signal to noise
neil gaiman dave mckean-high definition-1349762327
How to Take Smart Notes: One Simple Technique to Boost Writing, ...
Sönke Ahrens
Write Yourself a Scheme in 48 Hours
Wikibooks contributors
Afterword: TERF wars in the time of COVID-19
Ruth Pearce & Sonja Erikainen & Ben Vincent
The Sociological Review (68.04)
An introduction to logic programming through Prolog
Michael Spivey
Prolog Programming in Depth
Michael A. Covington
Seven More Languages in Seven Weeks
Bruce A. Tate, Fred Daoud, Ian Dees, Jack Moffitt
Seven Concurrency Models in Seven Weeks
Paul Butcher
Hacker Monthly #65
Netizens Media
Hacker Monthly (65)
Hacker Monthly #66
Hacker Monthly (66)
Hacker Monthly #67
Hacker Monthly (67)
Categories for the Working Mathematician
Saunders Mac Lane
The Architecture of Open Source Applications: Elegance, Evolution, ...
Amy Brown & Greg Wilson
Software Architecture Patterns
Mark Richards
../ubunchu-01-ltr[..]
Unknown
Medical Devices: The Therac-25
Nancy Leveson
An investigation of the Therac-25 accidents - Computer
IEEE
Little Riak Core Book 1.0 documentation
Designing for Scalability With Erlang/Otp: Implementing Robust, ...
Francesco Cesarini & Simon Thompson & Steve Vinoski
Designing for Scalability With Erlang/OTP: Implement Robust, ...
Francesco Cesarini & Steve Vinoski
Can Programming be Liberated from the von Neumann Style? A Functional ...
John Backus
Functional Geometry
Peter Henderson
Haskell vs. Ada vs. C++ vs. Awk vs. ... An Experiment in Software ...
Paul Hudak & Mark Jones
Why Functional Programming Matters
John Hughes
Advanced Linux Programming
Codesourcery Llc & Mark L. Mitchell & Alex Samuel & Jeffrey Oldham
Elm: Concurrent FRP for Functional GUIs
Evan Czaplicki
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Designing BSD Rootkits
Joseph Kong
Hacker Bundle 2016 Sampler
Hacking the Xbox
Andrew "bunnie" Huang
Practical Malware Analysis
Michael Sikorski & Andrew Honig
Silence on the Wire
Michal Zalewski
The Maker’s Guide to the Zombie Apocalypse
Simon Monk
A Bug Hunter's Diary
Tobias Klein
Bitcoin for the Befuddled
Conrad Barski & Chris Wilmer
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
HackingTheXbox Free
Andrew “bunnie” Huang
Python Crash Course
Eric Matthes
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
The Smart Girl’s Guide to Privacy: Practical Tips for Staying ...
Violet Blue
The Linux Command Line
William E. Shotts Jr.
Getting Started With Ledger
Rolf Schröder & others
Network Distributed Computing: Fitscapes and Fallacies: Fitscapes ...
Max K. Goff
Pandora's Star (The Commonwealth Saga Book 1)
Peter F. Hamilton
The Long Way to a Small, Angry Planet: A Novel
Becky Chambers
Implementation of Functional Programming Language (Prentice ...
Simon L.peyton Jones
Kafka: The Definitive Guide: Real-Time Data and Stream Processing ...
Neha Narkhede
Professor Frisby's Mostly Adequate Guide to Functional Programming
drboolean
Elm in Action MEAP V01
Richard Feldman
Elm in Action MEAP V02
Elm in Action MEAP V03
80/20 Japanese (Kana + Kanji Edition)
Richard Webb
80/20 Japanese (3)
80/20 Japanese (Romaji Edition)
80/20 Japanese (2)
80-20 Japanese Kanji Reference Guide
80/20 Japanese (1)
The Legend Of Koizumi 01
The Legend Of Koizumi 96
The Legend Of Koizumi 95
The Legend Of Koizumi 94
The Legend Of Koizumi 93
The Legend Of Koizumi 92
The Legend Of Koizumi 91
The Legend Of Koizumi 90