Index of /library/Computing/

File NameFile SizeDate
Parent directory/--
transformers/-02-Oct-2023 17:46
2014 Internet Peering Playbook.epub 8M21-Oct-2016 19:08
A Discipline of Programming_ Edsger Dijkstra_ 1976.djvu 2M25-Oct-2011 22:59
A Large-Scale Study of Flash Memory Failures in the Field_ Facebook 2015.pdf 6M24-Jun-2015 09:51
A Peek on Numerical Programming in Perl and Python_ E Christopher Dyken_ 2005.pdf 100K24-Oct-2011 01:35
A Primer on Scientific Programming with Python_ 2nd Ed_ Hans Petter Langtangen_ 2011.pdf 5M25-Oct-2011 23:01
A2_ Analog Malicious Hardware_ K Yang_ M Hicks_ Q Dong_ T Austin_ D Sylvester_ 2016.pdf 3M25-May-2016 15:40
AIR-FI_ Generating Covert Wi-Fi Signals from Air-Gapped Computers_ Mordechai Guri_ arxiv2012.06884.pdf 7M15-Dec-2020 19:54
ASLR on the Line_ Practical Cache Attacks on the MMU_ Ben Gras_ Kaveh Razavi_ Erik Bosman_ Herbert Bos_ Cristiano Giu..> 771K15-Feb-2017 16:27
Abrupt rise of new machine ecology beyond human response time_ Neil Johnson_ Guannan Zhao_ Eric Hunsader_ Hong Qi_ Ni..> 1M13-Sep-2013 11:49
Accessible EPUB 3_ Matt_Garrish_ 2012.pdf 3M25-Mar-2012 18:23
Accessorize to a Crime_ Real and Stealthy Attacks on State-of-the-Art Face Recognition_ Mahmood Sharif_ Sruti Bhagava..> 4M02-Nov-2016 19:10
Against the Law_ Countering Lawful Abuses of Digital Surveillance_ Andrew bunnie Huang_ Edward Snowden_ 2016.pdf 8M08-Sep-2016 08:41
All Your GPS Are Belong To Us_ Towards Stealthy Manipulation of Road Navigation Systems_ K Zeng_ S Liu_ Y Shu_ D Wang..> 4M23-Jul-2018 02:01
An Analysis of Chinas Great Cannon_ Marczak et al_ foci 2015.pdf 695K05-Sep-2015 05:53
An Industrial-Strength Audio Search Algorithm_ Avery Li-Chun Wang_ Shazam.pdf 477K17-Jul-2015 22:31
Applied Mathematical Programming_ Stephen P Bradley_ Arnoldo C Hax_ Thomas L Magnanti_ 1977.pdf 35M25-Oct-2011 22:58
Automating System Administration with Perl_ Tools to Make You More Efficient_ David N Blank-Edelman_ 2009.epub 2M14-Jul-2011 05:44
BADFET_ Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection_ A Cui_ R Housley_ 201..> 14M03-Sep-2018 15:24
Beginning PDL_ Xavier Calbet_ 2001.pdf 422K25-Oct-2011 02:23
Bitcoin and Cryptocurrency Technologies_ A Narayanan_ J Bonneau E Felten_ A Miller_ S Goldfeder_ 2016.pdf 18M10-Feb-2016 17:39
Bitcoin_ A Peer-to-Peer Electronic Cash System_ Satoshi Nakamoto.pdf 180K27-Sep-2011 10:24
Breaking and Improving Protocol Obfuscation_ Erik Hjelmvik_ Wolfgang John_ 2010.pdf 682K05-May-2012 13:03
Cheatsheets for Authentication and Key Agreements in 2G, 3G, 4G, and 5G_ arxiv2107.07416.pdf 1M26-Jul-2021 21:13
Circuit Fingerprinting Attacks_ Passive Deanonymization of Tor Hidden Services_ Albert Kwon_ Mashael AlSabah_ David L..> 523K22-Sep-2015 16:56
