The Bone Collector
Jeffery Deaver
Lincoln Rhyme (1)
Bound by Blood
Terry Mixon
Vigilante (5)
Gideon the Ninth
Tamsyn Muir
The Locked Tomb (1)
The Anatomy of Mega Man & Mega Man 2: A complete breakdown of ...
Jeremy Parish
Structure and Interpretation of Computer Programs
Harold Abelson
MIT Electrical Engineering and Computer Science (1)
Coldfusion Presents: New Thinking: From Einstein to Artificial ...
Dagogo Altraide
ZZT
Anna Anthropy
Boss Fight Books (3)
Stay Awhile and Listen: Book I - How Two Blizzards Unleashed ...
David L. Craddock
Pirate Cinema
Cory Doctorow
When Sysadmins Ruled the Earth
Little Brother
Little Brother (1)
Replay: The History of Video Games
Tristan Donovan
Think Stats: Exploratory Data Analysis
Allen B. Downey
Think Bayes: Bayesian Statistics Made Simple
Distrust That Particular Flavor
William Gibson
Atari Inc.: Business is Fun
Marty Goldberg
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Stolen Focus: Why You Can't Pay Attention - and How to Think ...
Johann Hari
97 Things Every Programmer Should Know: Collective Wisdom from ...
Kevlin Henney
Technology Strategy Patterns: Architecture as Strategy
Eben Hewitt
A Mind Forever Voyaging: A History of Storytelling in Video ...
Dylan Holmes
Metasploit: The Penetration Tester's Guide
David Kennedy
Dungeons & Dreamers: A Story of how Computer Games Created a ...
Brad King
Videogames for Humans
Merritt Kopas
Films from the Future: The Technology and Morality of Sci-Fi ...
Andrew Maynard
Silence on the Wire: A Field Guide to Passive Reconnaissance ...
Michal Zalewski
Racing the Beam: The Atari Video Computer System
Nick Montfort
Platform Studies (1)
The Secret History of Mac Gaming
Richard Moss
Evil by Design: Interaction Design to Lead Us Into Temptation
Chris Nodder
Commodork: Sordid Tales from a BBS Junkie
Rob O'Hara
Real World Haskell
Bryan O'Sullivan
Wizzywig: Ritratto di un hacker seriale
Ed Piskor
Wizzywig (1)
Gamers at Work: Stories Behind the Games People Play
Morgan Ramsay
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
Applied Cryptography: Protocols, Algorithms and Source Code ...
A Hacker's Mind: How the Powerful Bend Society's Rules, and ...
Threat Modeling: Designing for Security
Adam Shostack
Some Remarks: Essays and Other Writing
Neal Stephenson
Cuckoo's Egg
Clifford Stoll
Women in Tech: Take Your Career to the Next Level with Practical ...
Tarah Wheeler