Parent directory/ | - | - |
transformers/ | - | 30-Jul-2024 02:47 |
2014 Internet Peering Playbook.epub | 8M | 21-Oct-2016 19:08 |
A Discipline of Programming_ Edsger Dijkstra_ 1976.djvu | 2M | 25-Oct-2011 22:59 |
A Large-Scale Study of Flash Memory Failures in the Field_ Facebook 2015.pdf | 6M | 24-Jun-2015 09:51 |
A Peek on Numerical Programming in Perl and Python_ E Christopher Dyken_ 2005.pdf | 100K | 24-Oct-2011 01:35 |
A Primer on Scientific Programming with Python_ 2nd Ed_ Hans Petter Langtangen_ 2011.pdf | 5M | 25-Oct-2011 23:01 |
A2_ Analog Malicious Hardware_ K Yang_ M Hicks_ Q Dong_ T Austin_ D Sylvester_ 2016.pdf | 3M | 25-May-2016 15:40 |
AIR-FI_ Generating Covert Wi-Fi Signals from Air-Gapped Computers_ Mordechai Guri_ arxiv2012.06884.pdf | 7M | 15-Dec-2020 19:54 |
ASLR on the Line_ Practical Cache Attacks on the MMU_ Ben Gras_ Kaveh Razavi_ Erik Bosman_ Herbert Bos_ Cristiano Giu..> | 771K | 15-Feb-2017 16:27 |
Abrupt rise of new machine ecology beyond human response time_ Neil Johnson_ Guannan Zhao_ Eric Hunsader_ Hong Qi_ Ni..> | 1M | 13-Sep-2013 11:49 |
Accessible EPUB 3_ Matt_Garrish_ 2012.pdf | 3M | 25-Mar-2012 18:23 |
Accessorize to a Crime_ Real and Stealthy Attacks on State-of-the-Art Face Recognition_ Mahmood Sharif_ Sruti Bhagava..> | 4M | 02-Nov-2016 19:10 |
Against the Law_ Countering Lawful Abuses of Digital Surveillance_ Andrew bunnie Huang_ Edward Snowden_ 2016.pdf | 8M | 08-Sep-2016 08:41 |
All Your GPS Are Belong To Us_ Towards Stealthy Manipulation of Road Navigation Systems_ K Zeng_ S Liu_ Y Shu_ D Wang..> | 4M | 23-Jul-2018 02:01 |
An Analysis of Chinas Great Cannon_ Marczak et al_ foci 2015.pdf | 695K | 05-Sep-2015 05:53 |
An Industrial-Strength Audio Search Algorithm_ Avery Li-Chun Wang_ Shazam.pdf | 477K | 17-Jul-2015 22:31 |
Applied Mathematical Programming_ Stephen P Bradley_ Arnoldo C Hax_ Thomas L Magnanti_ 1977.pdf | 35M | 25-Oct-2011 22:58 |
Automating System Administration with Perl_ Tools to Make You More Efficient_ David N Blank-Edelman_ 2009.epub | 2M | 14-Jul-2011 05:44 |
BADFET_ Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection_ A Cui_ R Housley_ 201..> | 14M | 03-Sep-2018 15:24 |
Beginning PDL_ Xavier Calbet_ 2001.pdf | 422K | 25-Oct-2011 02:23 |
Bitcoin and Cryptocurrency Technologies_ A Narayanan_ J Bonneau E Felten_ A Miller_ S Goldfeder_ 2016.pdf | 18M | 10-Feb-2016 17:39 |
Bitcoin_ A Peer-to-Peer Electronic Cash System_ Satoshi Nakamoto.pdf | 180K | 27-Sep-2011 10:24 |
Breaking and Improving Protocol Obfuscation_ Erik Hjelmvik_ Wolfgang John_ 2010.pdf | 682K | 05-May-2012 13:03 |
Cheatsheets for Authentication and Key Agreements in 2G, 3G, 4G, and 5G_ arxiv2107.07416.pdf | 1M | 26-Jul-2021 21:13 |
