Yes, You Are Trans Enough: My Transition from Self-Loathing ...
Mia Violet
The Other Wind
Ursula K. Le Guin
Earthsea Cycle (6)
Sisterhood of Dune
Brian Herbert
Schools of Dune (1)
Halo: The Cole Protocol
Tobias S. Buckell
Halo (6)
97 Things Every Programmer Should Know: Collective Wisdom from ...
Kevlin Henney
Wizzywig: Ritratto di un hacker seriale
Ed Piskor
Wizzywig (1)
Threat Modeling: Designing for Security
Adam Shostack
Think Stats: Exploratory Data Analysis
Allen B. Downey
Think Bayes: Bayesian Statistics Made Simple
The Game Beat: Observations and Lessons From Two Decades Writing ...
Kyle Orland
Cuckoo's Egg
Clifford Stoll
Super Power, Spoony Bards, and Silverware: The Super Nintendo ...
Dominic Arsenault
Structure and Interpretation of Computer Programs
Harold Abelson
MIT Electrical Engineering and Computer Science (1)
Silence on the Wire: A Field Guide to Passive Reconnaissance ...
Michal Zalewski
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
Real World Haskell
Bryan O'Sullivan
Racing the Beam: The Atari Video Computer System
Nick Montfort
Platform Studies (1)
Metasploit: The Penetration Tester's Guide
David Kennedy
Metal Gear Solid: Boss Fight Books #9
Ashly Burch & Anthony Burch
Evil by Design: Interaction Design to Lead Us Into Temptation
Chris Nodder
Commodork: Sordid Tales from a BBS Junkie
Rob O'Hara
Atari Inc.: Business is Fun
Marty Goldberg
Applied Cryptography: Protocols, Algorithms and Source Code ...
A Hacker's Mind: How the Powerful Bend Society's Rules, and ...