Forgot your password?

Book Reviews Stories

Learning JQuery 1.3 153 comments
Enterprise Security For the Executive 75 comments
The Trousers of Reality 63 comments
Ruby In Practice 104 comments
Website Owner's Manual 40 comments
The Book of Xen 88 comments
Confessions of a Public Speaker 111 comments
Service Oriented Architecture With Java 110 comments
Magento Beginner's Guide 124 comments
Writing For Video Game Genres 85 comments
Drupal 6 Social Networking 122 comments
Becoming Agile 193 comments
OpenGL Shading Language 3rd Edition 46 comments
The Big Questions 229 comments
Drupal Multimedia 130 comments
Android Application Development 74 comments
Learning Ext JS 133 comments
The Magicians 122 comments
Coders At Work 207 comments
Tetraktys 216 comments
The Geek Atlas 145 comments
Hello World! 199 comments
CJKV Information Processing 2nd ed. 52 comments
Beautiful Security 81 comments
The Twitter Book 88 comments
A Practical Guide to Ubuntu Linux 2nd ed. 85 comments
Game Design: A Practical Approach 85 comments
Drupal 6: Ultimate Community Site Guide 63 comments
Wired for War 252 comments
The Futurological Congress 82 comments
Vintage Games 159 comments
SQL in a Nutshell 86 comments
Beginning Python Visualization 46 comments
Space Vulture 73 comments
Front End Drupal 68 comments
Artificial Ethics 210 comments
The Road to Big Brother 212 comments
The Best American Comics 2008 55 comments
The Manga Guide to Databases 236 comments
Universal Design for Web Applications 85 comments
The Rootkit Arsenal 79 comments
Google Apps Deciphered 91 comments
The Age of Speed 114 comments
Beginning GIMP: From Novice to Professional 2nd Ed 232 comments
Assemble the Social Web with Zembly 29 comments
Refactoring SQL Applications 159 comments
The Shadow Factory 157 comments
Outliers, The Story Of Success 357 comments
Securing PHP Web Applications 229 comments
Joomla! Web Security 78 comments
Beginning Portable Shell Scripting 186 comments
Managing Online Forums 118 comments
Learning Joomla! 1.5 Extension Development 73 comments
FBML Essentials 85 comments
The Zen of SOA 219 comments
Trick or Treatment 713 comments
The Manga Guide to Statistics 164 comments
Nmap Network Scanning 125 comments
MySQL in a Nutshell 86 comments
jQuery in Action 154 comments
American Nerd 240 comments
Ender in Exile 507 comments
Applied Security Visualization 45 comments
The IDA Pro Book 85 comments
Dojo: Using the Dojo JavaScript Library 85 comments
Schneier on Security 204 comments
Working Effectively with Legacy Code 208 comments
The Ninja Handbook 111 comments
Intellectual Property and Open Source 92 comments
Quests 148 comments
Blown to Bits 91 comments
Bottom of the Barrel Book Reviews — Special Operations Team Raptor 85 comments
Bottom of the Barrel Book Reviews — The Lost Blogs 235 comments
Stepping Through the InfoSec Program 56 comments
Subject to Change 65 comments
The Ultimate CSS Reference 124 comments
Virtual Honeypots 50 comments
The Pragmatic CSO 100 comments
JavaScript: The Good Parts 162 comments
Practical Django Projects 151 comments
Inside Steve's Brain 292 comments
Web 2.0: A Strategy Guide 151 comments
Terminal Chaos 511 comments
The Principles of Project Management 125 comments
Foundations of Mac OS X Leopard Security 213 comments
Professional Techniques for Video Game Writing 98 comments
Hackerteen Volume 1: Internet Blackout 69 comments
Building an Effective Information Security Policy Architecture 70 comments
Running Xen 98 comments
The Definitive ANTLR Reference 95 comments
Practical Rails Projects 65 comments
Linux Networking Cookbook 64 comments
Terrorist Recognition Handbook 344 comments
Building Powerful and Robust Websites With Drupal 6 153 comments
The New School of Information Security 164 comments
Programming Collective Intelligence 74 comments
Linux System Programming 98 comments
Configuring Juniper NetScreen & SSG Firewalls 35 comments
A Practical Guide to Ubuntu Linux 171 comments
Windows Forensic Analysis 82 comments
Regular Expression Pocket Reference 144 comments
The Children of Hurin 209 comments
Reading Comics 130 comments
Apache Cookbook 2nd Edition 42 comments
The Ruby Programming Language 172 comments
Practical Web 2.0 Applications with PHP 153 comments
Hacking: The Art of Exploitation 59 comments
X Power Tools 219 comments
Windows Vista Annoyances 399 comments
The Symantec Guide To Home Internet Security 139 comments
PHP In Action: Objects, Design, Agility 232 comments
Geekonomics 227 comments
Linux Networking Cookbook 36 comments
Linux Firewalls 91 comments
IT Security Interviews Exposed 74 comments
CSS Pocket Reference 87 comments
Hacking VIM 308 comments
Level Design For Games 98 comments
The PHP Anthology 2nd Edition 80 comments
Head First SQL 210 comments
The Happiest Days of Our Lives 149 comments
End-to-End Network Security 99 comments
The Official Ubuntu Book 139 comments
