Word Puppets
Mary Robinette Kowal
Lady Astronaut Universe (1)
The Red Sword: The Complete Trilogy
Michael Wallace
The Red Sword Trilogy (1)
Vacuum Diagrams
Stephen Baxter
Xeelee Sequence (5)
Mort
Terry Pratchett
Discworld (4)
Cuckoo's Egg
Clifford Stoll
Threat Modeling: Designing for Security
Adam Shostack
A Hacker's Mind: How the Powerful Bend Society's Rules, and ...
Bruce Schneier
Applied Cryptography: Protocols, Algorithms and Source Code ...
Secrets and Lies: Digital Security in a Networked World
Wizzywig: Ritratto di un hacker seriale
Ed Piskor
Wizzywig (1)
The Game Beat: Observations and Lessons From Two Decades Writing ...
Kyle Orland
Real World Haskell
Bryan O'Sullivan
Commodork: Sordid Tales from a BBS Junkie
Rob O'Hara
Evil by Design: Interaction Design to Lead Us Into Temptation
Chris Nodder
Racing the Beam: The Atari Video Computer System
Nick Montfort
Platform Studies (1)
Silence on the Wire: A Field Guide to Passive Reconnaissance ...
Michal Zalewski
Metasploit: The Penetration Tester's Guide
David Kennedy
97 Things Every Programmer Should Know: Collective Wisdom from ...
Kevlin Henney
Atari Inc.: Business is Fun
Marty Goldberg
Think Bayes: Bayesian Statistics Made Simple
Allen B. Downey
Think Stats: Exploratory Data Analysis
Metal Gear Solid: Boss Fight Books #9
Ashly Burch & Anthony Burch
Super Power, Spoony Bards, and Silverware: The Super Nintendo ...
Dominic Arsenault
Structure and Interpretation of Computer Programs
Harold Abelson
MIT Electrical Engineering and Computer Science (1)