A Mind for Numbers: How to Excel at Math and Science | 4.09 | - | |
Monetizing Innovation: How Smart Companies Design the Product Around the Price - Madhavan Ramanujam
- Georg Tacke
| 4 | - | |
Four Thousand Weeks: Time Management for Mortals | 4.15 | - | |
Why We Sleep: Unlocking the Power of Sleep and Dreams | 4.33 | - | |
How to Take Smart Notes: One Simple Technique to Boost Writing, Learning and Thinking | 4 | - | |
| 3.7 | - | |
Cobalt Red: How the Blood of the Congo Powers Our Lives | 4.5 | - | |
| 0 | - | |
Building a Second Brain: A Proven Method to Organize Your Digital Life and Unlock Your Creative Potential | 3.76 | - | |
Automate the Boring Stuff with Python | 4.2 | - | |
| 4 | - | |
| 0 | - | |
Cyberpunk 2077: Where's Johnny | 3 | - | |
Cyberpunk 2077: No Coincidence - Rafał Kosik
- Stefan Kiełbasiewicz (Translator)
| 3.59 | - | |
OSINT Techniques: Resources for Uncovering Online Information | 0 | - | |
Target Tehran: How Israel Is Using Sabotage, Cyberwarfare, Assassination – and Secret Diplomacy – to Stop a Nuclear Iran and Create a New Middle East | 2 | - | |
The Art of Deception - Kevin D. Mitnick
- William L. Simon
| 3.45 | - | |
| 4.32 | - | |
The Threatening Storm: The Case for Invading Iraq | 2 | - | |
| 3 | - | |
Site Reliability Engineering: How Google Runs Production Systems | 4.25 | - | |
Social Engineering: The Science of Human Hacking | 4 | - | |
Armies of Sand: The Past, Present, and Future of Arab Military Effectiveness | 4 | 4.0 | |
Thriving With Social Anxiety | 3.5 | - | |
| 0 | - | |
Introduction to the Theory of Computation | 4 | - | |
| 3 | - | |
Atomic Habits: An Easy and Proven Way to Build Good Habits and Break Bad Ones | 4.21 | 4.0 | |
Code: The Hidden Language of Computer Hardware and Software | 4.26 | - | |
Everything is F*cked: A Book About Hope | 3.64 | - | |
How to Win Friends & Influence People | 3.92 | - | |
Computer networking - James F. Kurose
- Keith Ross
| 4 | - | |
Cyberpunk 2077: You Have My Word | 3.25 | - | |
| 4.29 | - | |
| 0 | - | |
Operating Systems: Three Easy Pieces - Remzi H. Arpaci-Dusseau
- Andrea C. Arpaci-Dusseau
| 5 | - | |
The Strange Library - Haruki Murakami
- Ted Goossen (Translator)
| 3.52 | - | |
Threat Modeling: Designing for Security | 5 | - | |
A Guide to Kernel Exploitation: Attacking the Core - Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dubl
- Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College
- Massimiliano Oldani
| 0 | - | |
The Design of Everyday Things | 4.05 | - | |