Circuit Fingerprinting Attacks_ Passive Deanonymization of Tor Hidden Services_ Albert Kwon_ Mashael AlSabah_ David L..> | 523K | 22-Sep-2015 16:56 |
Computer Algebra Recipes for Mathematical Physics_ Richard H Enns_ 2004.pdf | 4M | 25-Oct-2011 22:56 |
Computer Methods for Ordinary Differential Equations and Differential-Algebraic Equations_ L R Petzold_ SIAM Society ..> | 2M | 27-Feb-2012 12:07 |
Computer Science from the Bottom Up_ Ian Wienand_ 2016.pdf | 996K | 29-Dec-2019 03:06 |
Concrete Mathematics_ A Foundation for Computer Science_ 2nd Ed_ Ronald L Graham_ Donald E Knuth_ Oren Patashnik_ 199..> | 5M | 25-Oct-2011 23:04 |
Crowd Counting Through Walls Using WiFi_ S Depatla_ Y Mostofi_ Percom 2018.pdf | 2M | 27-Sep-2018 21:15 |
Cryptographically secure shields_ J M Cioranesco_ J L Danger_ T Graba_ S Guilley_ Y Mathieu_ D Naccache_ X T Ngo_ HST..> | 1M | 14-Sep-2016 12:07 |
CyberWarfare CyberComplacency_ is hollywoods blueprint for chaos coming true_ Mark Osborne_ 2013.pdf | 15M | 22-Sep-2016 21:34 |
DNS & BIND Cookbook_ Cricket Liu.chm | 576K | 15-Aug-2011 07:01 |
DNS and BIND on IPv6_ Cricket Liu_ 2011.pdf | 4M | 15-Aug-2011 07:00 |
DNS and BIND_ 5th Ed_ Cricket Liu_ Paul Albitz_ 2006.chm | 2M | 15-Aug-2011 06:53 |
DeDRM_tools_10.0.2.zip | 458K | 10-Jan-2022 05:45 |
Decentralized Anonymous Credentials_ Christina Garman_ Matthew Green_ Ian Miers_ 2013.pdf | 595K | 04-Nov-2013 03:21 |
Dedup Est Machina_ Memory Deduplication as an Advanced Exploitation Vector_ E Bosman_ K Razavi_ H Bos_ C Giuffrida_ s..> | 547K | 28-May-2016 08:25 |
Digital Design_ Verilog_ An Embedded Systems Approach Using Verilog_ Peter J Ashenden_ 2007.pdf | 2M | 03-Jan-2013 04:37 |
Digital Signal Processing using Stream High Performance Computing_ A 512-Input Broadband Correlator for Radio Astrono..> | 6M | 08-Jun-2015 22:41 |
DiskFiltration_ Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise_ arxiv160803431v1..> | 3M | 12-Aug-2016 16:35 |
Effective Perl Programming_ Ways to Write Better More Idiomatic Perl_ 2nd Ed_ Joseph N Hall_ Joshua A McAdams_ brian ..> | 2M | 14-Jul-2011 05:56 |
Effective awk Programming_ 3rd Ed_ Arnold Robbins_ 2001.pdf | 2M | 15-Aug-2011 06:51 |
Efficient BackProp_ Yann LeCun_ Leon Bottou_ Genevieve B Orr_ Klaus-Rober Muller_ 1998.pdf | 500K | 22-Mar-2013 08:05 |
Encyclopedia of Distances_ Michel M Deza_ Elena Deza_ 2009.pdf | 4M | 25-Apr-2023 04:33 |
Equation Group_ Questions and Answers_ HDD Firmware Trojans_ ver 15_ Kaspersky 2015.pdf | 4M | 09-Nov-2016 06:58 |
Error Characterization, Mitigation, and Recovery in Flash Memory Based Solid-State Drives_ Yu Cai_ Saugata Ghose_ Eri..> | 5M | 22-Jul-2023 23:21 |
Essential Linux Device Drivers_ Sreekrishnan Venkateswaran_ 2008.chm | 4M | 15-Aug-2011 06:55 |
