SCROLL 10 Summer
Ray Barnholt
Nine's Legacy
Pittacus Lore
Lorien Legacies: The Lost Files (2)
SCROLL 08 - The Totally Loaded and Fortified Irritating Spirit ...
A Wild Sheep Chase
Haruki Murakami
The Rat (3)
Technology Strategy Patterns: Architecture as Strategy
Eben Hewitt
Threat Modeling: Designing for Security
Adam Shostack
Think Bayes: Bayesian Statistics Made Simple
Allen B. Downey
Metasploit: The Penetration Tester's Guide
David Kennedy
Think Stats: Exploratory Data Analysis
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
97 Things Every Programmer Should Know: Collective Wisdom from ...
Kevlin Henney
Real World Haskell
Bryan O'Sullivan
Silence on the Wire: A Field Guide to Passive Reconnaissance ...
Michal Zalewski
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
Applied Cryptography: Protocols, Algorithms and Source Code ...
Cuckoo's Egg
Clifford Stoll
Structure and Interpretation of Computer Programs
Harold Abelson
MIT Electrical Engineering and Computer Science (1)