Music theory for computer musicians | 0 | - | |
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground | 3.84 | - | |
Scott Pilgrim Vol. 1: Scott's Precious Little Life | 4.17 | 5.0 | |
Scott Pilgrim Vol. 2: Scott Pilgrim vs. The World | 4.19 | - | |
Scott Pilgrim Vol. 4: Scott Pilgrim Gets It Together | 4.32 | - | |
Scott Pilgrim Vol. 3: Scott Pilgrim & The Infinite Sadness | 4.19 | - | |
| 4.26 | - | |
Scott Pilgrim Vol. 6: Scott Pilgrim's Finest Hour | 4.44 | - | |
Scott Pilgrim Vol. 5: Scott Pilgrim vs. the Universe | 4.28 | - | |
Lost Son An American Family Trapped Inside the FBI's Secret Wars | 0 | - | |
| 3.41 | 4.0 | |
| 4.23 | 5.0 | |
| 3.8 | - | |
| 0 | - | |
| 3 | - | |
A Mind for Numbers: How to Excel at Math and Science | 4.1 | 5.0 | |
Harry Potter and the Deathly Hallows | 4.43 | 5.0 | |
Harry Potter and the Prisoner of Azkaban | 4.43 | 5.0 | |
Harry Potter and the Order of the Phoenix | 4.29 | 4.0 | |
Harry Potter À L'école Des Sorciers Livre Audio | 4.29 | 4.0 | |
Harry Potter and the Goblet of Fire | 4.38 | 4.0 | |
Harry Potter and the Half-Blood Prince | 4.39 | 4.0 | |
Harry Potter and the Chamber of Secrets | 4.18 | 4.0 | |
| 4 | - | |
The Four Pillars of Investing - William J. Bernstein
- Donald G. Coxe
| 4.33 | - | |
Security Analysis: Principles and Technique - Benjamin Graham
- David Dodd
| 4.75 | - | |
| 3.51 | 5.0 | |
| 4 | 5.0 | |
The Kubernetes Book: Version 2.2 - January 2018 | 4 | - | |
| 3.88 | 5.0 | |
| 4.33 | 5.0 | |
| 4.4 | 5.0 | |
Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones | 4.21 | 5.0 | |
High Performance Browser Networking | 4 | - | |
The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies | 3.77 | - | |
| 4 | 5.0 | |
| 4 | 5.0 | |
| 3.75 | 5.0 | |
Mindset: The New Psychology of Success | 3.98 | - | |
Site Reliability Engineering: How Google Runs Production Systems | 4.33 | 4.0 | |