MARA's Library
  • Advanced Search
    • Guest
    • Login
    • Register

Uploading...

Please do not refresh the page.
  • Browse
  • Books
  • Top Rated Books
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • Shelves
  • MARA's Favourites (Public)
  • MARA's To Read (Public)
  • Queer Romance (Public)
  • Sex & Kink & Relationships (Public)
  • TTRPG Books & Resources (Public)
  • Technical Books (Public)
  • Trans Authors (Public)
  • Vancouver Locals (Public)

Discover (Random Books)

Le Silmarillion t2

Le Silmarillion t2

J.R.R. Tolkien

Paper Love

Paper Love

Jae

Fighting Game Fundamentals

Fighting Game Fundamentals

gootecks

Monsters in the Dark: The Making of X-COM: UFO Defense

Monsters in the Dark: The Making of X-COM: UFO Defense

David L. Craddock

Category: Computers

Structure and Interpretation of Computer Programs

Structure and Interpretation of Computer Programs

Harold Abelson

MIT Electrical Engineering and Computer Science (1)

Cuckoo's Egg

Cuckoo's Egg

Clifford Stoll

Applied Cryptography: Protocols, Algorithms and Source Code in C

Applied Cryptography: Protocols, Algorithms and Source Code ...

Bruce Schneier

Secrets and Lies: Digital Security in a Networked World

Secrets and Lies: Digital Security in a Networked World

Bruce Schneier

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

Silence on the Wire: A Field Guide to Passive Reconnaissance ...

Michal Zalewski

Commodork: Sordid Tales from a BBS Junkie

Commodork: Sordid Tales from a BBS Junkie

Rob O'Hara

Real World Haskell

Real World Haskell

Bryan O'Sullivan

Racing the Beam: The Atari Video Computer System

Racing the Beam: The Atari Video Computer System

Nick Montfort

Platform Studies (1)

97 Things Every Programmer Should Know: Collective Wisdom from the Experts

97 Things Every Programmer Should Know: Collective Wisdom from ...

Kevlin Henney

Think Stats: Exploratory Data Analysis

Think Stats: Exploratory Data Analysis

Allen B. Downey

Metasploit: The Penetration Tester's Guide

Metasploit: The Penetration Tester's Guide

David Kennedy

Think Bayes: Bayesian Statistics Made Simple

Think Bayes: Bayesian Statistics Made Simple

Allen B. Downey

Wizzywig: Ritratto di un hacker seriale

Wizzywig: Ritratto di un hacker seriale

Ed Piskor

Wizzywig (1)

Atari Inc.: Business is Fun

Atari Inc.: Business is Fun

Marty Goldberg

Evil by Design: Interaction Design to Lead Us Into Temptation

Evil by Design: Interaction Design to Lead Us Into Temptation

Chris Nodder

Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

Adam Shostack

Metal Gear Solid: Boss Fight Books #9

Metal Gear Solid: Boss Fight Books #9

Ashly Burch & Anthony Burch

Super Power, Spoony Bards, and Silverware: The Super Nintendo Entertainment System

Super Power, Spoony Bards, and Silverware: The Super Nintendo ...

Dominic Arsenault

The Game Beat: Observations and Lessons From Two Decades Writing About Games

The Game Beat: Observations and Lessons From Two Decades Writing ...

Kyle Orland

A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back

A Hacker's Mind: How the Powerful Bend Society's Rules, and ...

Bruce Schneier

Book Details

...