What is this? This is a free, mail-based library. Books can be requested below and they will be mailed to you anywhere in the United States at no cost to you. Once you are done with your book, you can request postage for shipping the book to the next person who wants it (which is me if no one else has requested it).
Why am I doing this? I have a bunch of books sitting in my basement collecting dust. I would rather them go to someone who wants them (i.e. someone who has found them on this site and specifically requested them) than donate them somewhere where their utilization probably wont be maximized. At the end of the day I dont really care too much about the books themselves so if I lose them so be it. However, I do hope that users feel compelled by the goodwilled nature of this endevaour to continue to send the books on when they are done with them so that others might benefit from them as well.
Why is the site called LibreTorrent? I want this to be a peer-to-peer, mail-based library. BitTorrent is a peer-to-peer internet protocol, libre means book in latin and booktorrent.com was far to expensive. Kind of cheesy, but oh well.
If you wish to contribute your own books, contact me
Title | Author | ||
---|---|---|---|
The Idiot | Fyodor Dostoevsky | Request | |
Sapiens | Yuval Noah Harari | Request | |
Clean Code | Rober C. Martin | Request | |
Unbroken | Laura Hillenbrand | Request | |
The Boys in the Boat | Daniel James Brown | Request | |
Piloting & Seamanship | Charles B. Husick | Request | |
Building Microservices | Sam Newman | Request | |
Digital Gold | Nathaniel Popper | Request | |
Exceptional C++ | Herb Sutter | Request | |
Teach Yourself Oracle8 Database Development in 21 Days | David Lockman | Request | |
Beginning DirectX 10 Game Programming | Wendy Jones | Request | |
Code Complete | Steve McConnell | Request | |
Hacking Exposed:Network Security Secrets & Solutions | Joel Scambray, Stuart McClure, George Kurtz | Request | |
Tricks of the Windows Game Programming Gurus:Fundamentals of 2D and 3D Game Programming | Andre LeMothe | Request | |
Software Security:Building Security in | Gary McGraw | Request | |
Building Secure Software:How to Avoid Security Problems the Right Way | John Viega, Gary McGraw | Request | |
Software Requirement Patterns | Stephen Withall | Request | |
The Indispensable Guide to C | Paul Davies | Request | |
C++ Standard Library:A Tutorial and Reference | Nicolai M. Josuttis | Request | |
The C++ Programming Language | Bjarne Stroustrup | Request | |
Effective C++:55 Specific Ways to Improve Your Programs and Designs | Scott Meyers | Request | |
Effective Java | Joshua Bloch | Request | |
Java Concurrency In Practice | Brian Goetz | Request | |
Cracking the Coding Interview | Gayle Laakmann McDowell | Request | |
Ace the Programming Interview | Edward Guiness | Request | |
Algortihms Unlocked | Thomas H Cormen | Request | |
Fahrenheit 451 | Ray Bradbury | Request | |
The Alchemist | Paulo Coelho | Request | |
All Quiet on the Western Front | Erich Maria Remarque | Request | |
Atlas Shrugged | Ayn Rand | Request | |
No Place to Hide | Glenn Greenwald | Request | |
Catch 22 | Joseph Heller | Request | |
Flash Boys | Michael Lewis | Request | |
Let the Great World Spin | Colum McCann | Request | |
Hadoop:The Definitive Guide | Tom White | Request | |
Mastering Bitcoin | Andreas M. Antonopoulos | Request |