MARA's Library
  • Advanced Search
    • Guest
    • Login
    • Register

Uploading...

Please do not refresh the page.
  • Browse
  • Books
  • Top Rated Books
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • Shelves
  • MARA's Favourites (Public)
  • MARA's To Read (Public)
  • Queer Romance (Public)
  • Sex & Kink & Relationships (Public)
  • TTRPG Books & Resources (Public)
  • Technical Books (Public)
  • Trans Authors (Public)
  • Vancouver Locals (Public)

Discover (Random Books)

Nona the Ninth

Nona the Ninth

Tamsyn Muir

The Locked Tomb (3)

One-Eyed Jacks

One-Eyed Jacks

George R.R. Martin

Wild Cards (8)

SCROLL 08 - The Totally Loaded and Fortified Irritating Spirit of Battle Unit Jaleco

SCROLL 08 - The Totally Loaded and Fortified Irritating Spirit ...

Ray Barnholt

Three Sisters, Three Queens

Three Sisters, Three Queens

Philippa Gregory

The Tudor Court (2)

Category: Programming

Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

Adam Shostack

Think Stats: Exploratory Data Analysis

Think Stats: Exploratory Data Analysis

Allen B. Downey

Think Bayes: Bayesian Statistics Made Simple

Think Bayes: Bayesian Statistics Made Simple

Allen B. Downey

Theory of Fun for Game Design

Theory of Fun for Game Design

Raph Koster

Technology Strategy Patterns: Architecture as Strategy

Technology Strategy Patterns: Architecture as Strategy

Eben Hewitt

Super Power, Spoony Bards, and Silverware: The Super Nintendo Entertainment System

Super Power, Spoony Bards, and Silverware: The Super Nintendo ...

Dominic Arsenault

Structure and Interpretation of Computer Programs

Structure and Interpretation of Computer Programs

Harold Abelson

MIT Electrical Engineering and Computer Science (1)

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

Silence on the Wire: A Field Guide to Passive Reconnaissance ...

Michal Zalewski

Secrets and Lies: Digital Security in a Networked World

Secrets and Lies: Digital Security in a Networked World

Bruce Schneier

Real World Haskell

Real World Haskell

Bryan O'Sullivan

Racing the Beam: The Atari Video Computer System

Racing the Beam: The Atari Video Computer System

Nick Montfort

Platform Studies (1)

Metasploit: The Penetration Tester's Guide

Metasploit: The Penetration Tester's Guide

David Kennedy

Metal Gear Solid: Boss Fight Books #9

Metal Gear Solid: Boss Fight Books #9

Ashly Burch & Anthony Burch

Evil by Design: Interaction Design to Lead Us Into Temptation

Evil by Design: Interaction Design to Lead Us Into Temptation

Chris Nodder

Applied Cryptography: Protocols, Algorithms and Source Code in C

Applied Cryptography: Protocols, Algorithms and Source Code ...

Bruce Schneier

97 Things Every Programmer Should Know: Collective Wisdom from the Experts

97 Things Every Programmer Should Know: Collective Wisdom from ...

Kevlin Henney

Book Details

...