#103 | Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation |
#104 | The Passionate Programmer: Creating a Remarkable Career in Software Development |
#105 | Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence |
#106 | Design Patterns - Erich Gamma
- Ralph Johnson
- John Vlissides
- Richard Helm
|
#107 | How to Avoid a Climate Disaster |
#108 | |
#109 | Code Craft: The Practice of Writing Excellent Code |
#110 | |
#111 | |
#112 | |
#113 | Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto |
#114 | |
#115 | |
#116 | Malware Analyst's Cookbook and DVD - Michael Ligh
- Steven Adair
- Blake Hartstein
- Matthew Richard
|
#117 | The Grand Design - Stephen Hawking
- Leonard Mlodinow
|
#118 | Learn you some Erlang for great good! |
#119 | PMP Project Management Professional Exam Study Guide: 2021 Exam Update |
#120 | PMP Project Management Professional Practice Tests: 2021 Exam Update - Kim Heldman
- Vanina Mangano
|
#121 | Clojure for the Brave and True |
#122 | The art of electronics - Paul Horowitz
- Winfield Hill
|
#123 | |
#124 | |
#125 | Les Misérables - Victor Hugo
- Isabel Florence Hapgood (Translator)
|
#126 | Pragmatic Thinking and Learning: Refactor Your Wetware |
#127 | Multithreaded JavaScript: Concurrency Beyond the Event Loop - II Thomas Hunter
- Bryan English
|
#128 | The Art of 64-Bit Assembly, Volume 1 |
#129 | |
#130 | |
#131 | |
#132 | C++ Software Design C++ Software Design: Design Principles and Patterns for High-Quality Software |
#133 | The Innovators: How a Group of Hackers, Geniuses and Geeks Created the Digital Revolution |
#134 | How Games Move Us: Emotion by Design |
#135 | Trudeau: The Education of a Prime Minister |
#136 | Why People Die by Suicide |
#137 | Codename Revolution: The Nintendo Wii Platform - Steven E. Jones
- George K. Thiruvathukal
|
#138 | How Computers Really Work |
#139 | |
#140 | The Art of Failure : An Essay on the Pain of Playing Video Games |
#141 | |
#142 | The Future of the Mind: The Scientific Quest to Understand, Enhance, and Empower the Mind |
#143 | The Future of Humanity The Future of Humanity: Terraforming Mars, Interstellar Travel, Immortality, and Our Destiny Beyond |
#144 | |
#145 | A Play of Bodies: How We Perceive Videogames |
#146 | Kali Linux Penetration Testing Bible |
#147 | Weshalb Sie kein Buddhist sind - Dzongsar Jamyang Khyentse
|
#148 | The Rust Programming Language |
#149 | Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems |
#150 | |
#151 | Designing Secure Software: A Guide for Developers |
#152 | Data Structures the Fun Way: An Amusing Adventure with Coffee-Filled Examples |
#153 | |
#154 | Programming Android with Kotlin: Achieving Structured Concurrency with Coroutines - Pierre-Olivier Laurence
- Amanda Hinchman-Dominguez
- Mike Dunn
- G. Meike
|
#155 | |
#156 | The Art of Memory Forensics - Michael Hale Ligh
- Andrew Case
- Jamie Levy
- AAron Walters
|
#157 | |
#158 | C++ Crash Course: A Fast-Paced Introduction |
#159 | |
#160 | The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life |
#161 | |
#162 | Agile Principles, Patterns, and Practices in C# - Robert C. Martin
- Micah Martin
|
#163 | Clean Code: A Handbook of Agile Software Craftsmanship |
#164 | Clean Architecture: A Craftsman's Guide to Software Structure and Design |
#165 | Rest API Design Rulebook: Designing Consistent Restful Web Service Interfaces |
#166 | Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats - Alex Matrosov
- Eugene Rodionov
- Sergey Bratus
|
#167 | Python Crash Course, 2nd Edition |
#168 | Dive Into Systems: A Gentle Introduction to Computer Systems - Suzanne J Matthews
- Tia Newhall
- Kevin C. Webb
|
#169 | |
#170 | Cyberjutsu: Cybersecurity for the Modern Ninja |
#171 | |
#172 | Web Security for Developers |
#173 | The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers - Kevin D. Mitnick
- William L. Simon
|
#174 | The Art of Deception - Kevin D. Mitnick
- William L. Simon
|
#175 | |
#176 | How To: Absurd Scientific Advice for Common Real-World Problems |
#177 | The Art of Software Testing |
#178 | Atari Age: The Emergence of Video Games in America |
#179 | Practical Forensic Imaging: Securing Digital Evidence with Linux Tools |
#180 | Learning PHP, MySQL, JavaScript, and CSS: A Step-by-Step Guide to Creating Dynamic Websites |
#181 | |
#182 | Developer's Dilemma: The Secret World of Videogame Creators |
#183 | Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy |
#184 | Beautiful Code - Jon L. Bentley
- Brian W. Kernighan
- Charles Petzold
- Douglas Crockford
- Henry S. Warren Jr.
- Ashish Gulhati
- Lincoln Stein
- Jim Kent
- Jack Dongarra
- Poitr Luszczek
- Adam Kolawa
- Greg Kroah-Hartman
- Diomidis Spinellis
- Andrew Kuchling
- Travis E. Oliphant
- Ronald Mak
- Rogério Atem de Carvalho
- Rafael Monnerat
- Bryan Cantrill
- Jeffrey Dean
- Sanjay Ghemawat
- Simon Peyton Jones
- R. Kent Dybuig
- William R. Otte
- Douglas C. Schmidt
- Andrew Patzer
- Karl Fogel
- Tim Bray
- Elliotte Rusty Harold
- Michael C. Feathers
- Alberto Savoia
|
#185 | Cybersecurity Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity |
#186 | |
#187 | |
#188 | |
#189 | |
#190 | Communities of Play Communities of Play: Emergent Cultures in Multiplayer Games and Virtual Worlds |
#191 | Test-Driven Development with Python: Obey the Testing Goat: Using Django, Selenium, and JavaScript |
#192 | |
#193 | |
#194 | Game Wizards: The Epic Battle for Dungeons & Dragons |
#195 | |
#196 | AWS Certified Solutions Architect Study Guide with Online Labs: Associate SAA-C02 Exam |
#197 | CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies: Exam 350-401 |
#198 | Introduction to Computer Organization: An Under the Hood Look at Hardware and x86-64 Assembly |
#199 | |
#200 | |
#201 | |
#202 | Cybersecurity and Third-Party Risk: Third Party Threat Hunting |