MARA's Library
  • Advanced Search
    • Guest
    • Login
    • Register

Uploading...

Please do not refresh the page.
  • Browse
  • Books
  • Top Rated Books
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • Ratings
  • Shelves
  • MARA's Favourites (Public)
  • MARA's To Read (Public)
  • Queer Romance (Public)
  • Sex & Kink & Relationships (Public)
  • TTRPG Books & Resources (Public)
  • Technical Books (Public)
  • Trans Authors (Public)
  • Vancouver Locals (Public)

Discover (Random Books)

A Storm of Swords

A Storm of Swords

George R.R. Martin

A Song of Ice and Fire (3)

Caliban's War

Caliban's War

James S.A. Corey

The Expanse (2)

I Am Legend

I Am Legend

Richard Matheson

Infinity Engine: Transformation Book Three

Infinity Engine: Transformation Book Three

Neal Asher

Polity Universe (chronological) (11)

Category: Computer Science

Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

Adam Shostack

Think Stats: Exploratory Data Analysis

Think Stats: Exploratory Data Analysis

Allen B. Downey

Think Bayes: Bayesian Statistics Made Simple

Think Bayes: Bayesian Statistics Made Simple

Allen B. Downey

Technology Strategy Patterns: Architecture as Strategy

Technology Strategy Patterns: Architecture as Strategy

Eben Hewitt

Structure and Interpretation of Computer Programs

Structure and Interpretation of Computer Programs

Harold Abelson

MIT Electrical Engineering and Computer Science (1)

Social Engineering: The Science of Human Hacking

Social Engineering: The Science of Human Hacking

Christopher Hadnagy

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

Silence on the Wire: A Field Guide to Passive Reconnaissance ...

Michal Zalewski

Secrets and Lies: Digital Security in a Networked World

Secrets and Lies: Digital Security in a Networked World

Bruce Schneier

Real World Haskell

Real World Haskell

Bryan O'Sullivan

Metasploit: The Penetration Tester's Guide

Metasploit: The Penetration Tester's Guide

David Kennedy

Cuckoo's Egg

Cuckoo's Egg

Clifford Stoll

Applied Cryptography: Protocols, Algorithms and Source Code in C

Applied Cryptography: Protocols, Algorithms and Source Code ...

Bruce Schneier

97 Things Every Programmer Should Know: Collective Wisdom from the Experts

97 Things Every Programmer Should Know: Collective Wisdom from ...

Kevlin Henney

Book Details

...