Endocrine Treatment of Gender-Dysphoric/[..] Persons: An Endocrine ...
Wylie C Hembree, Peggy T Cohen-Kettenis, Louis Gooren, Sabine ...
The Final Empire
Brandon Sanderson
Mistborn (1)
Chokepoint Capitalism: How to Beat Big Tech, Tame Big Content, ...
Cory Doctorow & Rebecca Giblin
Working Effectively with Legacy Code
Michael C. Feathers
Hacker Monthly #38
Netizens Media
Hacker Monthly (38)
Hacker Monthly #40
Hacker Monthly (40)
Hacker Monthly #41
Hacker Monthly (41)
Hacker Monthly #42
Hacker Monthly (42)
Hacker Monthly #45
Hacker Monthly (45)
Hacker Monthly #46
Hacker Monthly (46)
Hacker Monthly #43
Hacker Monthly (43)
Hacker Monthly #44
Hacker Monthly (44)
Hacker Monthly Special Issue: Startup Stories
Hacker Monthly (0.0)
Hacker Monthly #47
Hacker Monthly (47)
Hacker Monthly Startup Marketing
Hacker Monthly #48
Hacker Monthly (48)
Hacker Monthly #52
Hacker Monthly (52)
Hacker Monthly #51
Hacker Monthly (51)
Hacker Monthly #53
Hacker Monthly (53)
Hacker Monthly #54
Hacker Monthly (54)
Hacker Monthly #55
Hacker Monthly (55)
Hacker Monthly #57
Hacker Monthly (57)
Hacker Monthly #49
Hacker Monthly (49)
Hacker Monthly #50
Hacker Monthly (50)
Hacker Monthly #60
Hacker Monthly (60)
Hacker Monthly #56
Hacker Monthly (56)
WotC88544 Chainer's Torment (MtG novel. Odyssey cycle book II)
Scott McGough
Odyssey (2)
Judgement
Will McDermott
Odyssey (3)
Python Crash Course
Eric Matthes
Complete Guide to Shodan
John Matherly
Hacking your way around in Emacs
Marcin Borkowski
LFE Reference Guide
LFE Maintainers
Guidelines for the Primary and Gender-Affirming Care of Transgender ...
Madeline B. Deutsch, MD, MPH
Erlang and OTP in Action
Martin Logan & Eric Merritt & Richard Carlsson
Programming Erlang
The Pragmatic Programmers, LLC (#nx000x)
Advanced Linux Programming
Codesourcery Llc & Mark L. Mitchell & Alex Samuel & Jeffrey Oldham
STH 4 ID
Kelly Link
MFB-Book reg ed 3
The Therac-25: 30 Years Later
Nancy Leveson
Medical Devices: The Therac-25
Mathematics for Computer Science
Eric Lehman & F. Thomson Leighton & Albert R. Meyer
Masquerade Cycle • Book I • Mercadian Masques
Fancis Lebaron
Masquerade Cycle (1)
Categories for the Working Mathematician
Saunders Mac Lane
Password Authentication with Insecure Communication
Leslie Lamport
Retelling racialized violence, remaking white innocence: The ...
Sarah Lamble
Seven Years
Hannako Lambert
My Name Is ...
LadyKarai
Ghost Stories (2)
Haunted
Ghost Stories (1)
The Secret World Chronicle
Mercedes Lackey
Get Programming with Haskell
Will Kurt
The Decision View's Role in Software Architecture Practice
Philippe Kruchten & Rafael Capilla & Juan Carlos Duenas
IEEE Software (26.02)
Whose feminism is it anyway? The unspoken racism of the trans ...
Emi Koyama
The Sociological Review (68.04)
The Language of LGBTQ+ Minority Stress Experiences on Social ...
Koustuv Saha, Sang Chan Kim, Manikanta D. Reddy, Albert J. Carter, ... & Munmun De Choudhury
Dean Koontz's Frankenstein: City of Night
Dean Ray Koontz & Edward Gorman
Prodigal Son
Dean Koontz & Kevin J. Anderson
TeX: The Program
Donald Knuth
A Bug Hunter's Diary
Tobias Klein
Invasion Cycle • Book II • Planeshift
J.Robert King
Invasion Cycle (2)
Invasion Cycle • Book I • Invasion
J. Robert King
Invasion Cycle (1)
Invasion Cycle • Book III • Apocalypse
Invasion Cycle (3)
Oral, Rectal, and Vaginal Pharmacokinetics of Misoprostol
Khan, R.-U., El-Refaey, H., Sharma, S., Sooranna, D., & Stafford, M.
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz
Designing BSD Rootkits
Joseph Kong
Tackling the Awkward Squad
Simon Peyton Jones