Computer Algebra Recipes for Mathematical Physics_ Richard H Enns_ 2004.pdf 4M25-Oct-2011 22:56
Computer Methods for Ordinary Differential Equations and Differential-Algebraic Equations_ L R Petzold_ SIAM Society ..> 2M27-Feb-2012 12:07
Computer Science from the Bottom Up_ Ian Wienand_ 2016.pdf 996K29-Dec-2019 03:06
Concrete Mathematics_ A Foundation for Computer Science_ 2nd Ed_ Ronald L Graham_ Donald E Knuth_ Oren Patashnik_ 199..> 5M25-Oct-2011 23:04
Crowd Counting Through Walls Using WiFi_ S Depatla_ Y Mostofi_ Percom 2018.pdf 2M27-Sep-2018 21:15
Cryptographically secure shields_ J M Cioranesco_ J L Danger_ T Graba_ S Guilley_ Y Mathieu_ D Naccache_ X T Ngo_ HST..> 1M14-Sep-2016 12:07
CyberWarfare CyberComplacency_ is hollywoods blueprint for chaos coming true_ Mark Osborne_ 2013.pdf 15M22-Sep-2016 21:34
DNS & BIND Cookbook_ Cricket Liu.chm 576K15-Aug-2011 07:01
DNS and BIND on IPv6_ Cricket Liu_ 2011.pdf 4M15-Aug-2011 07:00
DNS and BIND_ 5th Ed_ Cricket Liu_ Paul Albitz_ 2006.chm 2M15-Aug-2011 06:53
DeDRM_tools_10.0.2.zip 458K10-Jan-2022 05:45
Decentralized Anonymous Credentials_ Christina Garman_ Matthew Green_ Ian Miers_ 2013.pdf 595K04-Nov-2013 03:21
Dedup Est Machina_ Memory Deduplication as an Advanced Exploitation Vector_ E Bosman_ K Razavi_ H Bos_ C Giuffrida_ s..> 547K28-May-2016 08:25
Digital Design_ Verilog_ An Embedded Systems Approach Using Verilog_ Peter J Ashenden_ 2007.pdf 2M03-Jan-2013 04:37
Digital Signal Processing using Stream High Performance Computing_ A 512-Input Broadband Correlator for Radio Astrono..> 6M08-Jun-2015 22:41
DiskFiltration_ Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise_ arxiv160803431v1..> 3M12-Aug-2016 16:35
Effective Perl Programming_ Ways to Write Better More Idiomatic Perl_ 2nd Ed_ Joseph N Hall_ Joshua A McAdams_ brian ..> 2M14-Jul-2011 05:56
Effective awk Programming_ 3rd Ed_ Arnold Robbins_ 2001.pdf 2M15-Aug-2011 06:51
Efficient BackProp_ Yann LeCun_ Leon Bottou_ Genevieve B Orr_ Klaus-Rober Muller_ 1998.pdf 500K22-Mar-2013 08:05
Encyclopedia of Distances_ Michel M Deza_ Elena Deza_ 2009.pdf 4M25-Apr-2023 04:33
Equation Group_ Questions and Answers_ HDD Firmware Trojans_ ver 15_ Kaspersky 2015.pdf 4M09-Nov-2016 06:58
Error Characterization, Mitigation, and Recovery in Flash Memory Based Solid-State Drives_ Yu Cai_ Saugata Ghose_ Eri..> 5M22-Jul-2023 23:21
Essential Linux Device Drivers_ Sreekrishnan Venkateswaran_ 2008.chm 4M15-Aug-2011 06:55
FM 99.9 Radio Virus_ Exploiting FM Radio Broadcasts for Malware Deployment_ E Fernandes_ B Crispo_ M Conti_ 2013.pdf 750K03-Dec-2015 00:34
Fansmitter_ Acoustic Data Exfiltration from Speakerless Air-Gapped Computers_ Mordechai Guri_ Yosef Solewicz_ Andrey ..> 2M27-Jun-2016 23:24
