future of Humanity The Future of Humanity: Terraforming Mars, Interstellar Travel, Immortality, and Our Destiny Beyond | 0 reads |
| 0 reads |
A Play of Bodies: How We Perceive Videogames | 0 reads |
Kali Linux Penetration Testing Bible | 0 reads |
Weshalb Sie kein Buddhist sind - Dzongsar Jamyang Khyentse
| 4 reads |
The Rust Programming Language | 19 reads |
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems | 55 reads |
| 0 reads |
Designing Secure Software: A Guide for Developers | 0 reads |
Data Structures the Fun Way: An Amusing Adventure with Coffee-Filled Examples | 0 reads |
| 0 reads |
Programming Android with Kotlin: Achieving Structured Concurrency with Coroutines - Pierre-Olivier Laurence
- Amanda Hinchman-Dominguez
- Mike Dunn
- G. Meike
| 0 reads |
| 0 reads |
The Art of Memory Forensics - Michael Hale Ligh
- Andrew Case
- Jamie Levy
- AAron Walters
| 1 read |
| 0 reads |
C++ Crash Course: A Fast-Paced Introduction | 0 reads |
| 0 reads |
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life | 874 reads |
| 0 reads |
Agile Principles, Patterns, and Practices in C# - Robert C. Martin
- Micah Martin
| 4 reads |
Clean Code: A Handbook of Agile Software Craftsmanship | 98 reads |
Clean Architecture: A Craftsman's Guide to Software Structure and Design | 27 reads |
Rest API Design Rulebook: Designing Consistent Restful Web Service Interfaces | 0 reads |
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats - Alex Matrosov
- Eugene Rodionov
- Sergey Bratus
| 0 reads |
Python Crash Course, 2nd Edition | 1 read |
Dive Into Systems: A Gentle Introduction to Computer Systems - Suzanne J Matthews
- Tia Newhall
- Kevin C. Webb
| 0 reads |
| 1 read |
Cyberjutsu: Cybersecurity for the Modern Ninja | 0 reads |
| 35 reads |
Web Security for Developers | 0 reads |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers - Kevin D. Mitnick
- William L. Simon
| 9 reads |
The Art of Deception - Kevin D. Mitnick
- William L. Simon
| 16 reads |
| 4 reads |
How To: Absurd Scientific Advice for Common Real-World Problems | 100 reads |
The Art of Software Testing | 0 reads |
Atari Age: The Emergence of Video Games in America | 0 reads |
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools | 0 reads |
Learning PHP, MySQL, JavaScript, and CSS: A Step-by-Step Guide to Creating Dynamic Websites | 1 read |
| 3 reads |
Developer's Dilemma: The Secret World of Videogame Creators | 0 reads |
Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy | 91 reads |
Beautiful Code - Jon L. Bentley
- Brian W. Kernighan
- Charles Petzold
- Douglas Crockford
- Henry S. Warren Jr.
- Ashish Gulhati
- Lincoln Stein
- Jim Kent
- Jack Dongarra
- Poitr Luszczek
- Adam Kolawa
- Greg Kroah-Hartman
- Diomidis Spinellis
- Andrew Kuchling
- Travis E. Oliphant
- Ronald Mak
- Rogério Atem de Carvalho
- Rafael Monnerat
- Bryan Cantrill
- Jeffrey Dean
- Sanjay Ghemawat
- Simon Peyton Jones
- R. Kent Dybuig
- William R. Otte
- Douglas C. Schmidt
- Andrew Patzer
- Karl Fogel
- Tim Bray
- Elliotte Rusty Harold
- Michael C. Feathers
- Alberto Savoia
| 6 reads |
Cybersecurity Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity | 0 reads |
| 0 reads |
| 0 reads |
| 0 reads |
| 15 reads |
Communities of Play Communities of Play: Emergent Cultures in Multiplayer Games and Virtual Worlds | 0 reads |
Test-Driven Development with Python: Obey the Testing Goat: Using Django, Selenium, and JavaScript | 1 read |
| 0 reads |
| 1 read |
Game Wizards: The Epic Battle for Dungeons & Dragons | 2 reads |
| 0 reads |
AWS Certified Solutions Architect Study Guide with Online Labs: Associate SAA-C02 Exam | 0 reads |
CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies: Exam 350-401 | 0 reads |
Introduction to Computer Organization: An Under the Hood Look at Hardware and x86-64 Assembly | 0 reads |
| 1 read |
| 1 read |
| 4 reads |
Cybersecurity and Third-Party Risk: Third Party Threat Hunting | 0 reads |