Guards! Guards!
Pratchett, Terry
Discworld (8)
Medical Devices: The Therac-25
Nancy Leveson
A Closed and Common Orbit
Becky Chambers
Immutability Changes Everything
Pat Helland
Working Effectively with Legacy Code
Michael C. Feathers
Distributed systems for fun and profit
Mikito Takada
Japanese Grammar Guide
Unknown
The Myth of Multitasking
Christine Rosen
Functional Programming with Bananas, Lenses, Envelopes and Barbed ...
Erik Meijer, Maarten Fokkinga, Ross Paterson
Programming Erlang, Second Edition
Joe Armstrong
Cover
R. Martin (Pearson, 2012) [eCV] WW
Bleeding Violet
Dia Reeves
Jumper
Steven Gould
The God Engines
John Scalzi
The Happiest Days of Our Lives
Wil Wheaton
Zombies vs. Unicorns
Justine Larbalestier, Holly Black
Uglies
Scott Westerfeld
Tithe
Holly Black
Mogworld
Yahtzee Croshaw
Beck v16[MS]
Beck v17[MS]
Beck v18[MS]
Beck v19[MS]
Beck v20[MonE]
Beck v21[MonE]
Beck v22[MonE]
Beck v23[MonE]
Beck v24[MonE]
Beck v25[MCS]
Learnable Programming
ILC2014 summary
Stuff Goes Bad: Erlang in Anger
Frank Hebert
Category Theory for Computing Science
Michael Barr, Charles Wells
Just In Tokyo 2002
Justin Hall
Hacker Monthly #56
Netizens Media
Hacker Monthly (56)
LaTeXRefCard.v2.0
The Not So Short Introduction to LaTeX
TeX: The Program
Donald Knuth
Hacker Monthly #60
Hacker Monthly (60)
Hacker Monthly #50
Hacker Monthly (50)
Hacker Monthly #49
Hacker Monthly (49)
Hacker Monthly #57
Hacker Monthly (57)
Hacker Monthly #55
Hacker Monthly (55)
Hacker Monthly #54
Hacker Monthly (54)
Hacker Monthly #53
Hacker Monthly (53)
Hacker Monthly #51
Hacker Monthly (51)
Hacker Monthly #52
Hacker Monthly (52)
Hacker Monthly #48
Hacker Monthly (48)
Hacker Monthly #47
Hacker Monthly (47)
Hacker Monthly #44
Hacker Monthly (44)
Hacker Monthly #43
Hacker Monthly (43)
Hacker Monthly #46
Hacker Monthly (46)
Hacker Monthly #45
Hacker Monthly (45)
Hacker Monthly #42
Hacker Monthly (42)
Hacker Monthly #41
Hacker Monthly (41)
Hacker Monthly #40
Hacker Monthly (40)
Hacker Monthly #38
Hacker Monthly (38)
Hacker Monthly #37
Hacker Monthly (37)
Hacker Monthly #39
Hacker Monthly (39)
Hacker Monthly #58
Hacker Monthly (58)
Hacker Monthly #59
Hacker Monthly (59)
mastering-emacs
Hacker Monthly #61
Hacker Monthly (61)
Understanding LDAP - Design and Implementation
IBM Redbooks