Fast Microwave Logic Circuits_ D J Blattner_ F Sterzer_ 1959.pdf 3M18-Jul-2019 20:44
Fast String Searching_ Andrew Hume_ Daniel Sunday_ 1991.pdf 204K09-Aug-2011 17:06
Flash Reliability in Production_ The Expected and the Unexpected_ B Schroeder_ R Lagisetty_ A Merchent_ Google_ 2016.pdf 2M13-Mar-2016 03:44
Flipping Bits in Memory Without Accessing Them_ An Experimental Study of DRAM Disturbance Errors_ Yoongu Kim_ Ross Da..> 828K24-Dec-2014 00:12
Forced Decryption as a Foregone Conclusion_ Dan Terzian_ 2015.pdf 217K21-Mar-2017 02:25
Forensic Analysis and Anonymisation of Printed Documents_ T Richter_ S Escher_ D Schonfeld_ T Strufe_ 2018.pdf 1M28-Jun-2018 17:39
Fundamentals of Scientific Computing_ Bertil Gustafsson_ 2011.pdf 4M15-Jul-2011 06:15
Furby source code_ D Hampton_ W Shulz_ 1998.pdf 6M13-Aug-2018 20:12
Games Diversions & Perl Culture_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf 4M14-Jul-2011 05:50
Hacking the Cable Modem_ Ryan Harris_ 2006.pdf 16M19-Jan-2014 19:04
Higher-Order Perl_ Mark Jason Dominus.epub 2M06-Jan-2013 06:53
Higher-Order Perl_ Transforming Programs with Programs_ Mark Jason Dominus_ 2005.pdf 2M14-Jul-2011 05:48
Honeypots_ A New Paradigm to Information Security_ R C Joshi_ Anjali Sardana_ 2011.pdf 4M05-Oct-2011 00:44
IEMI Threats for Information Security_ Remote Command Injection on Modern Smartphones_ Chaouki Kasmi_ Jose Lopes Este..> 239K18-Oct-2015 04:08
IPv6 Address Planning_ Designing an Address Plan for the Future_ Tom Coffeen_ 2014.pdf 14M29-Oct-2019 03:46
IPv6 Essentials_ 3rd Ed_ Integrating IPv6 into Your IPv4 Network_ Silvia Hagen_2014.pdf 16M29-Oct-2019 03:45
Imperfect Forward Secrecy_ How Diffie-Hellman Fails in Practice_ D Adrian_ K Bhargavan_ Z Curumeric_ P Gaudry_ M Gree..> 1M15-Oct-2015 03:47
Inferring Persistent Interdomain Congestion_ A Dhamdhere_ D D Clark_ A Gamero-Garrido_ M Luckie_ R K P Mok_ G Akiwate..> 1M27-Aug-2018 18:28
Inside the Machine_ An Illustrated Introduction to Microprocessors and Computer Architecture_ Jon Stokes_ 2006.pdf 10M27-Nov-2013 06:44
Instruction latencies and throughput for AMD and Intel x86 processors_ Torbjorn Granlund_ 2017.pdf 204K04-Jun-2017 18:25
Intel ME - Two Years Later_ Igor Skochinsky_ 2014.pdf 1M11-Nov-2016 10:03
Introduction to Algorithms_ 3rd Ed_ Thomas H Cormen_ Charles E Leiserson_ Ronald L Rivest_ Clifford Stein_ 2009.pdf 5M31-Aug-2011 05:33
Introduction to Automata Theory_ Languages_ and Computation_ 2nd Ed_ John E Hopcroft_ Rajeev Motwani_ Jeffrey D Ullma..> 16M31-Aug-2011 05:30
Introduction to Scientific Programming and Simulation using R_ Owen Jones_ Robert Maillardet_ Andrew Robinson_ 2009.pdf 8M25-Oct-2011 23:05
Introduction to Scilab_ 2010.pdf 1M25-Oct-2011 02:38
Introduction to the Theory of Computation_ 2nd Ed_ Michael Sipser_ 2005.djvu 5M12-Aug-2011 00:50
