Nona the Ninth
Tamsyn Muir
The Locked Tomb (3)
One-Eyed Jacks
George R.R. Martin
Wild Cards (8)
SCROLL 08 - The Totally Loaded and Fortified Irritating Spirit ...
Ray Barnholt
Three Sisters, Three Queens
Philippa Gregory
The Tudor Court (2)
Threat Modeling: Designing for Security
Adam Shostack
Think Stats: Exploratory Data Analysis
Allen B. Downey
Think Bayes: Bayesian Statistics Made Simple
Theory of Fun for Game Design
Raph Koster
Technology Strategy Patterns: Architecture as Strategy
Eben Hewitt
Super Power, Spoony Bards, and Silverware: The Super Nintendo ...
Dominic Arsenault
Structure and Interpretation of Computer Programs
Harold Abelson
MIT Electrical Engineering and Computer Science (1)
Silence on the Wire: A Field Guide to Passive Reconnaissance ...
Michal Zalewski
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
Real World Haskell
Bryan O'Sullivan
Racing the Beam: The Atari Video Computer System
Nick Montfort
Platform Studies (1)
Metasploit: The Penetration Tester's Guide
David Kennedy
Metal Gear Solid: Boss Fight Books #9
Ashly Burch & Anthony Burch
Evil by Design: Interaction Design to Lead Us Into Temptation
Chris Nodder
Applied Cryptography: Protocols, Algorithms and Source Code ...
97 Things Every Programmer Should Know: Collective Wisdom from ...
Kevlin Henney