Forgot your password?

Book Reviews Stories

Artificial Intelligence for Computer Games 259 comments
Performance Tuning for Linux Servers 121 comments
Infosec Career Hacking 85 comments
Power Up 122 comments
Visual Studio Hacks 437 comments
DHTML Utopia 154 comments
Stealing the Network: How to Own an Identity 99 comments
Learning Perl, 4th Ed. 172 comments
Google Hacking for Penetration Testers 142 comments
Ant - The Definitive Guide 205 comments
Spring into Technical Writing 173 comments
Expert Delivery Using NAnt and CruiseControl.NET 109 comments
Dungeon Master's Guide II 409 comments
The Escapist 197 comments
Don't Click on the Blue E 313 comments
When Computers Were Human 322 comments
How to Do Everything with PHP and MySQL 354 comments
The Book of Postfix 103 comments
Effective C# 233 comments
From Alien to The Matrix 249 comments
Home Networking Simplified 149 comments
Darknet: Hollywood's War 238 comments
The Art of Computer Virus Research and Defense 100 comments
Data Crunching 94 comments
Codex 44 comments
Agile Web Development with Ruby on Rails 222 comments
Essential Mac OS X Server Administration 109 comments
Spring into HTML and CSS 131 comments
Test Driving Linux 202 comments
Effective C++, Third Edition 296 comments
Technology Paradise Lost 218 comments
LPIC 1 Exam Cram 2 162 comments
Web Designer's Reference 416 comments
GPU Gems 2 70 comments
Roger Penrose and the Road to Reality 346 comments
Perl Medic 194 comments
Apache Jakarta Commons 89 comments
Firefox and Thunderbird Garage 84 comments
Gaming Hacks 139 comments
What The Dormouse Said 188 comments
Iron Council 72 comments
Practical Common Lisp 617 comments
Professional Excel Development 318 comments
Rapid J2EE Development 146 comments
Linux Cookbook 126 comments
Aggressive Network Self-Defense 128 comments
From Bash To Z Shell 214 comments
Mapping the Mind 389 comments
Google Hacking for Penetration Testers 138 comments
Planet Simpson 176 comments
Hibernate - A J2EE Developers Guide 244 comments
Bioinformatics in the Post-Genomic Era 105 comments
Spam Kings 127 comments
Firefox Hacks 309 comments
Game Creation and Careers 164 comments
Beginning PHP 5 and MySQL E-Commerce 202 comments
Regular Expression Recipes 258 comments
Juiced 381 comments
Web Design Garage 103 comments
PHP 5 Power Programming 218 comments
Deploying OpenLDAP 117 comments
Got Game 212 comments
Randal Schwartz's Perls of Wisdom 282 comments
Code Reading: The Open Source Perspective 464 comments
Apple I Replica Creation 163 comments
Integrating Agile Development 121 comments
Effective XML 269 comments
Exultant 128 comments
Mac OS X Server Panther 155 comments
Blink, Take 2 172 comments
Managing Information Security Risks 67 comments
'Make' Premier Issue 198 comments
Web Design on a Shoestring 214 comments
Kerberos: The Definitive Guide 177 comments
Pragmatic Version Control Using Subversion 235 comments
Linux Application Development 171 comments
Beginning AppleScript 171 comments
A Theory of Fun for Game Design 187 comments
Blink 194 comments
Build a Database Driven Site -- Quick 251 comments
A Compact Guide To F/OSS Licensing 61 comments
The CSS Anthology 169 comments
Artificial Intelligence for Computer Games 250 comments
Java Application Development on Linux 428 comments
The Naked Corporation 103 comments
The Know-It-All 149 comments
My Life as a Quant 139 comments
Getting Things Done 216 comments
Practical Guide to Red Hat Linux, 2nd Edition 86 comments
Business Under Fire 564 comments
Robot Building for Beginners 132 comments
It's Not About The Technology 198 comments
Revolution In The Valley 290 comments
Two Reviews of Yourdon's 'Outsource?' 511 comments
Prime Obsession 325 comments
Two Books On Plone 107 comments
Building Applications with the Linux Standard Base 282 comments
Debugging Indian Computer Programmers 1248 comments
Emergence 149 comments
Mathematics and Sex 458 comments
3D User Interfaces 353 comments
The Boy Who Would Live Forever 142 comments
The Pocket and the Pendant 94 comments
Computer Forensics 244 comments
Offshoring IT 369 comments
MySQL Database Design and Optimization 233 comments
Three Books On The iPod 188 comments
Developing Applications With Objective Caml 243 comments
30 Years of Adventure: A Celebration of D&D 329 comments
Running Mac OS X Panther 288 comments
Malware: Fighting Malicious Code 95 comments
Beginning Perl, 2nd Ed. 141 comments
Point and Click Linux 192 comments
The Definitive Guide to MySQL, 2nd Ed. 128 comments
A Complete Guide to Pivot Tables 261 comments
Joel On Software 166 comments
Knoppix Hacks 190 comments
Holub on Patterns 211 comments
Learning Unix for Mac OS X Panther 337 comments
Wi-Fi Toys 71 comments
Cube Farm 306 comments
Windows Forensics and Incident Recovery 142 comments
Digital Retro 111 comments
Outsourcing Information Security 196 comments
Decompiling Java 221 comments
Assessing Network Security 89 comments
High-Tech Crimes Revealed 114 comments
Learning PHP 5 0 comments
The Cult of Mac 374 comments