Invisible Mask_ Practical Attacks on Face Recognition with Infrared_ arxiv180304683.pdf 3M27-Mar-2018 22:03
Joe Pardue - C Programming For Microcontrollers.pdf 4M21-Nov-2011 21:04
Key Extraction Using Thermal Laser Stimulation_ A Case Study on Xilinx Ultrascale FPGAs_ H Lohrke_ S Tajik_ T Krachen..> 6M23-Jun-2019 20:43
Key Reinstallation Attacks_ Forcing Nonce Reuse in WPA2_ Mathy Vanhoef_ Frank Piessens_ 2017.pdf 627K17-Oct-2017 04:09
Keystroke Recognition Using WiFi Signals_ Kamran Ali_ Alex X Liu_ Wei Wang_ Muhammad Shahzad_ 2015.pdf 1M25-Aug-2016 04:18
LED-it-GO_ Leaking a lot of Data from Air-Gapped Computers via the HDD LED_ M Guri_ B Zadov_ E Atias_ Y Elovici_ 2017..> 2M27-Feb-2017 15:13
LIRA_ Lightweight Incentivized Routing for Anonymity_ Rob Jasen_ Aaron Johnson_ Paul Syverson_ US-NRL 2013.pdf 1M21-Sep-2013 20:30
Learning Perl Tk_ Graphical User Interfaces with Perl_ Nancy Walsh_ 1999.pdf 4M14-Jul-2011 05:52
Learning Perl_ 6th Edition_ Randal L Schwartz_ Brian D Foy_ Tom Phoenix_ 2011.pdf 8M14-Jul-2011 05:45
Learning to Win by Reading Manuals in a Monte-Carlo Framework_ S R K Branavan_ D Silver_ R Barzilay_ acl_2011.pdf 359K02-Jan-2012 01:59
Lest We Remember_ Cold Boot Attacks on Encryption Keys_ J A Halderman_ S D Schoen_ N Heniger_ W Clarkson_ W Paul_ J A..> 3M05-Nov-2014 23:13
Light Commands_ Laser-Based Audio Injection Attacks on Voice-Controllable Systems_ T Sugawara_ B Cyr_ S Rampazzi_ D G..> 5M05-Nov-2019 00:57
Linux Device Drivers_ 3rd Ed_ Jonathan Corbet_ 2005.pdf 12M15-Aug-2011 06:56
Listening through a Vibration Motor_ N Roy_ R R Choudhury_ 2016.pdf 2M27-Feb-2018 05:41
Magnetic Recording_ Stella Wu_ Seagate Technology_ 2014.pdf 13M01-Oct-2018 19:15
Mastering Perl Tk_ Stephen O Lidie_ Nancy Walsh_ 2002.chm 3M14-Jul-2011 05:46
Mastering Perl for Bioinformatics_ James D Tisdall_ 2003.chm 717K15-Aug-2011 07:14
Mastering Perl_ Brian D Foy_ 2007.pdf 7M15-Aug-2011 07:19
Mathematical Introduction to Linear Programming and Game Theory_ Louis Brickman_ 1998.djvu 955K25-Oct-2011 22:59
Mathematical Structures for Computer Science_ A Modern Treatment of Discrete Mathematics_ 5th Ed_ Judith L Gersting_ ..> 7M25-Oct-2011 23:02
Matplotlib for Python Developers_ Sandro Tosi_ 2009.pdf 12M02-Sep-2012 10:12
Methods in Medical Informatics_ Fundamentals of Healthcare Programming in Perl, Python, and Ruby_ Jules J Berman_ 201..> 6M25-Oct-2011 22:58
Minimal Perl For UNIX and Linux People_ Tim Maher_ 2007.pdf 6M30-Nov-2017 05:38
Modern Perl_ Chromatic_ 2010.pdf 2M14-Jul-2011 05:42
Modern Perl_ Chromatic_ 2012.pdf 1M29-Feb-2012 02:35
Modern Perl_ Chromatic_ 2014.pdf 791K06-Nov-2015 14:23
