Gideon the Ninth
Tamsyn Muir
The Locked Tomb (1)
So Do You Wear a Cape?: The unofficial story of Magic: The Gathering
Titus Chalk
Turning Point
Jeffery Deaver
The Good in Bed Guide to Orally Pleasuring a Man
Emily Nagoski
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
Structure and Interpretation of Computer Programs
Harold Abelson
MIT Electrical Engineering and Computer Science (1)
Threat Modeling: Designing for Security
Adam Shostack