| 3.83 | 4.0 | |
| 3.53 | 1.0 | |
What Is the Name of This Book? | 0 | - | |
Press Start to Play - John Joseph Adams
- Daniel H. Wilson
| 3.67 | 2.0 | |
| 4.01 | - | |
| 4.27 | - | |
Factfulness: Ten Reasons We're Wrong About the World – and Why Things Are Better Than You Think | 4.34 | - | |
Brief Answers to the Big Questions | 4.24 | - | |
21 Lessons for the 21st Century | 4.06 | - | |
How to Invent Everything: A Survival Guide for the Stranded Time Traveler | 4.13 | - | |
| 3.67 | 4.0 | |
A Software Engineer Learns HTML5, JavaScript and jQuery: A guide to standards-based web applications | 0 | - | |
 Computer Networks Computer Networks: A Systems Approach, Fourth Edition - Larry L. Peterson
- Bruce S. Davie
| 0 | - | |
| 4.03 | - | |
| 0 | - | |
| 3.8 | - | |
| 4.06 | - | |
Animal Farm - George Orwell
- Boris Grabnar (Translator)
- Celâl Üster (Translator)
- Celâl Üstüner (Translator)
| 4.04 | - | |
Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture | 4.2 | - | |
| 4.54 | - | |
Freakonomics: A Rogue Economist Explores the Hidden Side of Everything - Steven D. Levitt
- Stephen J. Dubner
| 3.81 | - | |
iWoz: Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It | 3.86 | - | |
I Have No Mouth and I Must Scream | 3.66 | - | |
In the Beginning...Was the Command Line | 3.73 | - | |
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage | 4.19 | 4.0 | |
The Metamorphosis - Franz Kafka
- David Wyllie (Translator)
| 3.83 | 5.0 | |
| 4.28 | 4.0 | |
| 4 | - | |
| 4.24 | - | |
Hackers: Heroes of the Computer Revolution | 4.09 | - | |
The Curious Incident of the Dog in the Night-Time | 3.82 | 3.0 | |
The Hacker Crackdown: Law and Disorder on the Electronic Frontier | 3.59 | - | |
| 3 | - | |
| 3.91 | 2.0 | |
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground | 3.92 | - | |
| 3.93 | - | |
| 3.96 | - | |
| 3.97 | - | |
The Cathedral & the Bazaar | 4.14 | - | |
| 3.84 | - | |