Numerical Recipes_ The Art of Scientific Computing_ 3rd Ed_ William H Press_ Saul A Teukolsky_ William T Vetterling_ ..> 20M15-Jul-2011 07:43
ODINI_ Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields_ arxiv180202700.pdf 1020K10-Feb-2018 21:52
On Covert Acoustical Mesh Networks in Air_ Michael Hanspach_ Michael Goetz_ 2013.pdf 3M25-Nov-2013 18:18
On Rationomics_ An Analysis into the Workings of a Bit Torrent Trackers Economy and Its Composition_ oorza_ 2008.pdf 104K19-Mar-2012 02:25
P might equal NP_ Scott Aaronson_ 2016.pdf 928K05-Jan-2017 13:05
PCI.Local.Bus.Specification.Revision.3.0.pdf 3M28-Jul-2011 12:56
PCI_22.pdf 4M28-Jul-2011 12:57
PDL Book_ 2012-02-05.pdf 8M06-Feb-2012 15:34
PDL for impatient IDL users_ Craig DeForest_ 2006_ switchers.pdf 188K25-Oct-2011 02:25
PDL_ Scientific Programming in Perl_ 2001.pdf 2M25-Oct-2011 02:25
Packet Guide to Routing and Switching_ Bruce Hartpence_ 2011.pdf 7M10-Sep-2011 04:54
Perl & LWP_ Sean M Burke_ 2002.chm 657K15-Aug-2011 07:18
Perl Cookbook_ 2nd Ed_ Tom Christiansen_ 2003.chm 2M14-Jul-2011 06:02
Perl Medic_ Transforming Legacy Code_ Peter J Scott_ 2004.chm 1M14-Jul-2011 05:47
Perl Moose_ A Guide to the Revolution_ Ricardo Signes_ 2011.pdf 7M26-Jul-2011 19:08
Physical principles of microwave assisted magnetic recording_ K Rivkin_ M Benakli_ N Tabat_ H Yin_ AIP 2014.pdf 2M07-Dec-2018 19:36
Physical random bit generation from chaotic solitary laser diode_ arxiv14063005.pdf 410K15-Jun-2014 06:35
Practical Text Mining with Perl_ Roger Bilisoly_ 2008.pdf 17M15-Aug-2011 07:12
Predicting, Decrypting, and Abusing WPA2 80211 Group Keys_ Mathy Vanhoef_ Frank Piessens_ 2016.pdf 983K16-Oct-2017 00:38
Principles of Uncertainty.pdf 3M24-May-2011 10:56
Programming Perl_ Larry Wall_ Tom Christiansen_ Jon Orwant_2000.chm 2M17-Mar-2023 06:05
Programming from the Ground Up_ Jonathan Bartlett_ 2003.pdf 1M05-Apr-2012 17:17
Purely Functional Data Structures_ Chris Okasaki_ 1999.djvu 2M15-Nov-2011 16:05
Quantum Computing since Democritus_ Scott Aaronson_ 2013.pdf 3M20-Jul-2013 00:27
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis_ Daniel Genkin_ Adi Shamir_ Eran Tromer_ 2013.pdf 8M18-Dec-2013 19:16
Report on Smartphone Encryption and Public Safety_ Manhattan District Attorneys Office_ 2015.pdf 666K22-Nov-2015 18:53
Reverse Engineering x86 Processor Microcode_ P Koppe et al_ sec17_ 2017 .pdf 2M01-Sep-2017 09:13
Reversing Stealthy Dopant-Level Circuits_ T Sugawara_ D Suzuki_ R Fujii_ S Tawa_ R Hori_ M Shiozaki_ T Fujino_ IACR 2..> 6M04-Jul-2014 05:29
Ring Confidential Transactions_ Anonymous Blockchain Cryptocurrencies_ Shen Noether_ 2015.pdf 489K01-Sep-2016 01:22
SATAn_ Air-Gap Exfiltration Attack via Radio Signals From SATA Cables_ Mordechai Guri_arxiv2207.07413.pdf 10M18-Jul-2022 17:48