FM 99.9 Radio Virus_ Exploiting FM Radio Broadcasts for Malware Deployment_ E Fernandes_ B Crispo_ M Conti_ 2013.pdf | 750K | 03-Dec-2015 00:34 |
Fansmitter_ Acoustic Data Exfiltration from Speakerless Air-Gapped Computers_ Mordechai Guri_ Yosef Solewicz_ Andrey ..> | 2M | 27-Jun-2016 23:24 |
Fast Microwave Logic Circuits_ D J Blattner_ F Sterzer_ 1959.pdf | 3M | 18-Jul-2019 20:44 |
Fast String Searching_ Andrew Hume_ Daniel Sunday_ 1991.pdf | 204K | 09-Aug-2011 17:06 |
Flash Reliability in Production_ The Expected and the Unexpected_ B Schroeder_ R Lagisetty_ A Merchent_ Google_ 2016.pdf | 2M | 13-Mar-2016 03:44 |
Flipping Bits in Memory Without Accessing Them_ An Experimental Study of DRAM Disturbance Errors_ Yoongu Kim_ Ross Da..> | 828K | 24-Dec-2014 00:12 |
Forced Decryption as a Foregone Conclusion_ Dan Terzian_ 2015.pdf | 217K | 21-Mar-2017 02:25 |
Forensic Analysis and Anonymisation of Printed Documents_ T Richter_ S Escher_ D Schonfeld_ T Strufe_ 2018.pdf | 1M | 28-Jun-2018 17:39 |
Fundamentals of Scientific Computing_ Bertil Gustafsson_ 2011.pdf | 4M | 15-Jul-2011 06:15 |
Furby source code_ D Hampton_ W Shulz_ 1998.pdf | 6M | 13-Aug-2018 20:12 |
Games Diversions & Perl Culture_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf | 4M | 14-Jul-2011 05:50 |
Hacking the Cable Modem_ Ryan Harris_ 2006.pdf | 16M | 19-Jan-2014 19:04 |
Higher-Order Perl_ Mark Jason Dominus.epub | 2M | 06-Jan-2013 06:53 |
Higher-Order Perl_ Transforming Programs with Programs_ Mark Jason Dominus_ 2005.pdf | 2M | 14-Jul-2011 05:48 |
Honeypots_ A New Paradigm to Information Security_ R C Joshi_ Anjali Sardana_ 2011.pdf | 4M | 05-Oct-2011 00:44 |
IEMI Threats for Information Security_ Remote Command Injection on Modern Smartphones_ Chaouki Kasmi_ Jose Lopes Este..> | 239K | 18-Oct-2015 04:08 |
IPv6 Address Planning_ Designing an Address Plan for the Future_ Tom Coffeen_ 2014.pdf | 14M | 29-Oct-2019 03:46 |
IPv6 Essentials_ 3rd Ed_ Integrating IPv6 into Your IPv4 Network_ Silvia Hagen_2014.pdf | 16M | 29-Oct-2019 03:45 |
Imperfect Forward Secrecy_ How Diffie-Hellman Fails in Practice_ D Adrian_ K Bhargavan_ Z Curumeric_ P Gaudry_ M Gree..> | 1M | 15-Oct-2015 03:47 |
Inferring Persistent Interdomain Congestion_ A Dhamdhere_ D D Clark_ A Gamero-Garrido_ M Luckie_ R K P Mok_ G Akiwate..> | 1M | 27-Aug-2018 18:28 |
Inside the Machine_ An Illustrated Introduction to Microprocessors and Computer Architecture_ Jon Stokes_ 2006.pdf | 10M | 27-Nov-2013 06:44 |
Instruction latencies and throughput for AMD and Intel x86 processors_ Torbjorn Granlund_ 2017.pdf | 204K | 04-Jun-2017 18:25 |
Intel ME - Two Years Later_ Igor Skochinsky_ 2014.pdf | 1M | 11-Nov-2016 10:03 |
