untitled
Unknown
Frankenstein; Or, The Modern Prometheus
Mary Wollstonecraft Shelley
Money-making men; or, how to grow rich
J. Ewing Ritchie
Lovina's Amish Cooking
Lovina Hershberger Zook
Python
How to Program, 1e (2002)
Java Performance
Charlie Hunt & Binu John
Working with Linux – Quick Hacks for the Command Line
Petru I?fan & Bogdan Vaida
Deep Learning (2017, MIT)
Ian Goodfellow, Yoshua Bengio, Aaron Courville
Microservices Best Practices for Java
IBM
Mesos in Action
Roger Ignazio
Assembly Language for x86 Processors (Sixth edition)
Kip R. Irvine
Let's Build a Compiler
Jack W. Crinshaw, P.h.D.
The CSS Detective Guide: Tricks for solving tough CSS mysteries
Denise R. Jacobs
Hibernate Tips: More than 70 solutions to common Hibernate problems
Thorben Janssen
Practical Programming
Jennifer Campbell, Paul Gries, Jason Montojo, Greg Wilson
Bug Bounty Playbook
joe
A Concise Introduction to Data Structures Using Java
Mark Johnson
Learn PowerShell 3 in a Month of Lunches
Jeffery Hicks Don Jones
Medievil Hackers
Eileen Joy
Java EE 8 Recipes, 2nd Edition
Josh Juneau
Plant Tissue Culture Manual - Supplement 6
K. LINDSEY Department of Biological Sciences, University of ...
Advanced Topics in Java
Noel Kalicharan
Head First Java, 2nd Edition
Kathy Sierra , Bert Bates
Pro JPA 2 in Java EE 8, 3rd Edition
Mike Keith
The C Programming Guide
Brian W. Kernighan
The Linux Programming Interface: A Linux and UNIX System Programming ...
Michael Kerrisk
The Hacker Playbook 3: Practical Guide To Penetration Testing
Peter Kim
The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook 2: Practical Guide To Penetration Testing
Beginning Python Games Development, Second Edition: With PyGame
Harrison Kinsley & Will McGugan
Kiteworks Best Practices How To Secure Web Forms
Kiteworks
Plants From Test Tubes - An introduction to Microprapagation
Lydiane and John Klenyn
Modern Java Recipes
Ken Kousen
Linux Programming Unleashed
Kurt Wall, Mark Watson & Mark Whitis
Hacking Exposed - Windows Security Secrets & Solutions
JOEL SCAMBRAY STUART MCCLURE GEORGE KURTZ
HACKING EXPOSED: NETWORK SECURITY SECRETS & SOLUTIONS SECOND ...
AntiPatterns : Identification, Refactoring, and Management
Phillip A. Laplante & Colin J. Neill
A Java Library of Graph Algorithms and Optimization
Hang T. Lau
Deep Learning in Python: Master Data Science and Machine Learning ...
LazyProgrammer
To Kill A Mockingbird
Harper Lee
Java 7 Pocket Guide
Robert Liguori and Patricia Liguori
Information Security Principles and Practice. Oct.2005
TEAM LinG
Java 1.5 Tiger
lofrumen
Electronics All-In-One Desk Reference For Dummies
Lowe, Doug
PHP Reference: Beginner to Intermediate PHP5
Mario Lurig
Learning Python
Mark Lutz
Python Pocket Reference
Learning Python 5E
Git Magic
Ben Lynn
57. The Hacker's Underground Handbook
David M
Plant Tissue Culture Theory And Practice, A Revised Edition
S.s.bhojwani M.k.razdan
Hands-On Electronics: A One-Semester Course for Class Instruction ...
Daniel M.Kaplan & Christopher G.White
Learn Microservices with Spring Boot
Mosies Macero
All New Electroincs Self-Teaching Guide - Third Edition
Malestrom
Java Programming Interviews Exposed
Noel Markham
REST API Design Rulebook
Mark Massé
Getting Started with Pyparsing
Paul McGuire
O'Reilly - Head First Object-Oriented Analysis & Design
Brett McLaughlin & Gary Pollice & David West
Plant Botany
Milena Martinkov, Martin Cermk, Roman Gebauer, Zuzana pinlerov
Make It You--Your Space Sew With Style, Easy Step-by-Step Instructions, ...
Sharron Miller
Advanced Linux Programming (New Riders, 2001
Mitchell
The Art Of Deception
Kevin Mitnick
Bioinformatics Programming Using Python
Mitchell L Model