Potentes, prepotentes e impotentes
Quino
Java EE 7 First Look
Ndjobo Armel Fabrice
Artificial Intelligence: A Modern Approach
Stuart Jonathan Russell & Peter Norvig
Mastering Linux Kernel Development: A Kernel Developer's Reference ...
Raghu Bharadwaj
En defensa de la intolerancia
Slavoj Žižek
En defensa de causas perdidas
300 días en Afganistán
Natalia Aguirre Zimerman
Principles of Communications
Rodger E. Ziemer & William H. Tranter
Hadoop Cluster Deployment
Danil Zburivsky
A World Without Time: The Forgotten Legacy of Godel and Einstein
Palle Yourgrau
Implementing Cloud Design Patterns for AWS
Marcus Young
The Definitive Guide to ARM® Cortex®-M3 and Cortex®-M4 Processors
Joseph Yiu
Computational Number Theory and Modern Cryptography
Song Y. Yan
Hack and HHVM: Programming Productivity Without Breaking Things
Owen Yamauchi
Apache Spark 2.x Cookbook
Rishi Yadav
Resource Optimization and Security for Cloud Services
Kaiqi Xiong
Web Security: A WhiteHat Perspective
Hanqing Wu & Liz Zhao
Advanced Persistent Threat Hacking: The Art and Science of Hacking ...
Tyler Wrightson
TCP/IP Illustrated: Volume 2 The Implementation
Gary R. Wright & W. Richard Stevens
TCP/IP Ilustrated (2)
Amazon Web Services in Action
Andreas Wittig & Michael Wittig
Apache Mahout Essentials
Jayani Withanawasam
Professional Java for Web Applications
Nicholas S. Williams
GNS3 Network Simulation Guide
Rednectar Chris Welsh
Cryptography in C and C++
Michael Welschenbach
Statistical Pattern Recognition
Andrew R. Webb & Keith D. Copsey
How Linux Works: What Every Superuser Should Know
Brian Ward
Java 8 Lambdas: Pragmatic Functional Programming
Richard Warburton
RHSA III
Wander Boessenkool, Chen Chang, Will Dinyes, George Hacker, ...
Red Hat System Administration (3)
The Hacker's Diet
John Walker
Free Money for All: A Basic Income Guarantee Solution for the ...
Walker
Networking for VMware Administrators
Christopher Wahl & Steve Pantol
Pro Apache Hadoop
Sameer Wadkar & Jason Venner
Learning VMware vCloud Air
Yohan Rohinton Wadia
Pro Linux High Availability Clustering
Sander van Vugt
Red Hat Enterprise Linux 6 Administration: Real World Skills ...
Accelerated Linux Core Dump Analysis: Training Course Transcript ...
Dmitry Vostokov & Software Diagnostics Services
The DevOps 2.5 Toolkit
Viktor Farcic
La vuelta al mundo en 80 días
Jules Verne
Viajes extraordinarios (10)
Selinux Cookbook
Sven Vermeulen
SELinux System Administration
Securing DevOps: Safe Services in the Cloud
Julien Vehent
Practical LPIC-3 300: Prepare for the Highest Level Professional ...
Antonio Vazquez
Random Wireless Networks
Rahul Vaze
El minotauro global
Yanis Varoufakis
Introducing Maven
Balaji Varanasi & Sudha Belida
Embedded Systems: Introduction to the ARM® Cortex(TM)-M Microcontrollers
Jonathan W Valvano
Java 8 in Action: Lambdas, Streams, and Functional-Style Programming
Raoul-Gabriel Urma & Mario Fusco & Alan Mycroft
Puppet Cookbook - Third Edition
Thomas Uphill
Software Engineering in the Era of Cloud Computing
Unknown
The Docker Book: Containerization Is the New Virtualization
James Turnbull
Historia de la Revolución Rusa
Leon Trotsky
Red Hat Enterprise Linux 7 RH134 Red Hat System Administration ...
Red Hat Training
Red Hat System Administration (2)
Cable Networks, Services, and Management
Mehmet Toy
Theory of Computation
George Tourlakis
Mastering Java 9
Martin Toshev
The Complete Works of Leo Tolstoy (34 Complete Works of Leo ...
Leo Tolstoy
The Return of the King
J. R. R. Tolkien
The Lord of the Rings (4)
The Two Towers
The Lord of the Rings (3)
The Fellowship of the Ring
The Lord of the Rings (2)
The Hobbit
The Lord of the Rings (1)
The Book of Lost Tales, Part 2
The Book of Lost Tales (2)
The Book of Lost Tales, Part 1
The Book of Lost Tales (1)
Unfinished Tales
Return of the Shadow