| 4.55 | 5.0 | |
I'm a Stranger Here Myself: Notes on Returning to America After Twenty Years Away | 3.73 | - | |
| 4 | - | |
 The Shellcoder's Handbook The Shellcoder's Handbook: Discovering and Exploiting Security Holes - Jack Koziol
- Chris Anley
- John Heasman
| 0 | - | |
Manufacturing Consent - Edward S. Herman
- Noam Chomsky
| 4.02 | - | |
| 4.6 | - | |
How to Win Every Argument | 4 | - | |
How to Cheat at Everything: A Con Man Reveals the Secrets of the Esoteric Trade of Cheating, Scams, and Hustles | 3 | - | |
Necronomicon: The Best Weird Tales | 4.24 | - | |
Bryson's Dictionary of Troublesome Words: A Writer's Guide to Getting It Right | 3.86 | 4.0 | |
The Art of Deception - Kevin D. Mitnick
- William L. Simon
| 3.45 | - | |
Some Remarks: Essays and Other Writing | 3.81 | - | |
| 3.92 | 5.0 | |
Threat Modeling: Designing for Security | 5 | - | |
| 3.83 | - | |
The web application hacker's handbook | 5 | - | |
The Art of Memory Forensics - Michael Hale Ligh
- Andrew Case
- Jamie Levy
- AAron Walters
| 4 | - | |
| 3 | - | |
| 3.15 | - | |
A Manual for Creating Atheists | 3.92 | 5.0 | |
| 3.82 | - | |
| 3.84 | - | |
| 4.09 | - | |
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation - Bruce Dang
- Alexandre Gazet
- Elias Bachaalany
| 0 | - | |
Penny Arcade Volume 1: Attack of the Bacon Robots! - Jerry Holkins
- Mike Krahulik
| 3.7 | - | |
What We Say Goes - David Barsamian
- Noam Chomsky
| 4 | - | |
Lamb: The Gospel According to Biff, Christ's Childhood Pal | 4.07 | - | |
| 3.97 | - | |
| 3.97 | 5.0 | |
| 3.87 | - | |
Pump Six and Other Stories | 3.85 | - | |
| 4.3 | - | |
Secrets and Lies: Digital Security in a Networked World | 4.6 | - | |
The Difference Engine - William Gibson
- Bruce Sterling
| 3.18 | 3.0 | |
| 3.9 | - | |
| 3.82 | - | |
Notes from a Small Island | 3.84 | 4.0 | |
| 3.75 | - | |
| 3.63 | - | |
Jipi and the Paranoid Chip | 0 | - | |