Wintersmith
Pratchett, Terry
Discworld (35)
The Legend Of Koizumi 16
Unknown
Hacker Monthly #28
Netizens Media
Hacker Monthly (28)
Whose feminism is it anyway? The unspoken racism of the trans ...
Emi Koyama
The Sociological Review (68.04)
He Who Fights with Monsters 6: A LitRPG Adventure
Travis Deverell & Shirtaloon
He Who Fights With Monsters (6)
He Who Fights with Monsters 3: A LitRPG Adventure
Shirtaloon
He Who Fights With Monsters (3)
He Who Fights with Monsters 4: A LitRPG Adventure
Shirtaloon & Travis Deverell
He Who Fights With Monsters (4)
He Who Fights with Monsters 2: A LitRPG Adventure
He Who Fights With Monsters (2)
He Who Fights with Monsters 5: A LitRPG Adventure
He Who Fights With Monsters (5)
He Who Fights with Monsters 7: A LitRPG Adventure
He Who Fights With Monsters (7)
He Who Fights with Monsters: A LitRPG Adventure
He Who Fights With Monsters (1)
Snuff
Discworld (39)
Complete Guide to Shodan
John Matherly
Transgender Marxism
Jules Joanne Gleeson & Elle O’Rourke
Get Programming with Haskell
Will Kurt
A Common-Sense Guide to Data Structures and Algorithms, Second ...
Jay Wengrow
Hacking your way around in Emacs
Marcin Borkowski
elm-ui: The CSS Escape Plan
Alex S. Korban
The Imposter’s Handbook, Season 1: A CS Primer for Self-taught ...
Rob Conery
Gender Euphoria: Stories of Joy from Trans, Non-binary and Intersex ...
Laura Kate Dale
NYPD Challenge Coins: Members Only
Research & Destroy New York City
Designing Elixir Systems with OTP
James Edward Gray, II, Bruce A. Tate
Programming Phoenix ≥ 1.4 (for Correl Roush)
Chris McCord, Bruce Tate, José Valim
Elm in Action
Richard Feldman
Designing Elixir Systems with OTP (for Correl Roush)
Property-Based Testing with PropEr, Erlang, and Elixir
Fred Hebert
Programming Elm
Jeremy Fairbank
Domain Modeling Made Functional
Scott Wlaschin
Elm in Action MEAP V07
Elm in Action MEAP V05
Seven Databases in Seven Weeks, Second Edition
Luc Perkins & Eric Redmond & Jim R. Wilson
The Mythical Man Month
Frederick Brooks
The Imposter's Handbook
Pragmatic Programmer, The: From Journeyman to Master (Jonathan ...
Andrew Hunt & David Thomas
Living With Crossdressing: Defining a New Normal
Savannah Hauk
F# for Fun and Profit
swlaschin
Elm in Action MEAP V04
My Name Is ...
LadyKarai
Ghost Stories (2)
Haunted
Ghost Stories (1)
80/20 Japanese (Romaji Edition)
Richard Webb
80/20 Japanese (2)
80/20 Japanese (Kana + Kanji Edition)
80/20 Japanese (3)
Elm in Action MEAP V03
Elm in Action MEAP V02
Professor Frisby's Mostly Adequate Guide to Functional Programming
drboolean
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
The Smart Girl’s Guide to Privacy: Practical Tips for Staying ...
Violet Blue
The Linux Command Line
William E. Shotts Jr.
A Bug Hunter's Diary
Tobias Klein
Bitcoin for the Befuddled
Conrad Barski & Chris Wilmer
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
HackingTheXbox Free
Andrew “bunnie” Huang
Python Crash Course
Eric Matthes
The Maker’s Guide to the Zombie Apocalypse
Simon Monk
Silence on the Wire
Michal Zalewski
Designing BSD Rootkits
Joseph Kong
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Designing for Scalability With Erlang/OTP: Implement Robust, ...
Francesco Cesarini & Steve Vinoski
Designing for Scalability With Erlang/Otp: Implementing Robust, ...
Francesco Cesarini & Simon Thompson & Steve Vinoski
Software Architecture Patterns
Mark Richards
Seven More Languages in Seven Weeks
Bruce A. Tate, Fred Daoud, Ian Dees, Jack Moffitt
Seven Concurrency Models in Seven Weeks
Paul Butcher
Hacker Monthly #61
Hacker Monthly (61)