Sign In
Sign Up
Hacking Cyberspace
David J. Gunkel
-
/
5
0 votes
General
Sécurité Informatique
Information Technology
Hackers
4.1
21 votes
The Cathedral and the Bazaar
4.3
16 votes
Hackers & painters
4.0
16 votes
Ghost in the wires
4.1
17 votes
The Mythical Man-Month
4.2
28 votes
Structure and Interpretation of Computer Programs (SICP)
4.4
21 votes
Coders at Work
4.0
18 votes
Masters of Doom
4.1
32 votes
In the Beginning...Was the Command Line
3.7
22 votes
Code
4.3
21 votes
The Phoenix Project
4.1
52 votes
Off to be the wizard
3.8
25 votes
The Circle
3.1
22 votes
The Information
3.8
15 votes
JavaScript
4.1
30 votes
Homeland
3.8
21 votes
Snow Crash
4.0
172 votes
The Girl with the Dragon Tattoo
4.1
52 votes
The Innovators
3.9
18 votes
Halting State
3.5
18 votes
Microserfs
4.0
18 votes
Little Brother
4.0
49 votes
Daemon
4.1
44 votes
Mad Ship
3.9
16 votes
The C Programming Language
4.3
36 votes
Don't Make Me Think
4.1
15 votes
The Difference Engine
3.3
22 votes
Rogue protocol
4.2
66 votes
Code Complete
4.2
22 votes
The Pragmatic Programmer
4.4
41 votes
The Dark Forest (The Three-Body Problem Series Book 2)
4.6
18 votes
Lucifer's Hammer
4.0
27 votes
Protector
4.1
15 votes
Freedom™
4.1
29 votes
Cryptonomicon
4.5
28 votes
The Dreaming Void
3.9
18 votes
Thinking in systems
4.4
22 votes
The Shallows
3.3
15 votes
Biology
3.9
18 votes
Pattern Recognition
3.9
51 votes
Endymion
4.0
24 votes
A Closed and Common Orbit
4.2
42 votes
The Fall of Hyperion
4.0
45 votes
Nightfall
4.1
23 votes
How to Do Nothing
4.0
17 votes
Echopraxia
3.6
17 votes
The Code Book
4.0
35 votes
No Place to Hide
4.1
18 votes