George R.R. Martin's Doorways
George R.R. Martin
Starter Villain
John Scalzi
The Hollow Ones
Guillermo del Toro
Blackwood Tapes (1)
Once Ghosted, Twice Shy
Alyssa Cole
Reluctant Royals (2.50)
97 Things Every Programmer Should Know: Collective Wisdom from ...
Kevlin Henney
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
Atari Inc.: Business is Fun
Marty Goldberg
Coldfusion Presents: New Thinking: From Einstein to Artificial ...
Dagogo Altraide
Commodork: Sordid Tales from a BBS Junkie
Rob O'Hara
Cuckoo's Egg
Clifford Stoll
Distrust That Particular Flavor
William Gibson
Dungeons & Dreamers: A Story of how Computer Games Created a ...
Brad King
Evil by Design: Interaction Design to Lead Us Into Temptation
Chris Nodder
Films from the Future: The Technology and Morality of Sci-Fi ...
Andrew Maynard
Gamers at Work: Stories Behind the Games People Play
Morgan Ramsay
A Hacker's Mind: How the Powerful Bend Society's Rules, and ...
Little Brother
Cory Doctorow
Little Brother (1)
Metasploit: The Penetration Tester's Guide
David Kennedy
A Mind Forever Voyaging: A History of Storytelling in Video ...
Dylan Holmes
Pirate Cinema
Racing the Beam: The Atari Video Computer System
Nick Montfort
Platform Studies (1)
Real World Haskell
Bryan O'Sullivan
Replay: The History of Video Games
Tristan Donovan
The Secret History of Mac Gaming
Richard Moss
Secrets and Lies: Digital Security in a Networked World
Silence on the Wire: A Field Guide to Passive Reconnaissance ...
Michal Zalewski
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Some Remarks: Essays and Other Writing
Neal Stephenson
Stay Awhile and Listen: Book I - How Two Blizzards Unleashed ...
David L. Craddock
Stolen Focus: Why You Can't Pay Attention - and How to Think ...
Johann Hari
Structure and Interpretation of Computer Programs
Harold Abelson
MIT Electrical Engineering and Computer Science (1)
Technology Strategy Patterns: Architecture as Strategy
Eben Hewitt
Think Bayes: Bayesian Statistics Made Simple
Allen B. Downey
Think Stats: Exploratory Data Analysis
Threat Modeling: Designing for Security
Adam Shostack
Videogames for Humans
Merritt Kopas
When Sysadmins Ruled the Earth
Wizzywig: Ritratto di un hacker seriale
Ed Piskor
Wizzywig (1)
Women in Tech: Take Your Career to the Next Level with Practical ...
Tarah Wheeler
ZZT
Anna Anthropy
Boss Fight Books (3)