Learning PHP 5 201 comments
Car Hacks & Mods for Dummies 373 comments
WiMax Operator's Manual: Building 802.16 Wireless 99 comments
High Performance MySQL 307 comments
Programming Ruby: The Pragmatic Programmers' Guide 231 comments
Organizational Patterns of Agile Software Development 128 comments
Foundations of Python Network Programming 144 comments
Moving to the Linux Business Desktop 211 comments
Solaris Systems Programming 181 comments
Hibernate in Action 220 comments
The Mezonic Agenda: Hacking the Presidency 161 comments
Computer Networking First-Step 114 comments
Beginning PHP and MySQL 228 comments
Web Search Garage 98 comments
Interactive Storytelling 163 comments
Web Standards Solutions 157 comments
Mono: A Developer's Handbook 301 comments
Simulations and the Future of Learning 107 comments
Jonathan Strange & Mr Norrell 170 comments
Metaprogramming GPUs with Sh 139 comments
Security Alert 162 comments
The System of the World 140 comments
Succeeding With Open Source 68 comments
Steel Bolt Hacking 448 comments
The Shaggy Steed of Physics 181 comments
Ringworld's Children 187 comments
Network Security Assessment 92 comments
Dive Into Python 309 comments
The Underground History of American Education 1346 comments
Internet Babylon 147 comments
Hardening Apache 241 comments
Tao of Security Monitoring 107 comments
Always Use Protection 307 comments
US Military Commander's Suggested Reading List 51 comments
Wi-Foo: The Secrets of Wireless Hacking 107 comments
Computer Security for the Home and Small Office 146 comments
OpenGL Shading Language 96 comments
Matrix Decision Making 296 comments
Network Security Hacks 107 comments
Planet Broadband 113 comments
Lysergically Yours 486 comments
iPod & iTunes: The Missing Manual, 2nd Edition 201 comments
Advanced PHP Programming 189 comments
Linux for Non-Geeks 260 comments
Book Review: Moon-Mars Commission Report 254 comments
Linux Unwired 184 comments
Metamath! The Quest for Omega 338 comments
Hackers & Painters 112 comments
Linux for Dummies, 5th Edition 372 comments
GPU Gems 116 comments
Fix a Troubled Mac 265 comments
Cocoa Programming for Mac OS X, 2nd Edition 162 comments
Hardcore Java 197 comments
Sailing the Wine Dark Sea 232 comments
High Integrity Software 238 comments
Out of Gas 1098 comments
The Success of Open Source 122 comments
Bicycling Science, Third Edition 345 comments
Secure Architectures with OpenBSD 90 comments
The Flickering Mind 455 comments
The Confusion 156 comments
OpenGL Reference Manual v1.4 90 comments
There Must be a Pony in Here Somewhere 199 comments
HackNotes Network Security Portable Reference 44 comments
Core CSS (2nd ed.) 314 comments
Two Funnies: BotBOFH and Joy of Tech 74 comments
Advanced Unix Programming, 2nd Ed. 143 comments
Struts Survival Guide 113 comments
Linux Programming by Example 119 comments
MySQL and Perl for the Web 244 comments
Hardware Hacking 189 comments
Running Mac OS X Panther 175 comments
Samba 3 By Example 195 comments
Rapid Application Development with Mozilla 249 comments
Malware - Fighting Malicious Code 111 comments
Twisty Little Passages 150 comments
Ethereal Packet Sniffing 147 comments
Cocoa in a Nutshell 94 comments
Dating Design Patterns 255 comments
The Power of Persuasion 200 comments
Signor Marconi's Magic Box 144 comments
Getting Started with Lego Trains 93 comments
Free Culture 154 comments
Extreme Programming Refactored, Take 2 277 comments
The Fabric of the Cosmos 344 comments
The Zenith Angle 110 comments
Everything and More 290 comments
C++ GUI Programming with Qt 3 217 comments
A Field Guide To Wireless LANs for Administrators and Power Users 100 comments
Learning Functional Programming through Multimedia 200 comments
Exploiting Software 148 comments
Essential Check Point Firewall-1 NG 149 comments
Google, Amazon, and Beyond 74 comments
Wicked Cool Shell Scripts 569 comments
Implementing CIFS 199 comments
Five Free Calculus Textbooks 430 comments
Security Warrior 124 comments
Purely Functional Data Structures 427 comments
Pragmatic JUnit Testing 118 comments
Voice Of The Fire 104 comments
Postfix 161 comments
Hardware Hacking Projects for Geeks 235 comments
Debugging 290 comments
Learning Unix for Mac OS X Panther 284 comments
Singularity Sky 416 comments
Digital Fortress 217 comments
Practical C++ 307 comments
King Rat 120 comments
Animal Social Complexity - Intelligence and Culture 245 comments
The Maverick and His Machine 255 comments
Learn How to Program Using Any Web Browser 456 comments
The Golden Ratio 676 comments
MySQL: Building User Interfaces 266 comments
Embedded Ethernet and Internet Complete 105 comments
AppleScript - the Definitive Guide 140 comments
C++ GUI Programming with Qt 3 428 comments
Best of The Perl Journal 123 comments
The Golden Transcendence 172 comments
CCNA Certification Library 182 comments
Mac OS X -- The Missing Manual, Panther Edition 104 comments
Paranoia 158 comments
Page: ← 2 3 4 →

One small step for man, one giant stumble for mankind.

 



Forgot your password?