Scientific Computing_ An Introductory Survey_ Michael T Heath_ 1997.pdf 2M25-Oct-2011 23:06
Screaming Channels_ When Eletromagnetic Side Channels Meet Radio Transceivers_ G Camurati_ S Poeplau_ M Muench_ T Hay..> 4M26-Jul-2018 20:32
Scripting Languages Compared_ PHP Perl Python Ruby_Hyperpolyglot.html 338K16-Aug-2011 05:13
Security and Privacy Vulnerabilities of In-Car Wireless Networks_ A Tire Pressure MOnitoring System Case Study_ Ivan ..> 1M03-Nov-2013 08:33
Simulating Analyzing and Animating Dynamical Systems_ A Guide to XPPAUT for Researchers and Students_ Bard Ermentrout..> 3M25-Aug-2011 04:06
Stealing Keys from PCs using a Radio_ Cheap Electromagnetic Attacks on WIndowed Exponentiation_ D Genkin_ L Pachmanov..> 2M30-Mar-2017 01:39
Stealthy Dopant-Level Hardware Trojans_ George T Becker_ Francessco Regazzoni_ Christof Paar_ Wayne P Burleson_ 2013.pdf 433K14-Sep-2013 16:50
StegTorrent_ a Steganographic Method for P2P File Sharing Service_ arxiv13034264.pdf 685K14-Aug-2013 02:43
Structure and Interpretation of Computer Programs_ 2nd Ed_ Harold Abelson_ 1996.pdf 4M07-Aug-2011 00:27
Survey of Text Mining_ Clustering Classification and Retrieval_ Michael W Berry_ 2003.pdf 6M15-Aug-2011 07:08
Survey of Text Mining_ II_ Clustering Classification and Retrieval_ Michael W Berry_ Malu Castellanos_ 2007.pdf 3M15-Aug-2011 07:09
TRESOR-HUNT_ Attacking CPU-Bound Encryption_ Erik-Oliver Blass_ William Robertson_ 2012.pdf 246K25-Feb-2016 13:21
Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks_ R Rasti_ M Murthy_ N Weaver_ V Paxson_ 201..> 1M22-Jul-2016 09:51
Text Mining_ Applications and Theory_ Michael W Berry_ Jacob Kogan_ 2010.pdf 2M15-Aug-2011 07:09
Text Mining_ Classification Clustering and Applications_ Ashok Srivastava_ Mehran Sahami_ 2009.pdf 4M15-Aug-2011 07:12
The Algorithm Design Manual_ 2nd Ed_ Steven S Skiena_ 2008.pdf 4M31-Aug-2011 04:57
The Algorithmic Beauty of Plants _ Przemyslaw Prusinkiewicz_ Aristid Lindenmayer_ 1990.pdf 16M05-Feb-2020 19:17
The Art of Computer Programming_ Vol 1_ Fundamental Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu 5M25-Oct-2011 22:53
The Art of Computer Programming_ Vol 2_ Seminumerical Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu 7M25-Oct-2011 22:52
The Art of Computer Programming_ Vol 3_ Sorting and Searching_ Donald E Knuth_ 1973.djvu 7M25-Oct-2011 22:55
The Complete ESP8266 Psionics Handbook_ Thotcon 2016.pdf 6M23-Jun-2016 05:24
The Elements of Computing Systems_ Building a Modern Computer from First Principles_ Noam Nisan_ Shimon Schocken_ 200..> 4M04-Apr-2012 21:01
The Genuine Sieve of Eratosthenes_ M E ONeill_ 2009.pdf 217K25-Mar-2018 14:50
The Inevitability of Failure_ The Flawed Assumption of Security in Modern Computing Environments_ Peter A Loscocco_ S..> 98K31-Oct-2019 21:55