Introduction to Algorithms_ 3rd Ed_ Thomas H Cormen_ Charles E Leiserson_ Ronald L Rivest_ Clifford Stein_ 2009.pdf | 5M | 31-Aug-2011 05:33 |
Introduction to Automata Theory_ Languages_ and Computation_ 2nd Ed_ John E Hopcroft_ Rajeev Motwani_ Jeffrey D Ullma..> | 16M | 31-Aug-2011 05:30 |
Introduction to Scientific Programming and Simulation using R_ Owen Jones_ Robert Maillardet_ Andrew Robinson_ 2009.pdf | 8M | 25-Oct-2011 23:05 |
Introduction to Scilab_ 2010.pdf | 1M | 25-Oct-2011 02:38 |
Introduction to Submarine Networks_ Present and Future Challenges Historical Perspective_ Valey Kamalov_ Vijay Vursir..> | 46M | 11-Sep-2024 20:38 |
Introduction to the Theory of Computation_ 2nd Ed_ Michael Sipser_ 2005.djvu | 5M | 12-Aug-2011 00:50 |
Invisible Mask_ Practical Attacks on Face Recognition with Infrared_ arxiv180304683.pdf | 3M | 27-Mar-2018 22:03 |
Joe Pardue - C Programming For Microcontrollers.pdf | 4M | 21-Nov-2011 21:04 |
Key Extraction Using Thermal Laser Stimulation_ A Case Study on Xilinx Ultrascale FPGAs_ H Lohrke_ S Tajik_ T Krachen..> | 6M | 23-Jun-2019 20:43 |
Key Reinstallation Attacks_ Forcing Nonce Reuse in WPA2_ Mathy Vanhoef_ Frank Piessens_ 2017.pdf | 627K | 17-Oct-2017 04:09 |
Keystroke Recognition Using WiFi Signals_ Kamran Ali_ Alex X Liu_ Wei Wang_ Muhammad Shahzad_ 2015.pdf | 1M | 25-Aug-2016 04:18 |
LED-it-GO_ Leaking a lot of Data from Air-Gapped Computers via the HDD LED_ M Guri_ B Zadov_ E Atias_ Y Elovici_ 2017..> | 2M | 27-Feb-2017 15:13 |
LIRA_ Lightweight Incentivized Routing for Anonymity_ Rob Jasen_ Aaron Johnson_ Paul Syverson_ US-NRL 2013.pdf | 1M | 21-Sep-2013 20:30 |
Learning Perl Tk_ Graphical User Interfaces with Perl_ Nancy Walsh_ 1999.pdf | 4M | 14-Jul-2011 05:52 |
Learning Perl_ 6th Edition_ Randal L Schwartz_ Brian D Foy_ Tom Phoenix_ 2011.pdf | 8M | 14-Jul-2011 05:45 |
Learning to Win by Reading Manuals in a Monte-Carlo Framework_ S R K Branavan_ D Silver_ R Barzilay_ acl_2011.pdf | 359K | 02-Jan-2012 01:59 |
Lest We Remember_ Cold Boot Attacks on Encryption Keys_ J A Halderman_ S D Schoen_ N Heniger_ W Clarkson_ W Paul_ J A..> | 3M | 05-Nov-2014 23:13 |
Light Commands_ Laser-Based Audio Injection Attacks on Voice-Controllable Systems_ T Sugawara_ B Cyr_ S Rampazzi_ D G..> | 5M | 05-Nov-2019 00:57 |
Linkers and Loaders_ John R Levine_ 1999.pdf | 4M | 06-Mar-2024 17:33 |
Linux Device Drivers_ 3rd Ed_ Jonathan Corbet_ 2005.pdf | 12M | 15-Aug-2011 06:56 |
Listening through a Vibration Motor_ N Roy_ R R Choudhury_ 2016.pdf | 2M | 27-Feb-2018 05:41 |
Magnetic Recording_ Stella Wu_ Seagate Technology_ 2014.pdf | 13M | 01-Oct-2018 19:15 |
Mastering Perl Tk_ Stephen O Lidie_ Nancy Walsh_ 2002.chm | 3M | 14-Jul-2011 05:46 |
