MARA's Library
  • Advanced Search
    • Guest
    • Login
    • Register

Uploading...

Please do not refresh the page.
  • Browse
  • Books
  • Top Rated Books
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • Shelves
  • MARA's Favourites (Public)
  • MARA's To Read (Public)
  • Queer Romance (Public)
  • Sex & Kink & Relationships (Public)
  • TTRPG Books & Resources (Public)
  • Technical Books (Public)
  • Trans Authors (Public)
  • Vancouver Locals (Public)

Discover (Random Books)

The Power of Six

The Power of Six

Pittacus Lore

Lorien Legacies (2)

Children of Dune

Children of Dune

Frank Herbert

Dune (3)

Warrior King

Warrior King

Evan Currie

Odyssey One (5)

Needful Things

Needful Things

Stephen King

Category: Textbooks

Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

Adam Shostack

Structure and Interpretation of Computer Programs

Structure and Interpretation of Computer Programs

Harold Abelson

MIT Electrical Engineering and Computer Science (1)

Applied Cryptography: Protocols, Algorithms and Source Code in C

Applied Cryptography: Protocols, Algorithms and Source Code ...

Bruce Schneier

Book Details

...