Florida Is Murder: Due Justice and Surface Tension Mystery Double ...
Diane Capri
The Halloween Moon
Joseph Fink
Any Other Name
Emma Newman
The Split Worlds (2)
Detransition, Baby
Torrey Peters
A Hacker's Mind: How the Powerful Bend Society's Rules, and ...
Bruce Schneier
Stolen Focus: Why You Can't Pay Attention - and How to Think ...
Johann Hari
Coldfusion Presents: New Thinking: From Einstein to Artificial ...
Dagogo Altraide
Films from the Future: The Technology and Morality of Sci-Fi ...
Andrew Maynard
Technology Strategy Patterns: Architecture as Strategy
Eben Hewitt
The Secret History of Mac Gaming
Richard Moss
Women in Tech: Take Your Career to the Next Level with Practical ...
Tarah Wheeler
Videogames for Humans
Merritt Kopas
ZZT
Anna Anthropy
Boss Fight Books (3)
Threat Modeling: Designing for Security
Adam Shostack
Stay Awhile and Listen: Book I - How Two Blizzards Unleashed ...
David L. Craddock
Evil by Design: Interaction Design to Lead Us Into Temptation
Chris Nodder
Atari Inc.: Business is Fun
Marty Goldberg
A Mind Forever Voyaging: A History of Storytelling in Video ...
Dylan Holmes
Pirate Cinema
Cory Doctorow
Wizzywig: Ritratto di un hacker seriale
Ed Piskor
Wizzywig (1)
Gamers at Work: Stories Behind the Games People Play
Morgan Ramsay
Distrust That Particular Flavor
William Gibson
Think Bayes: Bayesian Statistics Made Simple
Allen B. Downey
Metasploit: The Penetration Tester's Guide
David Kennedy
Think Stats: Exploratory Data Analysis
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Replay: The History of Video Games
Tristan Donovan
97 Things Every Programmer Should Know: Collective Wisdom from ...
Kevlin Henney
Racing the Beam: The Atari Video Computer System
Nick Montfort
Platform Studies (1)
Real World Haskell
Bryan O'Sullivan
Little Brother
Little Brother (1)
When Sysadmins Ruled the Earth
Commodork: Sordid Tales from a BBS Junkie
Rob O'Hara
Silence on the Wire: A Field Guide to Passive Reconnaissance ...
Michal Zalewski
Dungeons & Dreamers: A Story of how Computer Games Created a ...
Brad King
Secrets and Lies: Digital Security in a Networked World
Some Remarks: Essays and Other Writing
Neal Stephenson
Applied Cryptography: Protocols, Algorithms and Source Code ...
Cuckoo's Egg
Clifford Stoll
Structure and Interpretation of Computer Programs
Harold Abelson
MIT Electrical Engineering and Computer Science (1)