Mastering Perl for Bioinformatics_ James D Tisdall_ 2003.chm | 717K | 15-Aug-2011 07:14 |
Mastering Perl_ Brian D Foy_ 2007.pdf | 7M | 15-Aug-2011 07:19 |
Mathematical Introduction to Linear Programming and Game Theory_ Louis Brickman_ 1998.djvu | 955K | 25-Oct-2011 22:59 |
Mathematical Structures for Computer Science_ A Modern Treatment of Discrete Mathematics_ 5th Ed_ Judith L Gersting_ ..> | 7M | 25-Oct-2011 23:02 |
Matplotlib for Python Developers_ Sandro Tosi_ 2009.pdf | 12M | 02-Sep-2012 10:12 |
Methods in Medical Informatics_ Fundamentals of Healthcare Programming in Perl, Python, and Ruby_ Jules J Berman_ 201..> | 6M | 25-Oct-2011 22:58 |
Minimal Perl For UNIX and Linux People_ Tim Maher_ 2007.pdf | 6M | 30-Nov-2017 05:38 |
Modern Perl_ Chromatic_ 2010.pdf | 2M | 14-Jul-2011 05:42 |
Modern Perl_ Chromatic_ 2012.pdf | 1M | 29-Feb-2012 02:35 |
Modern Perl_ Chromatic_ 2014.pdf | 791K | 06-Nov-2015 14:23 |
Numerical Recipes_ The Art of Scientific Computing_ 3rd Ed_ William H Press_ Saul A Teukolsky_ William T Vetterling_ ..> | 20M | 15-Jul-2011 07:43 |
ODINI_ Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields_ arxiv180202700.pdf | 1020K | 10-Feb-2018 21:52 |
On Covert Acoustical Mesh Networks in Air_ Michael Hanspach_ Michael Goetz_ 2013.pdf | 3M | 25-Nov-2013 18:18 |
On Rationomics_ An Analysis into the Workings of a Bit Torrent Trackers Economy and Its Composition_ oorza_ 2008.pdf | 104K | 19-Mar-2012 02:25 |
Optical surveillance on silicon chips_ your crypto keys are visible_ Sergei Skorobogatov_ 2009.pdf | 3M | 22-Dec-2023 03:51 |
P might equal NP_ Scott Aaronson_ 2016.pdf | 928K | 05-Jan-2017 13:05 |
PCI.Local.Bus.Specification.Revision.3.0.pdf | 3M | 28-Jul-2011 12:56 |
PCI_22.pdf | 4M | 28-Jul-2011 12:57 |
PDL Book_ 2012-02-05.pdf | 8M | 06-Feb-2012 15:34 |
PDL for impatient IDL users_ Craig DeForest_ 2006_ switchers.pdf | 188K | 25-Oct-2011 02:25 |
PDL_ Scientific Programming in Perl_ 2001.pdf | 2M | 25-Oct-2011 02:25 |
Packet Guide to Routing and Switching_ Bruce Hartpence_ 2011.pdf | 7M | 10-Sep-2011 04:54 |
Perl & LWP_ Sean M Burke_ 2002.chm | 657K | 15-Aug-2011 07:18 |
Perl Cheat-Sheet_ 2010.pdf | 209K | 25-Nov-2023 22:08 |
Perl Cookbook_ 2nd Ed_ Tom Christiansen_ 2003.chm | 2M | 14-Jul-2011 06:02 |
Perl Medic_ Transforming Legacy Code_ Peter J Scott_ 2004.chm | 1M | 14-Jul-2011 05:47 |
Perl Moose_ A Guide to the Revolution_ Ricardo Signes_ 2011.pdf | 7M | 26-Jul-2011 19:08 |
Physical principles of microwave assisted magnetic recording_ K Rivkin_ M Benakli_ N Tabat_ H Yin_ AIP 2014.pdf | 2M | 07-Dec-2018 19:36 |
Physical random bit generation from chaotic solitary laser diode_ arxiv14063005.pdf | 410K | 15-Jun-2014 06:35 |
Practical Text Mining with Perl_ Roger Bilisoly_ 2008.pdf | 17M | 15-Aug-2011 07:12 |
