| 3 reads |
| 4 reads |
This Is How You Lose the Time War - Amal El-Mohtar
- Max Gladstone
| 768 reads |
How Linux Works: What Every Superuser Should Know | 3 reads |
So Good They Can't Ignore You | 102 reads |
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency | 13 reads |
The Thursday Murder Club - Richard Osman
- Petra Mrduljaš (Translator)
| 383 reads |
Dag liefje, met Mila gaat het goed en ik klungel lekker verder | 3 reads |
| 1,434 reads |
Getting Things Done: The Art of Stress-Free Productivity | 182 reads |
| 262 reads |
Hooked: How to Build Habit-Forming Products | 62 reads |
Code That Fits in Your Head: Heuristics for Software Engineering | 0 reads |
Information Dashboard Design | 3 reads |
Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation | 14 reads |
Software Architecture: the Hard Parts - Neal Ford
- Mark Richards
- Pramod Sadalage
- Zhamak Dehghani
| 5 reads |
Designing Data-Intensive Applications | 47 reads |
Learning Domain-Driven Design: Aligning Software Architecture and Business Strategy | 0 reads |
Modern Software Engineering | 3 reads |
| 120 reads |
How Google Tests Software - James A. Whittaker
- Jason Arbon
- Jeff Carollo
| 2 reads |
Secrets of a Buccaneer-Scholar | 0 reads |
The Principles of Product Development Flow | 3 reads |
A Philosophy of Software Design | 13 reads |
| 74 reads |
Site Reliability Engineering: How Google Runs Production Systems | 12 reads |
| 126 reads |
| 0 reads |
Fundamentals of Software Architecture: An Engineering Approach | 6 reads |
The Art of Strategy - Avinash K. Dixit
- Barry J. Nalebuff
| 1 read |
| 8 reads |
| 13 reads |
| 132 reads |
| 66 reads |
Hackable: How to Do Application Security Right | 0 reads |
Het nationaalsocialisme als rancuneleer - Menno ter Braak
- Bas Heijne
| 1 read |
Capitalist Realism: Is There No Alternative? | 74 reads |
| 278 reads |
The Three-Body Problem - Cixin Liu
- Ken Liu (Translator)
| 1,056 reads |
Hyperscale & Microcare - Nick Boucart
- Peter Verhasselt
| 0 reads |
Shape Up: Stop Running in Circles and Ship Work that Matters | 22 reads |
It Doesn't Have to Be Crazy at Work - Jason Fried
- David Heinemeier Hansson
| 63 reads |
Remote: Office Not Required - Jason Fried
- David Heinemeier Hansson
| 64 reads |
Waarom is het dat liefde zo is? | 0 reads |
| 0 reads |
| 0 reads |
| 205 reads |
| 2 reads |
How to Prevent the Next Pandemic | 1 read |
The Righteous Mind: Why Good People Are Divided by Politics and Religion | 71 reads |
| 97 reads |
Grief is the Thing with Feathers | 55 reads |
| 41 reads |
The Boy Who Could Change the World | 0 reads |
| 0 reads |
Abolish Silicon Valley: How to Liberate Technology from Capitalism | 7 reads |
Eat Like You Care: An Examination of the Morality of Eating Animals - Gary L. Francione
- Anna E. Charlton
| 0 reads |
The Leprechauns of Software Engineering | 3 reads |
| 1 read |
Slaughterhouse Slaughterhouse: The Shocking Story of Greed, Neglect, And Inhumane Treatment Inside the U.S. Meat Industry | 0 reads |
Some We Love, Some We Hate, Some We Eat: Why It's So Hard to Think Straight About Animals | 4 reads |
Farm Sanctuary Farm Sanctuary: Changing Hearts and Minds About Animals and Food | 1 read |
The Omnivore's Dilemma: A Natural History of Four Meals | 110 reads |
| 177 reads |
The Anthropocene Reviewed | 160 reads |
| 0 reads |
The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win - Gene Kim
- Kevin Behr
- George Spafford
| 127 reads |
| 0 reads |
| 0 reads |
The DevOps Handbook - Gene Kim
- Jez Humble
- Patrick Debois
- John Willis
| 12 reads |
Ultralearning: Accelerate Your Career, Master Hard Skills and Outsmart the Competition | 54 reads |
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race | 19 reads |
Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems - Heather Adkins
- Betsy Beyer
- Paul Blankinship
- Ana Oprea
- Piotr Lewandowski
- Adam Stubblefield
| 0 reads |
| 57 reads |
| 0 reads |
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers | 28 reads |
| 6 reads |
| 0 reads |
| 0 reads |
| 0 reads |
| 0 reads |
Advanced Penetration Testing: Hacking the World's Most Secure Networks | 0 reads |
| 0 reads |
| 7 reads |
Malware Analyst's Cookbook and DVD - Michael Ligh
- Steven Adair
- Blake Hartstein
- Matthew Richard
| 1 read |
Tribe of Hackers Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World - Marcus J. Carey
- Jennifer Jin
| 0 reads |
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity - Marcus J. Carey
- Jennifer Jin
| 0 reads |
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity - Marcus J. Carey
- Jennifer Jin
| 0 reads |
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto | 0 reads |
The Art of Attack: Attacker Mindset for Security Professionals | 0 reads |
Unauthorised Access: Physical Penetration Testing for IT Security Teams | 0 reads |
| 4 reads |
| 6 reads |
Threat Modeling: Designing for Security | 1 read |
Tribe of Hackers Security Leaders - Marcus J. Carey
- Jennifer Jin
| 0 reads |
Kali Linux Penetration Testing Bible | 0 reads |
| 0 reads |
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation - Bruce Dang
- Alexandre Gazet
- Elias Bachaalany
| 0 reads |
The Art of Memory Forensics - Michael Hale Ligh
- Andrew Case
- Jamie Levy
- AAron Walters
| 1 read |
Cybersecurity Blue Team Toolkit | 0 reads |