Mad River
John Sandford
Virgil Flowers (6)
Broke, USA: From Pawnshops to Poverty, Inc.—How the Working ...
Gary Rivlin
Destroyer 025 - Sweet Dreams
Warren Murphy & Richard Sapir
The Destroyer (25)
The Mommy Group: Freaking Out, Finding Friends, and Surviving ...
Elizabeth Isadora Gold
Windows 8.1 Bible
Jim Boyce & Jeffrey R. Shapiro & Rob Tidrow
Learn Windows IIS in a Month of Lunches
Jason Helmick
Raspberry Pi Hacks: Tips and Tools for Making Things With the ...
Ruth Suehle & Tom Calloway
Introducing Python: Modern Computing in Simple Packages
Bill Lubanovic
Mastering Perl
brian d foy
Too Big to Know: Rethinking Knowledge Now That the Facts Aren't ...
David Weinberger
HTML5 and CSS3 All-In-One for Dummies
Andy Harris
It Began With Babbage: The Genesis of Computer Science
Subrata Dasgupta
Don't Make Me Think, Revisited: A Common Sense Approach to Web ...
Steve Krug
RabbitMQ Cookbook
Sigismondo Boschi & Gabriele Santomaggio
BeagleBone Home Automation
Juha Lumme
Mastering Sublime Text
Dan Peleg
Linux Kernel Networking: Implementation and Theory
Rami Rosen
Oracle NoSQL Database: Real-Time Big Data Management for the ...
Maqsood Alam & Aalok Muley & Chaitanya Kadaru & Ashok Joshi
Beginning Sensor Networks With Arduino and Raspberry Pi
Charles Bell
Practical OpenCV
Samarth Brahmbhatt
Sudo Mastery: User Access Control for Real People
Michael W. Lucas
Releasing HTML5 Games for Windows 8
Jesse Freeman
Linux Utilities Cookbook
James Kent Lewis
Joe Celko’s Complete Guide to NoSQL: What Every SQL Professional ...
Joe Celko
Practical Programming: An Introduction to Computer Science Using ...
Paul Gries
Programming Arduino Next Steps: Going Further With Sketches
Simon Monk
Tmux: Productive Mouse-Free Development
Brian P Hogan
Making Sense of NoSQL: A Guide for Managers and the Rest of ...
Ann Kelly & Dan McCreary
The Distraction Addiction: Getting the Information You Need ...
Alex Soojung-Kim Pang
Advanced Programming in the UNIX Environment
W. Richard Stevens
Ubuntu Linux Toolbox: 1000+ Commands for Power Users
Christopher Negus
NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot ...
Pramod J. Sadalage & Martin Fowler
Getting Started With NoSQL
Gaurav Vaish
The Data Warehouse Toolkit: The Definitive Guide to Dimensional ...
Ralph Kimball & Margy Ross
R for Non-Statisticians: Advanced Analytics and Graphics for ...
Jared Lander
Black Code: Inside the Battle for Cyberspace
Ronald J. Deibert
The New Digital Age
Jared Cohen & Eric Schmidt
PostgreSQL Replication
Zoltan Boszormenyi & Hans-Jürgen Schönig
HTML and CSS: Visual Quickstart Guide
Elizabeth Castro & Bruce Hyslop
Jump Start Responsive Web Design
Craig Sharkie & Andrew Fisher
Spam: A Shadow History of the Internet
Finn Brunton
Practical Raspberry Pi
Brendan Horan
The Web Designer's Idea Book, Volume 3: Inspiration From Today's ...
Patrick McNeil
Access 2013 All-In-One for Dummies
Alison Barrows & Joseph C. Stockman & Allen G. Taylor
Digital Culture Industry: A History of Digital Distribution
James Allen-Robertson
Quantum Computing Since Democritus
Scott Aaronson
Linux Malware Incident Response: A Practitioner's Guide to Forensic ...
Cameron H. Malin & Eoghan Casey, M. A. & James M Aquilina
Big Data: A Revolution That Will Transform How We Live, Work, ...
Viktor Mayer-Schönberger & Kenneth Niel Cukier
Applied Cyber Security and the Smart Grid: Implementing Security ...
Eric D. Knapp & Raj Samani
Instant Hyper-V Server Virtualization Starter
Vicente Rodriguez Eguibar
War Play: Video Games and the Future of Armed Conflict
Corey Mead
Taming Text: How to Find, Organise, and Manipulate It
Grant S Ingersoll
Cybercrime Case Presentation: An Excerpt From Placing the Suspect ...
Brett Shavers
Cybercrime Investigative Case Management: An Excerpt From Placing ...
Apache Solr 4 Cookbook
Rafał Kuć
Wireless Reconnaissance in Penetration Testing: Using Scanners ...
Matthew Neely & Alex Hamerstone & Chris Sanyk
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido & Daniel Molina & John Pirc & Nick Selby
Federated Identity Primer
Derrick Rountree
The Hacker's Guide to OS X: Exploiting OS X From the Root Up
Robert Bathurst & Russ Rogers & Alijohn Ghassemlouei
FISMA and the Risk Management Framework: The New Practice of ...
Stephen D. Gantz & Daniel R. Philpott
Data Hiding: Exposing Concealed Data in Multimedia, Operating ...
Michael T. Raggo & Chet Hosmer
Security Consulting
Charles A. Sennewald
PowerShell in Depth: An Administrator's Guide
Don Jones & Richard Siddaway & Jeffrey Hicks
The Basics of Cyber Warfare: Understanding the Fundamentals ...
Steve Winterfeld & Jason Andress