| 3.5 | 2.0 | |
| 4.18 | 3.0 | |
| 4.08 | 4.0 | |
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage | 4.19 | 3.0 | |
Herbie Hancock: Possibilities - Herbie Hancock
- Lisa Dickey
| 4 | 4.0 | |
Team of teams - Stanley McChrystal
- David Silverman
| 4.4 | 5.0 | |
Lean Enterprise: How High Performance Organizations Innovate at Scale - Jez Humble
- Joanne Molesky
- Barry O'Reilly
| 3.67 | 3.0 | |
The Checklist Manifesto: How to Get Things Right | 3.87 | 4.0 | |
| 3.96 | 5.0 | |
How to Win Friends and Influence People | 3.92 | 4.0 | |
Practical Object Oriented Design in Ruby | 4.66 | 4.0 | |
Continuous Delivery: Reliable Software Releases Through Build, Test, and Deployment Automation | 4.29 | 3.0 | |
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers | 4.17 | 4.0 | |
| 4 | 4.0 | |
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win - Gene Kim
- Kevin Behr
- George Spafford
| 4.16 | 5.0 | |
| 3.85 | 4.0 | |
| 3.47 | 3.0 | |
The Art of Memory Forensics - Michael Hale Ligh
- Andrew Case
- Jamie Levy
- AAron Walters
| 4 | 4.0 | |
| 3.91 | 2.0 | |
| 4.19 | 4.0 | |
Applied Network Security Monitoring: Collection, Detection, and Analysis | 5 | 5.0 | |
| 3.65 | 3.0 | |
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security | 4 | 4.0 | |
| 3 | 3.0 | |
First, Break All The Rules - Marcus Buckingham
- Curt Coffman
| 3.71 | 2.0 | |
The Book of Atrus - Rand Miller
- Robyn Miller
- David Wingrove
| 3.63 | 3.0 | |
| 4.1 | 3.0 | |
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency | 3.89 | 4.0 | |
| 2.5 | 3.0 | |
A Walk in the Woods: Rediscovering America on the Appalachian Trail | 4 | 4.0 | |
A Short History of Nearly Everything | 4.23 | 4.0 | |
ChiRunning - Danny Dreyer
- Katherine Dreyer
| 3.63 | 2.0 | |
Wherever You Go, There You Are: Mindfulness Meditation in Everyday Life | 3.95 | 3.0 | |
Google Hacking for Penetration Testers | 4 | 4.0 | |
| 3.98 | 3.0 | |
The Hitchhiker's Guide to the Galaxy | 4.24 | 5.0 | |
Nmap Network Scanning Official Nmap Project Guide To Network Discovery And Security Scanning | 5 | 5.0 | |
Malware Analyst's Cookbook and DVD - Michael Ligh
- Steven Adair
- Blake Hartstein
- Matthew Richard
| 5 | 5.0 | |
| 4 | 4.0 | |
| 3.15 | 2.0 | |