He Who Fights with Monsters 5: A LitRPG Adventure
Shirtaloon & Travis Deverell
He Who Fights With Monsters (5)
The Legend Of Koizumi 63
Unknown
TERF wars: An introduction
Ruth Pearce & Sonja Erikainen & Ben Vincent
The Sociological Review (68.04)
Programming Erlang, Second Edition
Joe Armstrong
Implementation of Functional Programming Language (Prentice ...
Simon L.peyton Jones
The Long Way to a Small, Angry Planet: A Novel
Becky Chambers
Pandora's Star (The Commonwealth Saga Book 1)
Peter F. Hamilton
Network Distributed Computing: Fitscapes and Fallacies: Fitscapes ...
Max K. Goff
Getting Started With Ledger
Rolf Schröder & others
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski & Andrew Honig
The Smart Girl’s Guide to Privacy: Practical Tips for Staying ...
Violet Blue
The Linux Command Line
William E. Shotts Jr.
A Bug Hunter's Diary
Tobias Klein
Bitcoin for the Befuddled
Conrad Barski & Chris Wilmer
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
HackingTheXbox Free
Andrew “bunnie” Huang
Python Crash Course
Eric Matthes
The Maker’s Guide to the Zombie Apocalypse
Simon Monk
Silence on the Wire
Michal Zalewski
Practical Malware Analysis
Hacker Bundle 2016 Sampler
Hacking the Xbox
Andrew "bunnie" Huang
Designing BSD Rootkits
Joseph Kong
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Automate the Boring Stuff with Python: Practical Programming ...
Al Sweigart
Elm: Concurrent FRP for Functional GUIs
Evan Czaplicki
Advanced Linux Programming
Codesourcery Llc & Mark L. Mitchell & Alex Samuel & Jeffrey Oldham
Why Functional Programming Matters
John Hughes
Haskell vs. Ada vs. C++ vs. Awk vs. ... An Experiment in Software ...
Paul Hudak & Mark Jones
Functional Geometry
Peter Henderson
Can Programming be Liberated from the von Neumann Style? A Functional ...
John Backus
Designing for Scalability With Erlang/OTP: Implement Robust, ...
Francesco Cesarini & Steve Vinoski
Designing for Scalability With Erlang/Otp: Implementing Robust, ...
Francesco Cesarini & Simon Thompson & Steve Vinoski
Little Riak Core Book 1.0 documentation
An investigation of the Therac-25 accidents - Computer
IEEE
Medical Devices: The Therac-25
Nancy Leveson
../ubunchu-01-ltr[..]
Software Architecture Patterns
Mark Richards
Write Yourself a Scheme in 48 Hours
Wikibooks contributors
The Architecture of Open Source Applications: Elegance, Evolution, ...
Amy Brown & Greg Wilson
Categories for the Working Mathematician
Saunders Mac Lane
Hacker Monthly #67
Netizens Media
Hacker Monthly (67)
Hacker Monthly #66
Hacker Monthly (66)
Hacker Monthly #65
Hacker Monthly (65)
Seven More Languages in Seven Weeks
Bruce A. Tate, Fred Daoud, Ian Dees, Jack Moffitt
Seven Concurrency Models in Seven Weeks
Paul Butcher
Prolog Programming in Depth
Michael A. Covington
An introduction to logic programming through Prolog
Michael Spivey
Logic, Programming and Prolog (2ed)
Ulf Nilsson, Jan Maluszynski
Prolog
Wikipedia
DnD5ePlayersHandbook
Monads for functional programming
Philip Wadler
Hacker Monthly #63
Hacker Monthly (63)
Hacker Monthly #64
Hacker Monthly (64)
Quick Start Guide
John Schember
Hacker Monthly #62
Hacker Monthly (62)
Understanding LDAP - Design and Implementation
IBM Redbooks
Hacker Monthly #61
Hacker Monthly (61)
Seven Languages in Seven Weeks
Bruce A. Tate
mastering-emacs
Mastering Emacs
Mickey Petersen
Assignment In Eternity
Robert A. Heinlein
A Tenderfoot in Space
Between Planets