Sign In
Sign Up
Information systems security
ICISS 2007 (2007 Delhi, India)
-
/
5
0 votes
Authentifikation
Computersicherheit
Computer Science
Ghost in the wires
4.1
17 votes
Hackers
4.1
21 votes
In the Beginning...Was the Command Line
3.7
22 votes
Cryptonomicon
4.5
28 votes
The Code Book
4.0
35 votes
The Cathedral and the Bazaar
4.3
16 votes
The White Dragon: Volume III of The Dragonriders of Pern
4.4
16 votes
The Eyes of Darkness
3.9
167 votes
The Information
3.8
15 votes
The Difference Engine
3.3
22 votes
Code
4.3
21 votes
Don't Make Me Think
4.1
15 votes
Thinking in systems
4.4
22 votes
Dragonsinger (Harper Hall of Pern Book 2)
4.6
18 votes
Dragonflight: Volume I in The Dragonriders of Pern
4.1
35 votes
Structure and Interpretation of Computer Programs (SICP)
4.4
21 votes
Hackers & painters
4.0
16 votes
No Place to Hide
4.1
18 votes
The Phoenix Project
4.1
52 votes
Rogue protocol
4.2
66 votes
Invisible Women
4.4
24 votes
Coders at Work
4.0
18 votes
Daemon
4.1
44 votes
Freedom™
4.1
29 votes
The Cuckoo’s Egg
3.9
18 votes
A Briefer History of Time
3.4
17 votes
Snow Crash
4.0
172 votes
Homeland
3.8
21 votes
1st to Die (Women's Murder Club)
4.5
22 votes
So you want to talk about race
4.5
19 votes
The Soul of a New Machine
4.1
15 votes
Player Piano
3.8
27 votes
Astrophysics for People in a Hurry
4.6
22 votes
Broken Angels
3.4
21 votes
The C Programming Language
4.3
36 votes
Biology
3.9
18 votes
Masters of Doom
4.1
32 votes
Algorithms to Live By
4.0
37 votes
The Intelligent Investor
4.6
38 votes
Protector
4.1
15 votes
Lucifer's Hammer
4.0
27 votes
The Pragmatic Programmer
4.4
41 votes
The Innovators
3.9
18 votes
The Angel Experiment: A Maximum Ride Novel (Book 1)
3.9
21 votes
Trading in the zone
4.1
34 votes
The Fall of Hyperion
4.0
45 votes
Halting State
3.5
18 votes
Longitude
4.2
17 votes