Predicting, Decrypting, and Abusing WPA2 80211 Group Keys_ Mathy Vanhoef_ Frank Piessens_ 2016.pdf | 983K | 16-Oct-2017 00:38 |
Principles of Uncertainty.pdf | 3M | 24-May-2011 10:56 |
Programming Perl_ Larry Wall_ Tom Christiansen_ Jon Orwant_2000.chm | 2M | 17-Mar-2023 06:05 |
Programming from the Ground Up_ Jonathan Bartlett_ 2003.pdf | 1M | 05-Apr-2012 17:17 |
Purely Functional Data Structures_ Chris Okasaki_ 1999.djvu | 2M | 15-Nov-2011 16:05 |
Quantum Computing since Democritus_ Scott Aaronson_ 2013.pdf | 3M | 20-Jul-2013 00:27 |
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis_ Daniel Genkin_ Adi Shamir_ Eran Tromer_ 2013.pdf | 8M | 18-Dec-2013 19:16 |
Report on Smartphone Encryption and Public Safety_ Manhattan District Attorneys Office_ 2015.pdf | 666K | 22-Nov-2015 18:53 |
Reverse Engineering x86 Processor Microcode_ P Koppe et al_ sec17_ 2017 .pdf | 2M | 01-Sep-2017 09:13 |
Reversing Stealthy Dopant-Level Circuits_ T Sugawara_ D Suzuki_ R Fujii_ S Tawa_ R Hori_ M Shiozaki_ T Fujino_ IACR 2..> | 6M | 04-Jul-2014 05:29 |
Ring Confidential Transactions_ Anonymous Blockchain Cryptocurrencies_ Shen Noether_ 2015.pdf | 489K | 01-Sep-2016 01:22 |
SATAn_ Air-Gap Exfiltration Attack via Radio Signals From SATA Cables_ Mordechai Guri_arxiv2207.07413.pdf | 10M | 18-Jul-2022 17:48 |
Scientific Computing_ An Introductory Survey_ Michael T Heath_ 1997.pdf | 2M | 25-Oct-2011 23:06 |
Screaming Channels_ When Eletromagnetic Side Channels Meet Radio Transceivers_ G Camurati_ S Poeplau_ M Muench_ T Hay..> | 4M | 26-Jul-2018 20:32 |
Scripting Languages Compared_ PHP Perl Python Ruby_Hyperpolyglot.html | 338K | 16-Aug-2011 05:13 |
Security and Privacy Vulnerabilities of In-Car Wireless Networks_ A Tire Pressure MOnitoring System Case Study_ Ivan ..> | 1M | 03-Nov-2013 08:33 |
Simulating Analyzing and Animating Dynamical Systems_ A Guide to XPPAUT for Researchers and Students_ Bard Ermentrout..> | 3M | 25-Aug-2011 04:06 |
Stealing Keys from PCs using a Radio_ Cheap Electromagnetic Attacks on WIndowed Exponentiation_ D Genkin_ L Pachmanov..> | 2M | 30-Mar-2017 01:39 |
Stealthy Dopant-Level Hardware Trojans_ George T Becker_ Francessco Regazzoni_ Christof Paar_ Wayne P Burleson_ 2013.pdf | 433K | 14-Sep-2013 16:50 |
StegTorrent_ a Steganographic Method for P2P File Sharing Service_ arxiv13034264.pdf | 685K | 14-Aug-2013 02:43 |
Structure and Interpretation of Computer Programs_ 2nd Ed_ Harold Abelson_ 1996.pdf | 4M | 07-Aug-2011 00:27 |
Survey of Text Mining_ Clustering Classification and Retrieval_ Michael W Berry_ 2003.pdf | 6M | 15-Aug-2011 07:08 |
Survey of Text Mining_ II_ Clustering Classification and Retrieval_ Michael W Berry_ Malu Castellanos_ 2007.pdf | 3M | 15-Aug-2011 07:09 |
