Sign In
Sign Up
A key notarization system for computer networks
Miles E. Smid
-
/
5
0 votes
Passwords
Computers
Access Control
Clean Code
4.4
35 votes
Code
4.3
21 votes
Ghost in the wires
4.1
17 votes
Hackers
4.1
21 votes
The Code Book
4.0
35 votes
Structure and Interpretation of Computer Programs (SICP)
4.4
21 votes
Coders at Work
4.0
18 votes
Homeland
3.8
21 votes
A sense of words
4.6
19 votes
Algorithms to Live By
4.0
37 votes
Masters of Doom
4.1
32 votes
The Cathedral and the Bazaar
4.3
16 votes
The Intelligent Investor
4.6
38 votes
The Eyes of Darkness
3.9
167 votes
In the Beginning...Was the Command Line
3.7
22 votes
The Pragmatic Programmer
4.4
41 votes
Design Patterns
3.9
30 votes
Trading in the zone
4.1
34 votes
Cryptonomicon
4.5
28 votes
The Mythical Man-Month
4.2
28 votes
Microserfs
4.0
18 votes
Code Complete
4.2
22 votes
JavaScript
4.1
30 votes
No Place to Hide
4.1
18 votes
Hackers & painters
4.0
16 votes
Hop on Pop
3.7
16 votes
The Phoenix Project
4.1
52 votes
The Difference Engine
3.3
22 votes
The Hive Queen (Wings of Fire #12)
4.6
26 votes
The Laws of Human Nature
4.1
66 votes
The intelligent investor
3.9
26 votes
The C Programming Language
4.3
36 votes
Little Brother
4.0
49 votes
The Intelligent Investor
3.7
15 votes
Daemon
4.1
44 votes
Rogue protocol
4.2
66 votes
Silent Spring
3.9
15 votes
The Cuckoo’s Egg
3.9
18 votes
Dragonsinger (Harper Hall of Pern Book 2)
4.6
18 votes
Ἀπολογία Σωκράτους
4.2
30 votes
Psicología oscura
4.0
29 votes
Artificial condition
4.2
59 votes
Freedom™
4.1
29 votes
The White Dragon: Volume III of The Dragonriders of Pern
4.4
16 votes
Nineteen Eighty-Four
4.3
287 votes
The Soul of a New Machine
4.1
15 votes
1st to Die (Women's Murder Club)
4.5
22 votes
English Grammar in Use
4.1
17 votes