  var widget_code = '  <div class=\"gr_custom_container_57377386_read\">\n    <h2 class=\"gr_custom_header_57377386_read\">\n    <a style=\"text-decoration: none;\" href=\"https://www.goodreads.com/review/list/57377386-ffe4?shelf=read&amp;utm_medium=api&amp;utm_source=custom_widget\">Ffe4&#39;s books<\/a>\n    <\/h2>\n      <div class=\"gr_custom_each_container_57377386_read\">\n          <div class=\"gr_custom_book_container_57377386_read\">\n            <a title=\"Hacking: The Art of Exploitation\" href=\"https://www.goodreads.com/review/show/1705305794?utm_medium=api&amp;utm_source=custom_widget\"><img alt=\"Hacking: The Art of Exploitation\" border=\"0\" src=\"https://d.gr-assets.com/books/1386745526s/61619.jpg\" /><\/a>\n          <\/div>\n          <div class=\"gr_custom_rating_57377386_read\">\n            <span class=\" staticStars\"><img alt=\"it was amazing\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><\/span>\n          <\/div>\n          <div class=\"gr_custom_title_57377386_read\">\n            <a href=\"https://www.goodreads.com/review/show/1705305794?utm_medium=api&amp;utm_source=custom_widget\">Hacking: The Art of Exploitation<\/a>\n          <\/div>\n          <div class=\"gr_custom_author_57377386_read\">\n            by <a href=\"https://www.goodreads.com/author/show/34725.Jon_Erickson\">Jon Erickson<\/a>\n          <\/div>\n      <\/div>\n      <div class=\"gr_custom_each_container_57377386_read\">\n          <div class=\"gr_custom_book_container_57377386_read\">\n            <a title=\"The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory\" href=\"https://www.goodreads.com/review/show/1687879021?utm_medium=api&amp;utm_source=custom_widget\"><img alt=\"The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory\" border=\"0\" src=\"https://d.gr-assets.com/books/1403536721s/19525138.jpg\" /><\/a>\n          <\/div>\n          <div class=\"gr_custom_rating_57377386_read\">\n            <span class=\" staticStars\"><img src=\"https://www.goodreads.com/images/layout/gr_red_star_inactive.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_inactive.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_inactive.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_inactive.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_inactive.png\" /><\/span>\n          <\/div>\n          <div class=\"gr_custom_title_57377386_read\">\n            <a href=\"https://www.goodreads.com/review/show/1687879021?utm_medium=api&amp;utm_source=custom_widget\">The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory<\/a>\n          <\/div>\n          <div class=\"gr_custom_author_57377386_read\">\n            by <a href=\"https://www.goodreads.com/author/show/6673190.Michael_Hale_Ligh\">Michael Hale Ligh<\/a>\n          <\/div>\n      <\/div>\n      <div class=\"gr_custom_each_container_57377386_read\">\n          <div class=\"gr_custom_book_container_57377386_read\">\n            <a title=\"The Hacker Playbook: Practical Guide To Penetration Testing\" href=\"https://www.goodreads.com/review/show/1687878689?utm_medium=api&amp;utm_source=custom_widget\"><img alt=\"The Hacker Playbook: Practical Guide To Penetration Testing\" border=\"0\" src=\"https://d.gr-assets.com/books/1396658515s/21846565.jpg\" /><\/a>\n          <\/div>\n          <div class=\"gr_custom_rating_57377386_read\">\n            <span class=\" staticStars\"><img alt=\"it was amazing\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><\/span>\n          <\/div>\n          <div class=\"gr_custom_title_57377386_read\">\n            <a href=\"https://www.goodreads.com/review/show/1687878689?utm_medium=api&amp;utm_source=custom_widget\">The Hacker Playbook: Practical Guide To Penetration Testing<\/a>\n          <\/div>\n          <div class=\"gr_custom_author_57377386_read\">\n            by <a href=\"https://www.goodreads.com/author/show/12463.Peter_Kim\">Peter Kim<\/a>\n          <\/div>\n          <div class=\"gr_custom_review_57377386_read\">\n            \n          <\/div>\n      <\/div>\n      <div class=\"gr_custom_each_container_57377386_read\">\n          <div class=\"gr_custom_book_container_57377386_read\">\n            <a title=\"Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers\" href=\"https://www.goodreads.com/review/show/1687878219?utm_medium=api&amp;utm_source=custom_widget\"><img alt=\"Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers\" border=\"0\" src=\"https://d.gr-assets.com/books/1355072634s/16192263.jpg\" /><\/a>\n          <\/div>\n          <div class=\"gr_custom_rating_57377386_read\">\n            <span class=\" staticStars\"><img alt=\"it was amazing\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><img alt=\"\" src=\"https://www.goodreads.com/images/layout/gr_red_star_active.png\" /><\/span>\n          <\/div>\n          <div class=\"gr_custom_title_57377386_read\">\n            <a href=\"https://www.goodreads.com/review/show/1687878219?utm_medium=api&amp;utm_source=custom_widget\">Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers<\/a>\n          <\/div>\n          <div class=\"gr_custom_author_57377386_read\">\n            by <a href=\"https://www.goodreads.com/author/show/3137411.T_J_O_Connor\">T.J. O\'Connor<\/a>\n          <\/div>\n          <div class=\"gr_custom_review_57377386_read\">\n            \n          <\/div>\n      <\/div>\n  <br style=\"clear: both\"/>\n  <center>\n    <a href=\"https://www.goodreads.com/\"><img alt=\"goodreads.com\" style=\"border:0\" src=\"https://www.goodreads.com/images/widget/widget_logo.gif\" /><\/a>\n  <\/center>\n  <noscript>\n    Share <a href=\"https://www.goodreads.com/\">book reviews<\/a> and ratings with Ffe4, and even join a <a href=\"https://www.goodreads.com/group\">book club<\/a> on Goodreads.\n  <\/noscript>\n  <\/div>\n'
  var widget_div = document.getElementById('gr_custom_widget_57377386_read')
  if (widget_div) {
    widget_div.innerHTML = widget_code
  }
  else {
    document.write(widget_code)
  }
