Password Authentication with Insecure Communication
Leslie Lamport
After the Ivory Tower Falls
Will Bunch
Men at Arms
Pratchett, Terry
Discworld (15)
Hacker Monthly #41
Netizens Media
Hacker Monthly (41)
Domain-Driven Design: Tackling Complexity in the Heart of Software
Eric Evans
Higher-Order Perl: A Guide to Program Transformation
Mark Jason Dominus
Foundations of Programming
Karl Seguin