MARA's Library
  • Advanced Search
    • Guest
    • Login
    • Register

Uploading...

Please do not refresh the page.
  • Browse
  • Books
  • Top Rated Books
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • Shelves
  • MARA's Favourites (Public)
  • MARA's To Read (Public)
  • Queer Romance (Public)
  • Sex & Kink & Relationships (Public)
  • TTRPG Books & Resources (Public)
  • Technical Books (Public)
  • Trans Authors (Public)
  • Vancouver Locals (Public)

Discover (Random Books)

For Us, the Living: A Comedy of Customs

For Us, the Living: A Comedy of Customs

Robert A. Heinlein

Unsung America: Immigrant Trailblazers and Our Fight for Freedom

Unsung America: Immigrant Trailblazers and Our Fight for Freedom

Prerna Lal

The Shepherd's Crown

The Shepherd's Crown

Terry Pratchett

Discworld (41)

A Hat Full of Sky

A Hat Full of Sky

Terry Pratchett

Discworld (32)

Category: Technical

97 Things Every Programmer Should Know: Collective Wisdom from the Experts

97 Things Every Programmer Should Know: Collective Wisdom from ...

Kevlin Henney

Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

Adam Shostack

Think Stats: Exploratory Data Analysis

Think Stats: Exploratory Data Analysis

Allen B. Downey

Think Bayes: Bayesian Statistics Made Simple

Think Bayes: Bayesian Statistics Made Simple

Allen B. Downey

Technology Strategy Patterns: Architecture as Strategy

Technology Strategy Patterns: Architecture as Strategy

Eben Hewitt

Structure and Interpretation of Computer Programs

Structure and Interpretation of Computer Programs

Harold Abelson

MIT Electrical Engineering and Computer Science (1)

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

Silence on the Wire: A Field Guide to Passive Reconnaissance ...

Michal Zalewski

Secrets and Lies: Digital Security in a Networked World

Secrets and Lies: Digital Security in a Networked World

Bruce Schneier

Real World Haskell

Real World Haskell

Bryan O'Sullivan

Metasploit: The Penetration Tester's Guide

Metasploit: The Penetration Tester's Guide

David Kennedy

Applied Cryptography: Protocols, Algorithms and Source Code in C

Applied Cryptography: Protocols, Algorithms and Source Code ...

Bruce Schneier

Book Details

...