Ikev2 Ipsec Virtual Private Networks: Understanding and Deploying ...
Graham Bartlett & Amjad Inamdar
Programming Clojure
Stuart Halloway & Aaron Bedra
Augmented Reality for Android Application Development
Jens Grubert & Dr. Raphael Grasset
Hack and HHVM: Programming Productivity Without Breaking Things
Owen Yamauchi
And Another Thing...
Eoin Colfer
The Hitchhiker's Guide to the Galaxy (6)
Continuous Delivery: Reliable Software Releases Through Build, ...
Jez Humble & David Farley
Marx's General: The Revolutionary Life of Friedrich Engels
Tristram Hunt
The Meat Lover's Meatless Cookbook: Vegetarian Recipes Carnivores ...
Kim O'Donnel
Computer Networks
Andrew S. Tanenbaum & David Wetherall
The Last Days of Socrates
Plato & Harold Tarrant & Christopher Rowe
Effective Perl Programming: Ways to Write Better, More Idiomatic ...
Joseph N. Hall & Joshua McAdams & Brian D. Foy
The Book of Lost Tales, Part 2
J. R. R. Tolkien
The Book of Lost Tales (2)
A Concise Introduction to Logic
Patrick Hurley
JavaScript: The Definitive Guide
David Flanagan
The Art of Computer Programming: Combinational Algorithms, Part ...
Donald E. Knuth
The Art of Computer Programming (4)
Apache Maven 3 Cookbook
Srirangan
A Brief History of Time
Stephen Hawking
Deploying Next Generation Multicast-Enabled Applications: Label ...
Vinod Joseph & Srinivas Mulugu
Jenkins: The Definitive Guide
John Ferguson Smart
LTE, WiMAX and WLAN Network Design, Optimization and Performance ...
Leonhard Korowajczuk
LTE - the UMTS Long Term Evolution: From Theory to Practice
Stefania Sesia & Issam Toufik & Matthew Baker
Hard Real-Time Computing Systems: Predictable Scheduling Algorithms ...
Giorgio C Buttazzo
Shell Scripting
Steve Parker
Introduction to 64 Bit Intel Assembly Language Programming for ...
Ray Seyfarth
Statistical Pattern Recognition
Andrew R. Webb & Keith D. Copsey
Network Security Essentials: Applications and Standards
William Stallings
TCP/IP Illustrated: Volume 1 The Protocols
Kevin R. Fall & W. Richard Stevens
TCP/IP Ilustrated (1)
Commando. Autobiografía de Johnny Ramone
Johnny Ramone
Advanced Penetration Testing for Highly-Secured Environments
Lee Allen
Corporate Computer Security
Randy J Boyle & Raymond R. Panko
Return of the Shadow
Jenkins Continuous Integration Cookbook
Alan Berg
The Debian Administrator's Handbook: Debian Squeeze From Discovery ...
Raphaël Hertzog & Roland Mas
The Fellowship of the Ring
The Lord of the Rings (2)
A Practical Guide to Advanced Networking
Jeffrey S. Beasley & Piyasat Nilkaew
SQL Injection Attacks and Defense
Justin Clarke & Kevvie Fowler & Erlend Oftedal & Rodrigo Marcos Alvarez & Dave Hartley & Alexander Kornbrust & Gary O'Leary-Steele & Alberto Revelli & Sumit Siddharth & Marco Slaviero
Windows Internals, Part 1 (6th Edition) (Developer Reference)
Mark E. Russinovich & Alex Ionescu
Windows Internals (1)
Theory of Computation
George Tourlakis
Seven Databases in Seven Weeks: A Guide to Modern Databases ...
Eric Redmond & Jim R. Wilson
Embedded Systems: Introduction to the ARM® Cortex(TM)-M Microcontrollers
Jonathan W Valvano
Mathematical Logic for Computer Science
Mordechai Ben-Ari
Linux Bible
Christopher Negus & Christine Bresnahan
The Hobbit
The Lord of the Rings (1)
The Two Towers
The Lord of the Rings (3)
The Return of the King
The Lord of the Rings (4)
Windows Internals, Part 2 (6th Edition) (Developer Reference)
Mark E. Russinovich
Windows Internals (2)
Applied Chemistry: A Textbook for Engineers and Technologists
Oleg Roussak & H. D. Gesser
Operating System Concepts, 9th Edition
Abraham Silberschatz
Operating System Concepts (1)
Learn Windows PowerShell in a Month of Lunches
Don Jones & Jeffery Hicks & Jeffrey T. Hicks
LTE-Advanced and Next Generation Wireless Networks: Channel ...
Guillaume de La Roche & Andrés Alayón-Glazunov & Ben Allen
Chef Infrastructure Automation Cookbook
Matthias Marschall
An Introduction to Optimization
Edwin K. P. Chong & Stanislaw H. Zak
Learn You Some Erlang for Great Good!: A Beginner's Guide
Fred Hébert
X86 Assembly Language and C Fundamentals
Joseph Cavanagh
Computational Number Theory and Modern Cryptography
Song Y. Yan
Red Hat Enterprise Linux 6 Administration: Real World Skills ...
Sander van Vugt
Star Trek Federation: The First 150 Years
David A. Goodman
Peru
Carolyn McCarthy & Carolina A Miranda & Kevin Raub & Brendan Sainsbury & Luke Waterson
PostgreSQL Replication
Zoltan Boszormenyi & Hans-Jürgen Schönig
Cryptography and Network Security: Principles and Practice (6th ...
Cryptography and Network Security: Principles and Practice (4th ...
Puppet 3. 0 Beginner's Guide
John Arundel
Web Penetration Testing With Kali Linux
Joseph Muniz & Aamir Lakhani