Time Streams
J. Robert King
Artifact Cycle (3)
Hacker Monthly #65
Netizens Media
Hacker Monthly (65)
Hacker Monthly #3
Hacker Monthly (3)
Why Procrastinators Procrastinate
Tim Urban
Procrastination (1)
The Secret World Chronicle
Mercedes Lackey
Zoo City
Lauren Beukes
Pirate Cinema
Cory Doctorow
E.W.Dijkstra Archive: The Humble Programmer (EWD 340)
Unknown
Working Effectively with Legacy Code
Michael C. Feathers
Distributed systems for fun and profit
Mikito Takada
Japanese Grammar Guide
Programming Erlang, Second Edition
Joe Armstrong
Bleeding Violet
Dia Reeves
Jumper
Steven Gould
The God Engines
John Scalzi
The Happiest Days of Our Lives
Wil Wheaton
Zombies vs. Unicorns
Justine Larbalestier, Holly Black
Uglies
Scott Westerfeld
Tithe
Holly Black
Mogworld
Yahtzee Croshaw
Beck v16[MS]
Beck v17[MS]
Beck v18[MS]
Beck v19[MS]
Beck v20[MonE]
Beck v21[MonE]
Beck v22[MonE]
Beck v23[MonE]
Beck v24[MonE]
Beck v25[MCS]
Learnable Programming
ILC2014 summary
Hacker Monthly #56
Hacker Monthly (56)
Hacker Monthly #60
Hacker Monthly (60)
Hacker Monthly #50
Hacker Monthly (50)
Hacker Monthly #49
Hacker Monthly (49)
Hacker Monthly #57
Hacker Monthly (57)
Hacker Monthly #55
Hacker Monthly (55)
Hacker Monthly #54
Hacker Monthly (54)
Hacker Monthly #53
Hacker Monthly (53)
Hacker Monthly #51
Hacker Monthly (51)
Hacker Monthly #52
Hacker Monthly (52)
Hacker Monthly #48
Hacker Monthly (48)
Hacker Monthly #47
Hacker Monthly (47)
Hacker Monthly #44
Hacker Monthly (44)
Hacker Monthly #43
Hacker Monthly (43)
Hacker Monthly #46
Hacker Monthly (46)
Hacker Monthly #45
Hacker Monthly (45)
Hacker Monthly #42
Hacker Monthly (42)
Hacker Monthly #41
Hacker Monthly (41)
Hacker Monthly #40
Hacker Monthly (40)
Hacker Monthly #38
Hacker Monthly (38)
Hacker Monthly #37
Hacker Monthly (37)
Hacker Monthly #39
Hacker Monthly (39)
Hacker Monthly #58
Hacker Monthly (58)
Hacker Monthly #59
Hacker Monthly (59)
Hacker Monthly #61
Hacker Monthly (61)
Understanding LDAP - Design and Implementation
IBM Redbooks
Quick Start Guide
John Schember
DnD5ePlayersHandbook
Designing BSD Rootkits
Joseph Kong
Elm in Action MEAP V04
Richard Feldman
Elm in Action MEAP V05
Introduction to the Theory of Computation, Second Edition
Michael Sipser