Magic, Inc
Robert A. Heinlein
Hacker Monthly February 2011
Netizens Media
Hacker Monthly (9)
Domain-Driven Design: Tackling Complexity in the Heart of Software
Eric Evans
../ubunchu-01-ltr[..]
Unknown
The Secret World Chronicle
Mercedes Lackey
Zoo City
Lauren Beukes
Pirate Cinema
Cory Doctorow
E.W.Dijkstra Archive: The Humble Programmer (EWD 340)
Working Effectively with Legacy Code
Michael C. Feathers
Distributed systems for fun and profit
Mikito Takada
Japanese Grammar Guide
Programming Erlang, Second Edition
Joe Armstrong
Bleeding Violet
Dia Reeves
Jumper
Steven Gould
The God Engines
John Scalzi
The Happiest Days of Our Lives
Wil Wheaton
Zombies vs. Unicorns
Justine Larbalestier, Holly Black
Uglies
Scott Westerfeld
Tithe
Holly Black
Mogworld
Yahtzee Croshaw
Beck v16[MS]
Beck v17[MS]
Beck v18[MS]
Beck v19[MS]
Beck v20[MonE]
Beck v21[MonE]
Beck v22[MonE]
Beck v23[MonE]
Beck v24[MonE]
Beck v25[MCS]
Learnable Programming
ILC2014 summary
Hacker Monthly #56
Hacker Monthly (56)
Hacker Monthly #60
Hacker Monthly (60)
Hacker Monthly #50
Hacker Monthly (50)
Hacker Monthly #49
Hacker Monthly (49)
Hacker Monthly #57
Hacker Monthly (57)
Hacker Monthly #55
Hacker Monthly (55)
Hacker Monthly #54
Hacker Monthly (54)
Hacker Monthly #53
Hacker Monthly (53)
Hacker Monthly #51
Hacker Monthly (51)
Hacker Monthly #52
Hacker Monthly (52)
Hacker Monthly #48
Hacker Monthly (48)
Hacker Monthly #47
Hacker Monthly (47)
Hacker Monthly #44
Hacker Monthly (44)
Hacker Monthly #43
Hacker Monthly (43)
Hacker Monthly #46
Hacker Monthly (46)
Hacker Monthly #45
Hacker Monthly (45)
Hacker Monthly #42
Hacker Monthly (42)
Hacker Monthly #41
Hacker Monthly (41)
Hacker Monthly #40
Hacker Monthly (40)
Hacker Monthly #38
Hacker Monthly (38)
Hacker Monthly #37
Hacker Monthly (37)
Hacker Monthly #39
Hacker Monthly (39)
Hacker Monthly #58
Hacker Monthly (58)
Hacker Monthly #59
Hacker Monthly (59)
Hacker Monthly #61
Hacker Monthly (61)
Understanding LDAP - Design and Implementation
IBM Redbooks
Quick Start Guide
John Schember
DnD5ePlayersHandbook
Designing BSD Rootkits
Joseph Kong
Elm in Action MEAP V04
Richard Feldman
Elm in Action MEAP V05
Introduction to the Theory of Computation, Second Edition
Michael Sipser