Power Management Protocols for Mobile Ad Hoc and Sensor Networks
The Audience Is Listening: A Little Guide to Building a Big Podcast
Ruined by Design: How Designers Destroyed the World, and What We Can Do to Fix It
Hackers. 25th Anniversary Edition: Heroes of the Computer Revolution
JavaScript: The Good Parts: Working with the Shallow Grain of JavaScript
Linux Pocket Guide: Essential Commands
Workday Gold: Software Support Model Edition
HTML and CSS: Design and Build Websites
Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk
Cyberjutsu: Cybersecurity for the Modern Ninja
Dragon Age: The First Five Graphic Novels
The SNOBOL4 Programming Language
The Witcher Adult Coloring Book
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

