4.44 | - | |
4.57 | - | |
Poking Holes Poking Holes
| 0 | - |
3.75 | 4 | |
4.12 | 3 | |
4.23 | 2 | |
4.2 | - | |
4.25 | - | |
4.06 | - | |
4.15 | - | |
The Phoenix Principles The Phoenix Principles: Leveraging Inclusion to Transform Your Company
| 0 | - |
4 | 3 | |
4.03 | 4 | |
3.44 | 3 | |
4 | 3 | |
4 | 4 | |
4.15 | - | |
3.81 | 4 | |
4 | - | |
4.08 | - | |
3.96 | 2 | |
3.95 | - | |
3.56 | - | |
3.93 | - | |
3.97 | - | |
3.58 | - | |
3.69 | - | |
3.23 | - | |
3.67 | - | |
3.8 | - | |
2 | - | |
3.59 | - | |
3.36 | - | |
3 | - | |
3.97 | - | |
4.14 | - | |
3.65 | - | |
Thor Thor
| 4.5 | - |
4 | - | |
4.31 | - | |
3.67 | - | |
4.05 | - | |
Flesh Rehearsal Flesh Rehearsal
| 0 | - |
2.83 | - | |
3.82 | - | |
3.95 | 4 | |
4 | - | |
4.35 | - | |
4.46 | - | |
4.23 | - | |
Camp Slaughter Camp Slaughter
| 3.56 | - |
4.29 | 3 | |
3.71 | - | |
3.68 | - | |
3.67 | - | |
3.78 | - | |
4.17 | - | |
4.43 | - | |
3.86 | - | |
4 | 3 | |
3.64 | 2 | |
3.81 | 3 | |
3.8 | 4 | |
3.75 | 3 | |
4 | 4 | |
4.36 | 5 | |
4.38 | - | |
3.95 | 3 | |
4.44 | 3 | |
4.38 | 4 | |
4.1 | - | |
4 | - | |
4.33 | - | |
3.59 | 3 | |
4.3 | 5 | |
3.86 | 4 | |
3.75 | 3 | |
4.05 | 4 | |
3.87 | 3 | |
4.02 | - | |
3.75 | 4 | |
4.58 | - | |
4.32 | - | |
3.25 | 4 | |
3.5 | - | |
4.04 | - | |
4.13 | - | |
3.67 | 4 | |
Ansible for DevOps Ansible for DevOps: Server and configuration management for humans
| 0 | - |
3.86 | 3 | |
4.11 | 3 | |
4.31 | 5 | |
4.14 | 4 | |
Logic Beach Logic Beach: Part I
| 3.75 | 4 |
The Great Gatsby The Great Gatsby: The Original 1925 Edition
| 4 | - |
2.88 | 3 | |
4.09 | - | |
0 | - | |
The Science of Can and Can't The Science of Can and Can't: A Physicist's Journey Through the Land of Counterfactuals
| 3 | 3 |
Alice and Bob Learn Application Security Alice and Bob Learn Application Security
| 0 | - |