Blood Ties
Robert Lynn Asprin
Thieves' World (9)
The Fate of Ten
Pittacus Lore
Lorien Legacies (6)
Perelandra
C.S. Lewis
The Space Trilogy (2)
Becoming a Writer, Staying a Writer: The Artistry, Joy, and ...
J. Michael Straczynski
Threat Modeling: Designing for Security
Adam Shostack
Think Stats: Exploratory Data Analysis
Allen B. Downey
Think Bayes: Bayesian Statistics Made Simple
Technology Strategy Patterns: Architecture as Strategy
Eben Hewitt
Structure and Interpretation of Computer Programs
Harold Abelson
MIT Electrical Engineering and Computer Science (1)
Social Engineering: The Science of Human Hacking
Christopher Hadnagy
Silence on the Wire: A Field Guide to Passive Reconnaissance ...
Michal Zalewski
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
Real World Haskell
Bryan O'Sullivan
Metasploit: The Penetration Tester's Guide
David Kennedy
Cuckoo's Egg
Clifford Stoll
Applied Cryptography: Protocols, Algorithms and Source Code ...
97 Things Every Programmer Should Know: Collective Wisdom from ...
Kevlin Henney