Year Of The Jackpot
Robert A. Heinlein
Programming Erlang (Megan Kologinsky)
Armstrong
Higher-Order Perl: A Guide to Program Transformation
Mark Jason Dominus
The ontological woman: A history of deauthentication, dehumanization, ...
Cristan Williams
The Sociological Review (68.04)
Hacker Monthly February 2011
Netizens Media
Hacker Monthly (9)
Hacker Monthly April 2011
Hacker Monthly (11)
Hacker Monthly March 2011
Hacker Monthly (10)
Hacker Monthly #14
Hacker Monthly (14)
Hacker Monthly May 2011
Hacker Monthly (12)
Hacker Monthly #13
Hacker Monthly (13)
Hacker Monthly #15
Hacker Monthly (15)
Hacker Monthly #16
Hacker Monthly (16)
Hacker Monthly #19
Hacker Monthly (19)
Hacker Monthly #17
Hacker Monthly (17)
Hacker Monthly #18
Hacker Monthly (18)
Hacker Monthly #21
Hacker Monthly (21)
Hacker Monthly #20
Hacker Monthly (20)
Hacker Monthly #22
Hacker Monthly (22)
Hacker Monthly #23
Hacker Monthly (23)
Hacker Monthly #25
Hacker Monthly (25)
Hacker Monthly #24
Hacker Monthly (24)
Hacker Monthly #27
Hacker Monthly (27)
Hacker Monthly #26
Hacker Monthly (26)
Hacker Monthly #29
Hacker Monthly (29)
Hacker Monthly #31
Hacker Monthly (31)
Hacker Monthly #36
Hacker Monthly (36)
Hacker Monthly #28
Hacker Monthly (28)
Hacker Monthly #30
Hacker Monthly (30)
Hacker Monthly #32
Hacker Monthly (32)
Hacker Monthly #33
Hacker Monthly (33)
Hacker Monthly #39
Hacker Monthly (39)
Hacker Monthly #37
Hacker Monthly (37)
Hacker Monthly #35
Hacker Monthly (35)
Hacker Monthly #34
Hacker Monthly (34)
Hacker Monthly #38
Hacker Monthly (38)
Hacker Monthly #40
Hacker Monthly (40)
Hacker Monthly #41
Hacker Monthly (41)
Hacker Monthly #42
Hacker Monthly (42)
Hacker Monthly #45
Hacker Monthly (45)
Hacker Monthly #46
Hacker Monthly (46)
Hacker Monthly #43
Hacker Monthly (43)
Hacker Monthly #44
Hacker Monthly (44)
Hacker Monthly Special Issue: Startup Stories
Hacker Monthly (0.0)
Hacker Monthly #47
Hacker Monthly (47)
Hacker Monthly Startup Marketing
Hacker Monthly #48
Hacker Monthly (48)
Hacker Monthly #52
Hacker Monthly (52)
Hacker Monthly #51
Hacker Monthly (51)
Hacker Monthly #53
Hacker Monthly (53)
Hacker Monthly #54
Hacker Monthly (54)
Hacker Monthly #55
Hacker Monthly (55)
Hacker Monthly #57
Hacker Monthly (57)
Hacker Monthly #49
Hacker Monthly (49)
Hacker Monthly #50
Hacker Monthly (50)
LFE Reference Guide
LFE Maintainers
Hacker Monthly #56
Hacker Monthly (56)
A No-Excuses Guide to Blogging
Sacha Chua
Structure and Interpretation of Computer Programs, Second Edition
Harold Abelson, Gerald Jay Sussman, Julie Sussman
ILC2014 summary
Unknown
Learnable Programming
Beck v24[MonE]
Beck v25[MCS]
Beck v21[MonE]
Beck v22[MonE]