Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence | 0 |
The Business Value of Developer Relations | 5 |
Superintelligence: Paths, Dangers, Strategies | 3.66 |
| 3.88 |
The Everything Store: Jeff Bezos and the Age of Amazon | 4 |
| 4.13 |
Reset: Over identiteit, gemeenschap en democratie | 0 |
Ecomodernisme: Het nieuwe denken over groen en groei - Hidde Boersma
- Bart Coenen
- Marcel Crok
- Joost Van Kasteren
- Rypke Zeilmaker
| 0 |
Atomic Habits: An Easy and Proven Way to Build Good Habits and Break Bad Ones | 4.23 |
The Religion of Technology | 2 |
| 0 |
De tragiek van de macht: Brief aan Bart De Wever | 0 |
The Age of Surveillance Capitalism | 3.78 |
Database Management Systems - Raghu Ramakrishnan
- Johannes Gehrke
| 0 |
| 0 |
| 3.95 |
The Soul of a New Machine | 4.15 |
| 4.67 |
Cryptography Engineering Cryptography Engineering: Design Principles and Practical Applications - Niels Ferguson
- Bruce Schneier
- Tadayoshi Kohno
| 0 |
Rework - Jason Fried
- David Heinemeier Hansson
| 4.06 |
| 4 |
Introduction to Modern Cryptography: Principles and Protocols - Jonathan Katz
- Yehuda Lindell
| 0 |
Programming Collective Intelligence: Building Smart Web 2.0 Applications | 2.75 |
The Timeless Way of Building - Christopher Alexander
- Professor in the Department of Architecture Christopher Alexander
| 4.2 |
Software Project Survival Guide | 3 |
| 0 |
| 4.05 |
Penetration Testing: A Hands-On Introduction to Hacking | 0 |
Why Nations Fail: The Origins of Power, Prosperity, and Poverty - Daron Acemoğlu
- James A. Robinson
| 3.67 |
| 4 |
Malware Data Science Malware Data Science: Attack Detection and Attribution - Joshua Saxe
- Hillary Sanders
| 0 |
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground | 3.63 |
| 0 |
The Ghidra Book: The Definitive Guide | 0 |
How to Hack Like a Ghost: Breaching the Cloud | 0 |
| 0 |
| 3.5 |
Black Hat Python: Python Programming for Hackers and Pentesters | 0 |
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data | 3.9 |
Primer on Client-Side Web Security - Philippe De Ryck
- Lieven Desmet
- Frank Piessens
- Martin Johns
| 0 |
Hacking The Art Of Exploitation | 3.75 |
Working Effectively with Legacy Code | 4.36 |
| 0 |
| 3 |
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers - Kevin D. Mitnick
- William L. Simon
| 3.14 |
Cyberjutsu: Cybersecurity for the Modern Ninja | 0 |
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools | 0 |
Real-World Bug Hunting: A Field Guide to Web Hacking | 0 |
Practical Malware Analysis - Michael Sikorski
- Andrew Honig
| 4 |
The Tangled Web: A Guide to Securing Modern Web Applications | 3.33 |
Black Hat Go: Go Programming For Hackers and Pentesters - Tom Steele
- Chris Patten
- Dan Kottmann
| 0 |
| 0 |
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments | 0 |
| 0 |
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things - Fotios Chantzis
- Ioannis Stais
- Paulino Calderon
- Evangelos Deirmentzoglou
- Beau Woods
| 0 |
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation | 0 |
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer | 0 |
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats - Alex Matrosov
- Eugene Rodionov
- Sergey Bratus
| 0 |
| 4.5 |
The Art of Deception - Kevin D. Mitnick
- William L. Simon
| 3.2 |
Software Engineering at Google - Titus Winters
- Tom Manshreck
- Hyrum Wright
| 4 |
| 4.25 |
Agile Principles, Patterns, and Practices in C# - Robert C. Martin
- Micah Martin
| 4.33 |
| 3 |
Plan B 4.0 Plan B 4.0: Mobilizing to Save Civilization | 0 |
| 0 |
CCCP: Cosmic Communist Constructions Photographed | 0 |
| 4 |
| 0 |
The Atlas Six - Olivie Blake
- Roberta Verde (Translator)
| 3.37 |
| 4.4 |
Moving to Mars: Design for the Red Planet | 0 |
| 4.12 |
| 3 |
| 4 |
The Innovators: How a Group of Hackers, Geniuses and Geeks Created the Digital Revolution | 3.89 |
Hard Drive - James Wallace
- Jim Erickson
| 0 |
| 4 |
Against the odds : An autobiography | 0 |
Startup: A Silicon Valley Adventure | 4 |
| 4.57 |
| 4.27 |
Siddhartha - Hermann Hesse
- Hilda Rosner (Translator)
| 3.93 |
| 3.91 |
Pride and Prejudice and Zombies - Seth Grahame-Smith
- Jane Austen
| 3.01 |
| 4.19 |
The Count of Monte Cristo | 4.27 |
| 3 |
| 4.06 |
| 3.6 |
| 4.28 |
| 3.78 |
The Girl with the Dragon Tattoo - Stieg Larsson
- Reg Keeland (Translator)
| 4.03 |
How to Avoid a Climate Disaster | 4.19 |
| 4.15 |
| 0 |
| 0 |
| 0 |
| 0 |
Being Mortal: Medicine and What Matters in the End | 4.53 |