Details
Rating
Br1ckT0p
Rating
Controls
Fifty Shades Darker
Fifty Shades Darker
  • E.L. James
3.13-
Deep Down
Deep Down
  • Lee Child
3.59-
Fifty Shades of Grey
Cinquenta Tons de Cinza
  • E.L. James
2.59-
Persuader
Persuader
  • Lee Child
3.76-
Factfulness
Factfulness
  • Hans Rosling
4.34-
Mayflower: The Voyage From Hell
Mayflower: The Voyage From Hell
  • Kevin Jackson
4-
The Psychopath Test
The Psychopath Test
  • Jon Ronson
3.765.0
Think like a Programmer
Think Like a Programmer
  • V. Anton Spraul
3-
Cover 8

Dam Busters

Dam Busters: The Race to Smash the Dams, 1943
  • James Holland
05.0
Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
  • David Kennedy
  • Jim O'Gorman
  • Devon Kearns
  • Mati Aharoni
5-
Teach yourself visually Windows 7
Teach yourself visually Windows 7
  • Paul McFedries
0-
Ubuntu Hacks
Ubuntu Hacks
  • Jonathan Oxer
  • Kyle Rankin
  • Bill Childers
0-
Understanding ECMAScript 6
Understanding ECMAScript 6
  • Nicholas C. Zakas
0-
Ubuntu Linux toolbox
Ubuntu Linux toolbox
  • Christopher Negus
  • François Caen
0-
Linux Multimedia Hacks: Tips & Tools for Taming Images, Audio, and Video
Linux Multimedia Hacks: Tips & Tools for Taming Images, Audio, and Video
  • Kyle Rankin
0-
Digital SLR Photography All-In-One for Dummies
Digital SLR photography all-in-one for dummies
  • Robert Correll
0-
Linux Pocket Guide
Linux Pocket Guide
  • Daniel J. Barrett
2-
3rd Degree
3rd Degree
  • Andrew Gross
  • James Patterson
3.9-
The Book of R
The Book of R
  • Tilman M. Davies
0-
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Hacking ExposedTM Web 2.0
  • Rich Cannings
0-
Reversing Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
  • Eldad Eilam
4-
Practical Malware Analysis
Practical Malware Analysis
  • Michael Sikorski
  • Andrew Honig
4.5-
Cover 6

The Art of Assembly Language

The Art of Assembly Language
  • Randall Hyde
2-
The Tangled Web: A Guide to Securing Modern Web Applications
The Tangled Web: A Guide to Securing Modern Web Applications
  • Michal Zalewski
3.33-
1st to Die
1st to Die
  • James Patterson
3.68-
CompTIA Linux+ Complete Study Guide
CompTIA Linux+ Complete Study Guide
  • Roderick W. Smith
0-
2nd Chance
2nd Chance
  • James Patterson
  • Andrew Gross
3.83-
The Linux Command Line
The Linux Command Line
  • William E. Shotts, Jr.
5-
Practical Vim: Edit Text at the Speed of Thought
Practical Vim: Edit Text at the Speed of Thought
  • Drew Neil
4.38-
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
  • Kevin D. Mitnick
  • William L. Simon
3.31-
Penetration Testing: A Hands-On Introduction to Hacking
Penetration Testing: A Hands-On Introduction to Hacking
  • Georgia Weidman
3-
Snort for dummies
Snort for dummies
  • Charlie Scott
0-
Getting Started with Raspberry Pi
Getting Started with Raspberry Pi
  • Matt Richardson
  • Shawn Wallace
3.5-
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
  • Johnny Long
0-
Cover 7

Calibre Quick Start Guide

Calibre Quick Start Guide
  • John Schember
0-
Wicked Cool Shell Scripts
Wicked Cool Shell Scripts
  • Dave Taylor
0-
The Warrior Diet
The Warrior Diet
  • Ori Hofmekler
2-
The Handmaid's Tale
The Handmaid's Tale
  • Margaret Atwood
4.09-
Ghost in the Wires
Ghost in the Wires
  • Kevin D. Mitnick
3.98-
Colditz
Colditz
  • P R Reid
05.0