Skip to content

Instantly share code, notes, and snippets.

@scsibug
Last active December 1, 2020 17:38
Show Gist options
  • Save scsibug/a6ebbf3885e57a0aabe80551728d80a8 to your computer and use it in GitHub Desktop.
Save scsibug/a6ebbf3885e57a0aabe80551728d80a8 to your computer and use it in GitHub Desktop.
2020 Book Giveaway

Fiction

  • Doctor Zhivago, by Pasternak.
  • East of Eden, by Steinbeck. (Jordan)
  • All the Light We Cannot See, by Doerr.
  • Peace, by Wolfe. (Jordan)
  • Submergence, by Ledgard.
  • The Soul of a New Machine, by Kidder.
  • A Year with Rumi: Daily Readings, by Barks.

Iain Banks

  • Complicity
  • The Crow Road
  • The Steep Approach to Garbadale
  • Dead Air

Science Fiction

Peter F. Hamilton

  • The Neutronium Alchemist
  • The Reality Dysfunction
  • The Naked God
  • The Nano Flower
  • Fallen Dragon
  • Mindstar Rising
  • Pandora's Star
  • A Quantum Murder
  • Judas Unchained

Larry Niven

  • Ringworld Series
    • Ringworld
    • The Ringworld Engineers
    • The Ringworld Throne
    • Ringworld's Children
  • Protector
  • Neutron Star
  • A World Out of Time
  • Rainbow Mars
  • The Flight of the Horse
  • The Integral Trees

Andrzej Sapkowski

  • Witcher Series (reserved by Amina)
    • The Last Wish
    • Sword of Destiny
    • Blood of Elves
    • Time of Contempt
    • Baptism of Fire
    • The Tower of the Swallow
    • The Lady of the Lake

Alastair Reynolds

  • Revelation Space Series
    • Revelation Space
    • Chasm City
    • Redemption Ark
    • Absolution Gap
    • The Prefect
    • Elysium Fire
    • Diamond Dogs, Turquoise Days
  • Galactic North
  • Absolution Gap
  • Century Rain
  • Pushing Ice
  • House of Suns
  • Zima Blue
  • Terminal World
  • Deep Navigation
  • Troika
  • Revenger

William Gibson

(Jordan)

  • Mona Lisa Overdrive
  • Neuromancer
  • *Pattern Recognition
  • The Difference Engine (co-authored by Bruce Sterling)

Isaac Asimov

(Jordan)

  • The Foundation Series
    • Foundation
    • Foundation and Empire
    • Second Foundation

Other Authors

  • The Land Across, by Gene Wolfe
  • All Clear, by Connie Willis
  • Blackout, by Connie Willis
  • The Windup Girl, by Paolo Bacigalupi
  • Makers, by Cory Doctorow
  • The Magician King, by Levi Grossman
  • Avogadro Corp, by William Hertling
  • A Hologram for the King, by Dave Eggers
  • The Man in the High Castle, by Philip K. Dick
  • Oryx and Crake by Margaret Atwood
  • Daemon, by Daniel Suarez
  • Something Wicked This Way Comes, by Ray Bradbury (Jordan)
  • Fahrenheit 451, by Ray Bradbury (Jordan)
  • World War Z: An Oral History of the Zombie War, by Max Brooks
  • The Zombie Survival Guide, by Max Brooks

Non-Fiction

  • Aramis, or The Love of Technology, by Latour.
  • The Tao of Physics, by Capra.
  • Dinosaur in a Haystack, Gould.
  • Annapurna: A Woman's Place, by Blum.
  • God Created The Integers, by Hawking. (Perry)
  • The Neutrino Hunters, by Jayawardhana.
  • Periodic Tales: A Cultural History of the Elements, from Arsenic to Zinc, by Aldersey-Williams.
  • I am a Strange Loop, by Hofstadter.
  • Agile Innovation: The Revolutionary Approach to Accelerate Success, Inspire Engagement, and Ignite Creativity, by Morris, Ma & Wu. (Jean)
  • Extreme Ownership: How U.S. Navy SEALS Lead and Win, by Willink & Babin. (Jean)
  • Hello: A Life in Ham Radio, by Gregory & Sahre.
  • 12 Rules for Life: An Antidote to Chaos, by Peterson. (Jean)
  • Fermat's Last Theorem, by Singh.
  • The World is Flat: A Brief History of the Twenty-first Century, by Friedman.
  • Deep Work: Rules for Focused Success in a Distracted World, by Newport.
  • Spy Secrets That Can Save Your Life, by Hanson. (Jordan)
  • Thinking Fast and Slow, by Kahneman.
  • Critical Chain, by Goldratt.
  • The Passion of Ayn Rand, by Branden.

Technical/Reference

  • IT Governance: An International Guide to Data Security and ISO27001/ISO27002, by Calder & Watkins (Fifth Edition).
  • Blue Team Handbook: Incident Response Edition, a Condensed Field Guide for the Cyber Security Incident Responder, by Murdoch.
  • ggplot2: Elegant Graphics for Data Analysis, by Wickham.
  • Rocket Surgery Made Easy: The Do-It-Yourself Guide to Finding and Fixing Usability Problems, by Krug.
  • Java Concurrency in Practice, by Goetz.
  • A Guide to LaTeX, by Kopka & Daly (Third Edition).
  • User Stories Applied: For Agile Software Development, by Cohn.
  • Enterprise Service Oriented Architectures: Concepts, Challenges, Recommendations, by McGovern, Sims, Jain & Little. (Robert T.)
  • Making the Software Business Case: Improvement by the Numbers, by Reifer.
  • The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk, by McCarthy.

Amateur Radio / ARRL

  • The ARRL Ham Radio License Manual, (Second Edition).
  • The ARRL General Class License Manual, ARRL (Seventh Edition).
  • The ARRL Extra Class License Manual, ARRL (Ninth Edition).
  • The ARRL Antenna Book for Radio Communications, (Twenty Second Edition).
  • ARRL's Antenna Classics: A Collection of the Best Articles from ARRL Publications.

Textbooks

  • Biostatistical Analysis, Zar. Pearson, 2010 (Fifth Edition).
  • Data Mining: Practical Machine Learning Tools and Techniques, Witten & Frank. Elsevier, 2005 (Second Edition).
  • Introduction to Data Mining, Tan, Steinbach & Kumar. Addison-Wesley, 2006.
  • Introduction to Algorithms, Cormen, Leiserson, Rivest & Stein. McGraw-Hill, 2002 (Second Edition).
  • Process Dynamics, Modeling, and Control, Ogunnaike & Ray. Oxford University Press, 1994.
  • Model Checking, Clarke, Grumberg & Peled. MIT Press, 1999.
  • Applied Cryptography, Schneier. Wiley, 1996.
  • Genetic Algorithms: in Search, Optimization & Machine Learning, Goldberg. Addison-Wesley, 2006.
  • Corporate Computer Security, Boyle & Panko. Pearson, 2015 (Fourth Edition).
  • Database Systems: The Complete Book, Garcia-Molina, Ullman & Widom. Prentice Hall, 2002.
  • Discrete Mathematics and Its Applications, Rosen. McGraw-Hill, 1999 (Fourth Edition).
  • Managing Software Requirements: A Use Case Approach, Leffingwell & Widrig. Addison-Wesley, 2003 (Second Edition).
  • Cryptography and Network Security: Principles and Practices, Stallings. Pearson, 2006 (Fourth Edition).
  • Mac OS X Internals: A Systems Approach, Singh. Addison-Wesley, 2010.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment