Le Silmarillion t2
J.R.R. Tolkien
Paper Love
Jae
Fighting Game Fundamentals
gootecks
Monsters in the Dark: The Making of X-COM: UFO Defense
David L. Craddock
Structure and Interpretation of Computer Programs
Harold Abelson
MIT Electrical Engineering and Computer Science (1)
Cuckoo's Egg
Clifford Stoll
Applied Cryptography: Protocols, Algorithms and Source Code ...
Bruce Schneier
Secrets and Lies: Digital Security in a Networked World
Silence on the Wire: A Field Guide to Passive Reconnaissance ...
Michal Zalewski
Commodork: Sordid Tales from a BBS Junkie
Rob O'Hara
Real World Haskell
Bryan O'Sullivan
Racing the Beam: The Atari Video Computer System
Nick Montfort
Platform Studies (1)
97 Things Every Programmer Should Know: Collective Wisdom from ...
Kevlin Henney
Think Stats: Exploratory Data Analysis
Allen B. Downey
Metasploit: The Penetration Tester's Guide
David Kennedy
Think Bayes: Bayesian Statistics Made Simple
Wizzywig: Ritratto di un hacker seriale
Ed Piskor
Wizzywig (1)
Atari Inc.: Business is Fun
Marty Goldberg
Evil by Design: Interaction Design to Lead Us Into Temptation
Chris Nodder
Threat Modeling: Designing for Security
Adam Shostack
Metal Gear Solid: Boss Fight Books #9
Ashly Burch & Anthony Burch
Super Power, Spoony Bards, and Silverware: The Super Nintendo ...
Dominic Arsenault
The Game Beat: Observations and Lessons From Two Decades Writing ...
Kyle Orland
A Hacker's Mind: How the Powerful Bend Society's Rules, and ...