Sign In
Sign Up
Cryptology And Network Security
Dongdai Lin
-
/
5
0 votes
Data Protection
Coding Theory
Data Structures (Computer Science)
The Code Book
4.0
35 votes
Code
4.3
21 votes
Hackers
4.1
21 votes
Clean Code
4.4
35 votes
Ghost in the wires
4.1
17 votes
Cryptonomicon
4.5
28 votes
The Information
3.8
15 votes
Thinking in systems
4.4
22 votes
In the Beginning...Was the Command Line
3.7
22 votes
Don't Make Me Think
4.1
15 votes
Algorithms to Live By
4.0
37 votes
The Cathedral and the Bazaar
4.3
16 votes
The Phoenix Project
4.1
52 votes
The Black Swan
3.9
27 votes
Invisible Women
4.4
24 votes
The Difference Engine
3.3
22 votes
Biology
3.9
18 votes
No Place to Hide
4.1
18 votes
Calculus
4.1
17 votes
The Grand Design
3.7
21 votes
Structure and Interpretation of Computer Programs (SICP)
4.4
21 votes
Hackers & painters
4.0
16 votes
Surrounded by Idiots
4.2
18 votes
Rogue protocol
4.2
66 votes
So you want to talk about race
4.5
19 votes
What If?
4.3
93 votes
Antifragile
4.1
33 votes
Crucial Conversations
3.9
19 votes
Coders at Work
4.0
18 votes
How to Talk to Anyone
3.8
39 votes
Design Patterns
3.9
30 votes
The Cuckoo’s Egg
3.9
18 votes
Daemon
4.1
44 votes
Freedom™
4.1
29 votes
The Drunkard's Walk
4.0
20 votes
The White Dragon: Volume III of The Dragonriders of Pern
4.4
16 votes
Snow Crash
4.0
172 votes
A Brief History of Time
4.1
183 votes
Homeland
3.8
21 votes
Men Explain Things To Me
3.9
23 votes
Anathem
4.3
64 votes
Microbiology
4.5
17 votes
The Soul of a New Machine
4.1
15 votes
Player Piano
3.8
27 votes
The Games People Play
4.0
39 votes
The Dispossessed
4.4
31 votes
Astrophysics for People in a Hurry
4.6
22 votes
Broken Angels
3.4
21 votes