TRESOR-HUNT_ Attacking CPU-Bound Encryption_ Erik-Oliver Blass_ William Robertson_ 2012.pdf | 246K | 25-Feb-2016 13:21 |
Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks_ R Rasti_ M Murthy_ N Weaver_ V Paxson_ 201..> | 1M | 22-Jul-2016 09:51 |
Text Mining_ Applications and Theory_ Michael W Berry_ Jacob Kogan_ 2010.pdf | 2M | 15-Aug-2011 07:09 |
Text Mining_ Classification Clustering and Applications_ Ashok Srivastava_ Mehran Sahami_ 2009.pdf | 4M | 15-Aug-2011 07:12 |
The Algorithm Design Manual_ 2nd Ed_ Steven S Skiena_ 2008.pdf | 4M | 31-Aug-2011 04:57 |
The Algorithmic Beauty of Plants _ Przemyslaw Prusinkiewicz_ Aristid Lindenmayer_ 1990.pdf | 16M | 05-Feb-2020 19:17 |
The Art of Computer Programming_ Vol 1_ Fundamental Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu | 5M | 25-Oct-2011 22:53 |
The Art of Computer Programming_ Vol 2_ Seminumerical Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu | 7M | 25-Oct-2011 22:52 |
The Art of Computer Programming_ Vol 3_ Sorting and Searching_ Donald E Knuth_ 1973.djvu | 7M | 25-Oct-2011 22:55 |
The Complete ESP8266 Psionics Handbook_ Thotcon 2016.pdf | 6M | 23-Jun-2016 05:24 |
The Elements of Computing Systems_ Building a Modern Computer from First Principles_ Noam Nisan_ Shimon Schocken_ 200..> | 4M | 04-Apr-2012 21:01 |
The Genuine Sieve of Eratosthenes_ M E ONeill_ 2009.pdf | 217K | 25-Mar-2018 14:50 |
The Inevitability of Failure_ The Flawed Assumption of Security in Modern Computing Environments_ Peter A Loscocco_ S..> | 98K | 31-Oct-2019 21:55 |
The Linux Programming Interface_ A Linux and UNIX System Programming Handbook_ Michael Kerrisk_ 2010.pdf | 7M | 15-Aug-2011 06:50 |
The Tangled Web_ A Guide to Securing Modern Web Applications_ Michal Zalewski_ 2011.epub | 2M | 17-Oct-2012 19:10 |
The Text Mining Handbook_ Advanced Approaches in Analyzing Unstructured Data_ Ronen Feldman_ James Sanger_ 2006.pdf | 5M | 15-Aug-2011 07:07 |
The Theory of Matrices_ With Applications_ 2nd Ed_ Peter Lancaster_ Miron Tismenetsky_ 1985.djvu | 5M | 15-Jul-2011 07:41 |
The mass-energy-information equivalence principle_ Melvin M Vopson_ AIP Advances 2019.pdf | 2M | 15-Feb-2022 04:33 |
This World of Ours_ Threat Models_ James Mickens_ usenix 2014.pdf | 2M | 05-May-2024 17:53 |
Top 10 algorithms in data mining_ X Wu_ V Kumar_ J R Quinlan_ J Ghosh_ Q Yang_ H Motoda_ 2007.pdf | 783K | 19-Dec-2012 02:44 |
Tor_ The Second-Generation Onion Router_ R Dingledine_ N Mathewson_ P Syverson.pdf | 171K | 03-Feb-2016 01:42 |
Transparent Firewall_ Filtering Bridge_ pfSense 2_ William Tarrh_ 2013.pdf | 375K | 30-Dec-2016 10:06 |
Tutorial on Diffusion Models for Imaging and Vision_ arxiv2403.18103v2.pdf | 4M | 11-Sep-2024 03:15 |
