Tranny: Confessions of Punk Rock’s Most Infamous Anarchist Sellout
Laura Jane Grace & Dan Ozzi
The OCaml System: Documentation and User's Manual
Damien Doligez, Alain Frisch, Jacques Garrigue, Didier Rémy & Jérôme Vouillon
The Maker’s Guide to the Zombie Apocalypse
Simon Monk
Mastering OpenSCAD
Unknown
Hacker Monthly #38
Netizens Media
Hacker Monthly (38)
Hacker Monthly #40
Hacker Monthly (40)
Hacker Monthly #41
Hacker Monthly (41)
Hacker Monthly #42
Hacker Monthly (42)
Hacker Monthly #45
Hacker Monthly (45)
Hacker Monthly #46
Hacker Monthly (46)
Hacker Monthly #43
Hacker Monthly (43)
Hacker Monthly #44
Hacker Monthly (44)
Hacker Monthly Special Issue: Startup Stories
Hacker Monthly (0.0)
Hacker Monthly #47
Hacker Monthly (47)
Hacker Monthly Startup Marketing
Hacker Monthly #48
Hacker Monthly (48)
Hacker Monthly #52
Hacker Monthly (52)
Hacker Monthly #51
Hacker Monthly (51)
Hacker Monthly #53
Hacker Monthly (53)
Hacker Monthly #54
Hacker Monthly (54)
Hacker Monthly #55
Hacker Monthly (55)
Hacker Monthly #57
Hacker Monthly (57)
Hacker Monthly #49
Hacker Monthly (49)
Hacker Monthly #50
Hacker Monthly (50)
Hacker Monthly #60
Hacker Monthly (60)
Hacker Monthly #56
Hacker Monthly (56)
WotC88544 Chainer's Torment (MtG novel. Odyssey cycle book II)
Scott McGough
Odyssey (2)
Judgement
Will McDermott
Odyssey (3)
Python Crash Course
Eric Matthes
Complete Guide to Shodan
John Matherly
Hacking your way around in Emacs
Marcin Borkowski
LFE Reference Guide
LFE Maintainers
Guidelines for the Primary and Gender-Affirming Care of Transgender ...
Madeline B. Deutsch, MD, MPH
Erlang and OTP in Action
Martin Logan & Eric Merritt & Richard Carlsson
Programming Erlang
The Pragmatic Programmers, LLC (#nx000x)
Advanced Linux Programming
Codesourcery Llc & Mark L. Mitchell & Alex Samuel & Jeffrey Oldham
STH 4 ID
Kelly Link
MFB-Book reg ed 3
The Therac-25: 30 Years Later
Nancy Leveson
Medical Devices: The Therac-25
Mathematics for Computer Science
Eric Lehman & F. Thomson Leighton & Albert R. Meyer
Masquerade Cycle • Book I • Mercadian Masques
Fancis Lebaron
Masquerade Cycle (1)
Categories for the Working Mathematician
Saunders Mac Lane
Password Authentication with Insecure Communication
Leslie Lamport
Retelling racialized violence, remaking white innocence: The ...
Sarah Lamble
Seven Years
Hannako Lambert
My Name Is ...
LadyKarai
Ghost Stories (2)
Haunted
Ghost Stories (1)
The Secret World Chronicle
Mercedes Lackey
Get Programming with Haskell
Will Kurt
The Decision View's Role in Software Architecture Practice
Philippe Kruchten & Rafael Capilla & Juan Carlos Duenas
IEEE Software (26.02)
Whose feminism is it anyway? The unspoken racism of the trans ...
Emi Koyama
The Sociological Review (68.04)
The Language of LGBTQ+ Minority Stress Experiences on Social ...
Koustuv Saha, Sang Chan Kim, Manikanta D. Reddy, Albert J. Carter, ... & Munmun De Choudhury
Dean Koontz's Frankenstein: City of Night
Dean Ray Koontz & Edward Gorman
Prodigal Son
Dean Koontz & Kevin J. Anderson
TeX: The Program
Donald Knuth
A Bug Hunter's Diary
Tobias Klein
Invasion Cycle • Book II • Planeshift
J.Robert King
Invasion Cycle (2)
Invasion Cycle • Book I • Invasion
J. Robert King
Invasion Cycle (1)
Invasion Cycle • Book III • Apocalypse
Invasion Cycle (3)
Oral, Rectal, and Vaginal Pharmacokinetics of Misoprostol
Khan, R.-U., El-Refaey, H., Sharma, S., Sooranna, D., & Stafford, M.
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Designing BSD Rootkits
Joseph Kong
Tackling the Awkward Squad
Simon Peyton Jones