Yes, You Are Trans Enough: My Transition from Self-Loathing ...
Mia Violet
The Medusa Chronicles
Stephen Baxter
Best Game Ever: A Virtuella Novel
R.R. Angell
Orphan Star
Alan Dean Foster
Pip & Flinx (3)
Cuckoo's Egg
Clifford Stoll
Threat Modeling: Designing for Security
Adam Shostack
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
Secrets and Lies: Digital Security in a Networked World
Real World Haskell
Bryan O'Sullivan
Silence on the Wire: A Field Guide to Passive Reconnaissance ...
Michal Zalewski
Metasploit: The Penetration Tester's Guide
David Kennedy
Technology Strategy Patterns: Architecture as Strategy
Eben Hewitt
97 Things Every Programmer Should Know: Collective Wisdom from ...
Kevlin Henney
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Think Bayes: Bayesian Statistics Made Simple
Allen B. Downey
Think Stats: Exploratory Data Analysis
Structure and Interpretation of Computer Programs
Harold Abelson
MIT Electrical Engineering and Computer Science (1)