Japanese for Busy People - Kana Workbook
Kana Workbook
The Diamond Age
Neal Stephenson
Snuff
Pratchett, Terry
Discworld (39)
The Door Into Summer
Heinlein, Robert A.
Why Functional Programming Matters
John Hughes
An investigation of the Therac-25 accidents - Computer
IEEE
A Critical Analysis of the Role of Testosterone in Erectile ...
Andrea M. Isidori & Jacques Buvat & Giovanni Corona & Irwin Goldstein & Emmanule A. Jannini & Andrea Lenzi & Hartmut Porst & Andrea Salonia & Abdulmaged M. Traish & Mario Maggi
European Urology (65.01)
A Falsification View of Success Typing
Robert Jakob & Peter Thiemann
Designing Elixir Systems with OTP (for Correl Roush)
James Edward Gray, II, Bruce A. Tate
Designing Elixir Systems with OTP
Trans Girls Hit the Town
Emma Jayne
The toilet debate: Stalling trans possibilities and defending ...
Charlotte Jones & Jen Slater
The Sociological Review (68.04)
Haskell vs. Ada vs. C++ vs. Awk vs. ... An Experiment in Software ...
Paul Hudak & Mark Jones
Tackling the Awkward Squad
Simon Peyton Jones
Designing BSD Rootkits
Joseph Kong
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Oral, Rectal, and Vaginal Pharmacokinetics of Misoprostol
Khan, R.-U., El-Refaey, H., Sharma, S., Sooranna, D., & Stafford, M.
Invasion Cycle • Book III • Apocalypse
J. Robert King
Invasion Cycle (3)
Invasion Cycle • Book I • Invasion
Invasion Cycle (1)
Invasion Cycle • Book II • Planeshift
J.Robert King
Invasion Cycle (2)
A Bug Hunter's Diary
Tobias Klein
TeX: The Program
Donald Knuth
Prodigal Son
Dean Koontz & Kevin J. Anderson
Dean Koontz's Frankenstein: City of Night
Dean Ray Koontz & Edward Gorman
The Language of LGBTQ+ Minority Stress Experiences on Social ...
Koustuv Saha, Sang Chan Kim, Manikanta D. Reddy, Albert J. Carter, ... & Munmun De Choudhury
Whose feminism is it anyway? The unspoken racism of the trans ...
Emi Koyama
The Decision View's Role in Software Architecture Practice
Philippe Kruchten & Rafael Capilla & Juan Carlos Duenas
IEEE Software (26.02)
Get Programming with Haskell
Will Kurt
The Secret World Chronicle
Mercedes Lackey
Haunted
LadyKarai
Ghost Stories (1)
My Name Is ...
Ghost Stories (2)
Seven Years
Hannako Lambert
Retelling racialized violence, remaking white innocence: The ...
Sarah Lamble
Password Authentication with Insecure Communication
Leslie Lamport
Categories for the Working Mathematician
Saunders Mac Lane
Masquerade Cycle • Book I • Mercadian Masques
Fancis Lebaron
Masquerade Cycle (1)
Mathematics for Computer Science
Eric Lehman & F. Thomson Leighton & Albert R. Meyer
Medical Devices: The Therac-25
Nancy Leveson
The Therac-25: 30 Years Later
MFB-Book reg ed 3
Kelly Link
STH 4 ID
Advanced Linux Programming
Codesourcery Llc & Mark L. Mitchell & Alex Samuel & Jeffrey Oldham
Programming Erlang
The Pragmatic Programmers, LLC (#nx000x)
Erlang and OTP in Action
Martin Logan & Eric Merritt & Richard Carlsson
Guidelines for the Primary and Gender-Affirming Care of Transgender ...
Madeline B. Deutsch, MD, MPH
LFE Reference Guide
LFE Maintainers
Hacking your way around in Emacs
Marcin Borkowski
Complete Guide to Shodan
John Matherly
Python Crash Course
Eric Matthes
Judgement
Will McDermott
Odyssey (3)
WotC88544 Chainer's Torment (MtG novel. Odyssey cycle book II)
Scott McGough
Odyssey (2)
Hacker Monthly #56
Netizens Media
Hacker Monthly (56)
Hacker Monthly #60
Hacker Monthly (60)
Hacker Monthly #50
Hacker Monthly (50)
Hacker Monthly #49
Hacker Monthly (49)
Hacker Monthly #57
Hacker Monthly (57)
Hacker Monthly #55
Hacker Monthly (55)
Hacker Monthly #54
Hacker Monthly (54)
Hacker Monthly #53
Hacker Monthly (53)
Hacker Monthly #51
Hacker Monthly (51)
Hacker Monthly #52
Hacker Monthly (52)
Hacker Monthly #48
Hacker Monthly (48)
Hacker Monthly Startup Marketing
Hacker Monthly (0.0)
Hacker Monthly #47
Hacker Monthly (47)