UEFI_ Unified Extensible Firmware Interface Specification_ 2v5_ 2015.pdf | 20M | 07-Mar-2017 15:37 |
UNIX Network Programming_ Vol 2_ Interprocess Communications_ 2nd Ed_ W Richard Stevens_ 1998.djvu | 6M | 15-Aug-2011 07:00 |
USBee_ Air-Gate Convert-Channel via Electromagnetic Emissions form USB_ M Guri_ M Monitz_ Y Elovici_ 2016.pdf | 1017K | 06-Sep-2016 13:46 |
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations_ C V Wright_ L Ballard_ S E Coull_ F Monrose_ G M ..> | 2M | 28-Sep-2012 23:32 |
Understanding FFT Applications_ 2nd ed_ Anders E Zonst_ 2004.djvu | 3M | 19-Jan-2014 18:57 |
Understanding IPv6_ Youngsong Mun_ Hyewon Keren Lee_ 2005.pdf | 16M | 01-Sep-2011 10:38 |
Understanding Linux Network Internals_ Christian Benvenuti_ 2006.pdf | 18M | 15-Aug-2011 06:59 |
Understanding the Linux Kernel_ 3rd Ed_ Daniel P Bovet_ Marco Cesati_ 2005.pdf | 5M | 15-Aug-2011 06:58 |
Understanding the bin, sbin, usr_bin , usr_sbin split.html | 6917 | 28-Jan-2012 08:42 |
Unix Network Programming_ Vol 1_ The Sockets Networking API_ 3rd Ed_ W Richard Stevens_ 2003.chm | 5M | 15-Aug-2011 06:40 |
Unix as IDE_ Tom Ryder_ 2012.epub | 501K | 27-Feb-2020 23:30 |
Using Perl for Statistics_ Data Processing and Statistical Computing_ v11i01.pdf | 1M | 01-Mar-2011 00:20 |
Vi for nano users_ Markus Schnalke.pdf | 7561 | 05-Mar-2013 18:25 |
Visualizing and Understanding Convolutional Networks_ arxiv1311.2901.pdf | 35M | 10-Aug-2023 20:52 |
WHOIS running the Internet_ protocol policy and privacy_ Garth O Bruen_ 2015.pdf | 10M | 13-Jan-2023 17:55 |
Web_ Graphics_ Perl TK_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf | 4M | 14-Jul-2011 05:55 |
What Happens When A CPU Starts_ bit68.txt | 8078 | 11-Jan-2023 23:09 |
What Is EPUB 3_ Matt Garrish_ 2011.pdf | 399K | 10-Oct-2011 15:19 |
Writing Linux Device Drivers_ a guide with exercises_ Dr Jerry Cooperstein_ 2009.pdf | 18M | 15-Aug-2011 06:54 |
You Can Type, but You Cant Hide_ A Stealthy GPU-based Keylogger_ E Ladakis_ L Koromilas_ G Vasiliadis_ M Polychronaki..> | 345K | 15-Sep-2013 10:08 |
Zero Reserve_ A Distributed Exchange Platform_ anu_ 2013.pdf | 124K | 19-Dec-2013 14:03 |
bash-tricks.txt | 7191 | 22-Jan-2020 20:25 |
dot-com_zonefile_access_request_form.pdf | 939K | 08-May-2018 02:15 |
ePub Straight to the Point_ Elizabeth Castro_ 2010.pdf | 7M | 25-Mar-2012 18:30 |
grep awk and sed_ three VERY useful command-line utilities_ Matt Probert_ 2016.pdf | 99K | 02-Feb-2021 17:12 |
nooshare cryptocurrency_ overview_ 2012.pdf | 307K | 19-Feb-2012 03:58 |
pci21.pdf | 3M | 28-Jul-2011 12:56 |
pci23.pdf | 4M | 28-Jul-2011 12:56 |
spiPhone_ Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers_ P Traynor et al_ 2011.pdf | 610K | 27-Sep-2013 18:53 |