MARA's Library
  • Advanced Search
    • Guest

Uploading...

Please do not refresh the page.
  • Browse
  • Books
  • Top Rated Books
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • Shelves
  • MARA's Favourites (Public) 5
  • MARA's To Read (Public) 1
  • Queer Romance (Public) 49
  • Sex & Kink & Relationships (Public) 7
  • TTRPG Books & Resources (Public) 9
  • Technical Books (Public) 0
  • Trans Authors (Public) 26
  • Vancouver Locals (Public) 6

Discover (Random Books)

Metal Gear Solid: Boss Fight Books #9

Metal Gear Solid: Boss Fight Books #9

Anthony Burch & Ashly Burch

Fast & Fun Knits: Feel Good Projects to Make You Smile

Fast & Fun Knits: Feel Good Projects to Make You Smile

Claire Garland

SCROLL 06 - Codes of Our Lives

SCROLL 06 - Codes of Our Lives

Ray Barnholt

Starship Liberator

Starship Liberator

David VanDyke

Galactic Liberation (1)

Category: Technical

97 Things Every Programmer Should Know: Collective Wisdom from the Experts

97 Things Every Programmer Should Know: Collective Wisdom from ...

Kevlin Henney

Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

Adam Shostack

Think Stats: Exploratory Data Analysis

Think Stats: Exploratory Data Analysis

Allen B. Downey

Think Bayes: Bayesian Statistics Made Simple

Think Bayes: Bayesian Statistics Made Simple

Allen B. Downey

Technology Strategy Patterns: Architecture as Strategy

Technology Strategy Patterns: Architecture as Strategy

Eben Hewitt

Structure and Interpretation of Computer Programs

Structure and Interpretation of Computer Programs

Harold Abelson

MIT Electrical Engineering and Computer Science (1)

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

Silence on the Wire: A Field Guide to Passive Reconnaissance ...

Michal Zalewski

Secrets and Lies: Digital Security in a Networked World

Secrets and Lies: Digital Security in a Networked World

Bruce Schneier

Real World Haskell

Real World Haskell

Bryan O'Sullivan

Metasploit: The Penetration Tester's Guide

Metasploit: The Penetration Tester's Guide

David Kennedy

Applied Cryptography: Protocols, Algorithms and Source Code in C

Applied Cryptography: Protocols, Algorithms and Source Code ...

Bruce Schneier

Book Details

...