OCaml Programming: Correct + Efficient + Beautiful
Michael R. Clarkson
Witches Abroad
Pratchett, Terry
Discworld (12)
Faith in a World of Magic & Miracles
Paul Bagosy
Character Sheet
Unknown
Star-Crossed
LadyKarai
A Different Kind of Game
Come Home
Once More Unto the Breach
Skywalkers
The Secret World Chronicle
Mercedes Lackey
Get Programming with Haskell
Will Kurt
The Decision View's Role in Software Architecture Practice
Philippe Kruchten & Rafael Capilla & Juan Carlos Duenas
IEEE Software (26.02)
Whose feminism is it anyway? The unspoken racism of the trans ...
Emi Koyama
The Sociological Review (68.04)
The Language of LGBTQ+ Minority Stress Experiences on Social ...
Koustuv Saha, Sang Chan Kim, Manikanta D. Reddy, Albert J. Carter, ... & Munmun De Choudhury
Dean Koontz's Frankenstein: City of Night
Dean Ray Koontz & Edward Gorman
Dead and Alive
Dean R. Koontz
Prodigal Son
Dean Koontz & Kevin J. Anderson
TeX: The Program
Donald Knuth
Love Lives Here
Amanda Jette Knox
A Bug Hunter's Diary
Tobias Klein
Sexual Intelligence
Marty Klein
Invasion Cycle • Book II • Planeshift
J.Robert King
Invasion Cycle (2)
Onslaught
J. Robert King
Onslaught (1)
Invasion Cycle • Book III • Apocalypse
Invasion Cycle (3)
Invasion Cycle • Book I • Invasion
Invasion Cycle (1)
Time Streams
Artifact Cycle (3)
Thread by @delaneykingrox: Okay straight dudes, lets talk about ...
Delaney King
Dead Witch Walking
Kim Harrison
The Good, the Bad, and the Undead
Oral, Rectal, and Vaginal Pharmacokinetics of Misoprostol
Khan, R.-U., El-Refaey, H., Sharma, S., Sooranna, D., & Stafford, M.
You and Your Gender Identity
Dara Hoffman-Fox; Zinnia Jones; Sam Finch; Zander Keig
UNIX Systems Programming: Communication, Concurrency and Threads, ...
Kay Robbins & Steve Robbins
Several People Are Typing
Calvin Kasulke
Sandman Slim With Bonus Content
Richard Kadrey
Design for Hackers: Reverse-Engineering Beauty
David Kadavy
Zombies vs. Unicorns
Justine Larbalestier, Holly Black
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
The Gender Games
Juno Dawson
Catch-22
Heller, Joseph
Designing BSD Rootkits
Joseph Kong
The Eye of the World
Robert Jordan
Tackling the Awkward Squad
Simon Peyton Jones
Implementation of Functional Programming Language (Prentice ...
Simon L.peyton Jones
Haskell vs. Ada vs. C++ vs. Awk vs. ... An Experiment in Software ...
Paul Hudak & Mark Jones
The toilet debate: Stalling trans possibilities and defending ...
Charlotte Jones & Jen Slater
Trans Girls Hit the Town
Emma Jayne
Tranny: Confessions of Punk Rock’s Most Infamous Anarchist Sellout
Laura Jane Grace & Dan Ozzi
Fifty Shades of Grey
E L James
Designing Elixir Systems with OTP
James Edward Gray, II, Bruce A. Tate
Designing Elixir Systems with OTP (for Correl Roush)
A Falsification View of Success Typing
Robert Jakob & Peter Thiemann
The Hacker Who Archived Parler Explains How She Did It (and ...
Leland Nally
A Critical Analysis of the Role of Testosterone in Erectile ...
Andrea M. Isidori & Jacques Buvat & Giovanni Corona & Irwin Goldstein & Emmanule A. Jannini & Andrea Lenzi & Hartmut Porst & Andrea Salonia & Abdulmaged M. Traish & Mario Maggi
European Urology (65.01)
An investigation of the Therac-25 accidents - Computer
IEEE
Understanding LDAP - Design and Implementation
IBM Redbooks
Blood Cross
Faith Hunter
Pragmatic Programmer, The: From Journeyman to Master (Jonathan ...
Andrew Hunt & David Thomas
Why Functional Programming Matters
John Hughes
HackingTheXbox Free
Andrew “bunnie” Huang
Hacking the Xbox
Andrew "bunnie" Huang
Map of Faerûn
https://imagemagick.org
The Trump-Ukraine Impeachment Inquiry Report
House Permanent Select Committee on Intelligence
Supporting sexuality and improving sexual function in transgender ...
Mats Holmberg & Stefan Arver & Cecilia Dhejne
Sex wars and (trans) gender panics: Identity and body politics ...
Sally Hines