| 0 | - | |
| 3.68 | - | |
| 4 | - | |
RT Essentials: Managing Your Team and Projects with Request Tracker - Jesse Vincent
- Robert Spier
- Dave Rolsky
- Darren Chamberlain
- Richard Foley
| 0 | - | |
| 3 | - | |
UNIX Power Tools - Jerry Peek
- Shelley Powers
- Tim O'Reilly
- Mike Loukides
| 4.33 | - | |
White-Hat Security Arsenal: Tackling the Threats | 0 | - | |
| 0 | - | |
UNIX(R) System Security: A Guide for Users and System Administrators | 0 | - | |
Workbook,Neue Welle Deutschland | 0 | - | |
The Pursuit of the Phoenix | 0 | - | |
Other Worlds of Isaac Asimov | 0 | - | |
| 3.13 | - | |
Programming in Ada: Plus an Overview of Ada 9X | 0 | - | |
MH & xmh: E-mail for Users & Programmers | 0 | - | |
101 Money-Saving Household Repairs | 0 | - | |
Modern Control Engineering | 4 | - | |
Essential System Administration | 3 | - | |
Security Threat Mitigation And Response: Understanding Cisco Security Mars | 0 | - | |
Mind Fields - Harlan Ellison
- Jacek Yerka
| 0 | - | |
Earthfall - Orson Scott Card
- Stefan Rudnicki
| 3.5 | - | |
All Families Are Psychotic | 3.6 | - | |
Managing A Network Vulnerability Assessment - Thomas R. Peltier
- Justin Peltier
- John A. Blackley
| 0 | - | |
| 0 | - | |
Robert Louis Stevenson: Treasure Island/ Kidnapped/ Wier of Hermiston/ The Black Arrow/ The Strange Case of Dr. Jekyll and Mr. Hyde | 0 | - | |
How to Build Small Barns & Outbuildings | 0 | - | |
| 4 | - | |
| 3.22 | - | |
| 3.44 | - | |
Computer Crime: A Crimefighter's Handbook - David Icove
- Karl Seger
- William VonStorch
| 0 | - | |
Householder's Survival Manual | 0 | - | |
| 3 | - | |
| 3.57 | - | |
It's Obvious You Won't Survive by Your Wits Alone | 4 | - | |
| 0 | - | |
| 0 | - | |
| 3.36 | - | |
| 0 | - | |
| 3.43 | - | |
Founding Brothers: The Revolutionary Generation | 3.83 | - | |