The Legend Of Koizumi 84
Unknown
The Legend Of Koizumi 90
Hacker Monthly #27
Netizens Media
Hacker Monthly (27)
Glory Road
Robert A. Heinlein
The Therac-25: 30 Years Later
Nancy Leveson
Medical Devices: The Therac-25
Mathematics for Computer Science
Eric Lehman & F. Thomson Leighton & Albert R. Meyer
Arsène Lupin
Maurice Leblanc & Hugh Campbell & Camille Bauer
Masquerade Cycle • Book I • Mercadian Masques
Fancis Lebaron
Masquerade Cycle (1)
The Girl With the Dragon Tattoo
Stieg Larsson
Categories for the Working Mathematician
Saunders Mac Lane
Science of Concurrent Programs
Leslie Lamport
Specifying Systems: The TLA+ Language and Tools for Hardware ...
Password Authentication with Insecure Communication
Retelling racialized violence, remaking white innocence: The ...
Sarah Lamble
Seven Years
Hannako Lambert
My Name Is ...
LadyKarai
Ghost Stories (2)
Haunted
Ghost Stories (1)
Across the Horizon in Our Minds
Always You, Always Mine
Star-Crossed
A Different Kind of Game
Come Home
Once More Unto the Breach
Skywalkers
The Secret World Chronicle
Mercedes Lackey
Get Programming with Haskell
Will Kurt
The Decision View's Role in Software Architecture Practice
Philippe Kruchten & Rafael Capilla & Juan Carlos Duenas
IEEE Software (26.02)
Whose feminism is it anyway? The unspoken racism of the trans ...
Emi Koyama
The Sociological Review (68.04)
The Language of LGBTQ+ Minority Stress Experiences on Social ...
Koustuv Saha, Sang Chan Kim, Manikanta D. Reddy, Albert J. Carter, ... & Munmun De Choudhury
Dean Koontz's Frankenstein: City of Night
Dean Ray Koontz & Edward Gorman
Dead and Alive
Dean R. Koontz
Prodigal Son
Dean Koontz & Kevin J. Anderson
TeX: The Program
Donald Knuth
Love Lives Here
Amanda Jette Knox
A Bug Hunter's Diary
Tobias Klein
Sexual Intelligence
Marty Klein
Invasion Cycle • Book II • Planeshift
J.Robert King
Invasion Cycle (2)
Onslaught
J. Robert King
Onslaught (1)
Invasion Cycle • Book III • Apocalypse
Invasion Cycle (3)
Invasion Cycle • Book I • Invasion
Invasion Cycle (1)
Time Streams
Artifact Cycle (3)
Thread by @delaneykingrox: Okay straight dudes, lets talk about ...
Delaney King
Dead Witch Walking
Kim Harrison
The Good, the Bad, and the Undead
Oral, Rectal, and Vaginal Pharmacokinetics of Misoprostol
Khan, R.-U., El-Refaey, H., Sharma, S., Sooranna, D., & Stafford, M.
You and Your Gender Identity
Dara Hoffman-Fox; Zinnia Jones; Sam Finch; Zander Keig
UNIX Systems Programming: Communication, Concurrency and Threads, ...
Kay Robbins & Steve Robbins
Several People Are Typing
Calvin Kasulke
Sandman Slim With Bonus Content
Richard Kadrey
Design for Hackers: Reverse-Engineering Beauty
David Kadavy
Zombies vs. Unicorns
Justine Larbalestier, Holly Black
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
The Gender Games
Juno Dawson
Catch-22
Heller, Joseph
Designing BSD Rootkits
Joseph Kong
The Eye of the World
Robert Jordan
Tackling the Awkward Squad
Simon Peyton Jones
Implementation of Functional Programming Language (Prentice ...
Simon L.peyton Jones
Haskell vs. Ada vs. C++ vs. Awk vs. ... An Experiment in Software ...
Paul Hudak & Mark Jones
The toilet debate: Stalling trans possibilities and defending ...
Charlotte Jones & Jen Slater
Trans Girls Hit the Town
Emma Jayne
Tranny: Confessions of Punk Rock’s Most Infamous Anarchist Sellout
Laura Jane Grace & Dan Ozzi
Fifty Shades of Grey
E L James