GPU Gems 3 63 comments
High Performance Web Sites 132 comments
GIMP 2 for Photographers 471 comments
The History of the Federal Reserve 514 comments
OpenGL Programming Guide 6th Ed. 86 comments
Republic.com 2.0 59 comments
Programming Erlang 314 comments
PCI Compliance 115 comments
Network Warrior 228 comments
OpenGL SuperBible 115 comments
The Design of Sites, Second Edition 43 comments
Project Arcade 158 comments
The Ultimate Identity Theft Prevention Plan 187 comments
Computer Graphics With Java 218 comments
The Art and Science of CSS 98 comments
Legend of the Syndicate 138 comments
The Mechanized Future 240 comments
Embedded Linux Primer 59 comments
Practical Ruby Gems 101 comments
Linux Programmer's Toolbox 241 comments
Star Wars Roleplaying Game — Saga Edition 206 comments
Linux System Administration 74 comments
Pro Drupal Development 112 comments
It's Not News, It's Fark 229 comments
The Myths of Innovation 103 comments
Security Metrics 35 comments
Linux Appliance Design 53 comments
Beginning Ruby 172 comments
MySQL Stored Procedure Programming 206 comments
Java Generics and Collections 278 comments
MySQL Pocket Reference 72 comments
The DV Rebel's Guide 51 comments
Beginning Lua Programming 173 comments
GWT Java AJAX Programming 100 comments
TextMate 226 comments
Pro Java ME MMAPI 20 comments
IT Manager's Handbook 129 comments
SELinux by Example 77 comments
Inside the Machine 53 comments
The Book of JavaScript 83 comments
Character Design For Mobile Devices 35 comments
MySQL Cookbook 64 comments
Groovy in Action 154 comments
Rails Cookbook 59 comments
The Principles of Beautiful Web Design 209 comments
Minimal Perl for Unix and Linux People 332 comments
PHP 5 in Practice 116 comments
Enemy At The Water Cooler 148 comments
Game Writing 68 comments
CSS: The Definitive Guide 160 comments
Small Form Factor PCs 175 comments
Who won? 555 comments
The Trouble with Physics 373 comments
Ajax Design Patterns 39 comments
Collada 79 comments
Mongrel Shortcuts 53 comments
Developing Java Software 170 comments
Rails Recipes 153 comments
Configuring IPCop Firewalls 114 comments
Practices of an Agile Developer 172 comments
Hacking Digital Cameras 102 comments
Essential PHP Security 132 comments
Time Management for System Administrators 144 comments
Smartbomb 31 comments
Linux Patch Management 87 comments
Head First HTML with CSS & XHTML 197 comments
Beyond Java 517 comments
Practical Mono 110 comments
Massively Multiplayer Games For Dummies 161 comments
Wicked Cool Java 108 comments
The Adobe Photoshop Elements Crafts Book 51 comments
The Semantics Differentiation of Minds and Machines 271 comments
Beginning Excel What-if Data Analysis Tools 151 comments
Iron Heroes: A low magic tabletop game 221 comments
Return to the Moon 197 comments
Landing the Internship or Full-Time Job 147 comments
Insider Threat 156 comments
Pro C# 220 comments
Ambient Findability 73 comments
Makers 135 comments
Securing IM and P2P Applications 123 comments
Linux Troubleshooting 60 comments
Firefox Secrets 241 comments
Innovation Happens Elsewhere 131 comments
Core Web Application Development with PHP & MySQL 149 comments
A New TCP/IP Classic 97 comments
Pro Perl Debugging 164 comments
Building Intelligent .NET Applications 188 comments
PHP 5 Recipes 121 comments
Build a Program Now 281 comments
Cryptography in the Database 209 comments
Just Say No to Microsoft 547 comments
Podcasting Hacks 89 comments
Ajax in Action 270 comments
Movies in Fifteen Minutes 77 comments
Developing Securely In Windows 155 comments
The Equation That Couldn't Be Solved 299 comments
The Areas of My Expertise 174 comments
Dungeons and Shadows 282 comments
Teach Yourself Unix in 24 Hours 250 comments
Hardening Linux 137 comments
Write Portable Code 397 comments
Java Puzzlers 239 comments
The CISO Handbook 48 comments
Security and Usability 65 comments
The Definitive Guide to MySQL 5 100 comments
Everything Bad is Good for You 288 comments
Learning GNU Emacs, 3rd Edition 334 comments
Best Software Writing I 102 comments
Perl Best Practices 288 comments
Intrusion Prevention and Active Response 88 comments
Brute Force 76 comments
Pornified 622 comments
OpenGL Programming Guide 143 comments
Lean Software Development 135 comments
File System Forensic Analysis 225 comments
JBoss - A Developer's Notebook 116 comments
Digital People: From Bionic Humans to Androids 113 comments
Lucene in Action 109 comments
Videogames: In the Beginning 410 comments
Host Integrity Monitoring Using Osiris and Samhain 50 comments
Expert Network Time Protocol 260 comments
PHP 5 Objects, Patterns and Practice 165 comments
Perl 6 Now by Scott Walters 366 comments
Ending Spam 184 comments
Podcasting 132 comments
Spring Into PHP 5 229 comments
Page: ← 1 2 3 →

Stellar rays prove fibbing never pays. Embezzlement is another matter.

 



Forgot your password?