MARA's Library
  • Advanced Search
    • Guest
    • Login
    • Register

Uploading...

Please do not refresh the page.
  • Browse
  • Books
  • Top Rated Books
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • Shelves
  • MARA's Favourites (Public)
  • MARA's To Read (Public)
  • Queer Romance (Public)
  • Sex & Kink & Relationships (Public)
  • TTRPG Books & Resources (Public)
  • Technical Books (Public)
  • Trans Authors (Public)
  • Vancouver Locals (Public)

Discover (Random Books)

Shadows Over Innsmouth

Shadows Over Innsmouth

Stephen Jones

The Diogenes Club (1)

Rogues

Rogues

George R.R. Martin

The First Law (1)

Dead Man's Hand

Dead Man's Hand

George R.R. Martin

Wild Cards (7)

Wind-up Bird Chronicle Part 1 La Gazza Ladra Hen ( Shincho Paperback) Japanese Language Book

Wind-up Bird Chronicle Part 1 La Gazza Ladra Hen ( Shincho Paperback) ...

Haruki Murakami

ねじまき鳥クロニクル (1)

Category: Computer Science

97 Things Every Programmer Should Know: Collective Wisdom from the Experts

97 Things Every Programmer Should Know: Collective Wisdom from ...

Kevlin Henney

Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

Adam Shostack

Think Stats: Exploratory Data Analysis

Think Stats: Exploratory Data Analysis

Allen B. Downey

Think Bayes: Bayesian Statistics Made Simple

Think Bayes: Bayesian Statistics Made Simple

Allen B. Downey

Cuckoo's Egg

Cuckoo's Egg

Clifford Stoll

Technology Strategy Patterns: Architecture as Strategy

Technology Strategy Patterns: Architecture as Strategy

Eben Hewitt

Structure and Interpretation of Computer Programs

Structure and Interpretation of Computer Programs

Harold Abelson

MIT Electrical Engineering and Computer Science (1)

Social Engineering: The Science of Human Hacking

Social Engineering: The Science of Human Hacking

Christopher Hadnagy

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

Silence on the Wire: A Field Guide to Passive Reconnaissance ...

Michal Zalewski

Secrets and Lies: Digital Security in a Networked World

Secrets and Lies: Digital Security in a Networked World

Bruce Schneier

Real World Haskell

Real World Haskell

Bryan O'Sullivan

Metasploit: The Penetration Tester's Guide

Metasploit: The Penetration Tester's Guide

David Kennedy

Applied Cryptography: Protocols, Algorithms and Source Code in C

Applied Cryptography: Protocols, Algorithms and Source Code ...

Bruce Schneier

Book Details

...