| 4.56 | 5.0 | |
I'm a Stranger Here Myself: Notes on Returning to America After Twenty Years Away | 3.7 | - | |
 The Shellcoder's Handbook The Shellcoder's Handbook: Discovering and Exploiting Security Holes - Jack Koziol
- Chris Anley
- John Heasman
| 0 | - | |
Manufacturing Consent - Edward S. Herman
- Noam Chomsky
| 3.98 | - | |
| 4.6 | - | |
How to Win Every Argument | 4 | - | |
How to Cheat at Everything: A Con Man Reveals the Secrets of the Esoteric Trade of Cheating, Scams, and Hustles | 3 | - | |
Necronomicon: The Best Weird Tales | 4.31 | - | |
Bryson's Dictionary of Troublesome Words: A Writer's Guide to Getting It Right | 3.83 | 4.0 | |
The Art of Deception - Kevin D. Mitnick
- William L. Simon
| 3.4 | - | |
Some Remarks: Essays and Other Writing | 3.81 | - | |
| 3.94 | 5.0 | |
Threat Modeling: Designing for Security | 0 | - | |
| 3.85 | - | |
The web application hacker's handbook | 5 | - | |
The Art of Memory Forensics - Michael Hale Ligh
- Andrew Case
- Jamie Levy
- AAron Walters
| 4 | - | |
| 3 | - | |
| 3.19 | - | |
A Manual for Creating Atheists | 4 | 5.0 | |
| 3.79 | - | |
| 3.83 | - | |
| 4.07 | - | |
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation - Bruce Dang
- Alexandre Gazet
- Elias Bachaalany
| 0 | - | |
| 4.13 | 5.0 | |
Penny Arcade Volume 1: Attack of the Bacon Robots! - Jerry Holkins
- Mike Krahulik
| 3.68 | - | |
What We Say Goes - David Barsamian
- Noam Chomsky
| 4 | - | |
Lamb: The Gospel According to Biff, Christ's Childhood Pal | 4.06 | - | |
| 3.97 | - | |
| 3.95 | 5.0 | |
| 3.86 | - | |
Pump Six and Other Stories | 3.78 | - | |
| 4.28 | - | |
Secrets and Lies: Digital Security in a Networked World | 4.33 | - | |
The Difference Engine - William Gibson
- Bruce Sterling
| 3.13 | 3.0 | |
| 3.91 | - | |
| 3.82 | - | |
Notes from a Small Island | 3.82 | 4.0 | |
| 3.67 | - | |
| 3.62 | - | |
Jipi and the Paranoid Chip | 0 | - | |