The Linux Programming Interface_ A Linux and UNIX System Programming Handbook_ Michael Kerrisk_ 2010.pdf 7M15-Aug-2011 06:50
The Tangled Web_ A Guide to Securing Modern Web Applications_ Michal Zalewski_ 2011.epub 2M17-Oct-2012 19:10
The Text Mining Handbook_ Advanced Approaches in Analyzing Unstructured Data_ Ronen Feldman_ James Sanger_ 2006.pdf 5M15-Aug-2011 07:07
The Theory of Matrices_ With Applications_ 2nd Ed_ Peter Lancaster_ Miron Tismenetsky_ 1985.djvu 5M15-Jul-2011 07:41
The mass-energy-information equivalence principle_ Melvin M Vopson_ AIP Advances 2019.pdf 2M15-Feb-2022 04:33
Top 10 algorithms in data mining_ X Wu_ V Kumar_ J R Quinlan_ J Ghosh_ Q Yang_ H Motoda_ 2007.pdf 783K19-Dec-2012 02:44
Tor_ The Second-Generation Onion Router_ R Dingledine_ N Mathewson_ P Syverson.pdf 171K03-Feb-2016 01:42
Transparent Firewall_ Filtering Bridge_ pfSense 2_ William Tarrh_ 2013.pdf 375K30-Dec-2016 10:06
UEFI_ Unified Extensible Firmware Interface Specification_ 2v5_ 2015.pdf 20M07-Mar-2017 15:37
UNIX Network Programming_ Vol 2_ Interprocess Communications_ 2nd Ed_ W Richard Stevens_ 1998.djvu 6M15-Aug-2011 07:00
USBee_ Air-Gate Convert-Channel via Electromagnetic Emissions form USB_ M Guri_ M Monitz_ Y Elovici_ 2016.pdf 1017K06-Sep-2016 13:46
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations_ C V Wright_ L Ballard_ S E Coull_ F Monrose_ G M ..> 2M28-Sep-2012 23:32
Understanding FFT Applications_ 2nd ed_ Anders E Zonst_ 2004.djvu 3M19-Jan-2014 18:57
Understanding IPv6_ Youngsong Mun_ Hyewon Keren Lee_ 2005.pdf 16M01-Sep-2011 10:38
Understanding Linux Network Internals_ Christian Benvenuti_ 2006.pdf 18M15-Aug-2011 06:59
Understanding the Linux Kernel_ 3rd Ed_ Daniel P Bovet_ Marco Cesati_ 2005.pdf 5M15-Aug-2011 06:58
Understanding the bin, sbin, usr_bin , usr_sbin split.html 691728-Jan-2012 08:42
Unix Network Programming_ Vol 1_ The Sockets Networking API_ 3rd Ed_ W Richard Stevens_ 2003.chm 5M15-Aug-2011 06:40
Unix as IDE_ Tom Ryder_ 2012.epub 501K27-Feb-2020 23:30
Using Perl for Statistics_ Data Processing and Statistical Computing_ v11i01.pdf 1M01-Mar-2011 00:20
Vi for nano users_ Markus Schnalke.pdf 756105-Mar-2013 18:25
Visualizing and Understanding Convolutional Networks_ arxiv1311.2901.pdf 35M10-Aug-2023 20:52
WHOIS running the Internet_ protocol policy and privacy_ Garth O Bruen_ 2015.pdf 10M13-Jan-2023 17:55
Web_ Graphics_ Perl TK_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf 4M14-Jul-2011 05:55
What Happens When A CPU Starts_ bit68.txt 807811-Jan-2023 23:09
What Is EPUB 3_ Matt Garrish_ 2011.pdf 399K10-Oct-2011 15:19
Writing Linux Device Drivers_ a guide with exercises_ Dr Jerry Cooperstein_ 2009.pdf 18M15-Aug-2011 06:54
You Can Type, but You Cant Hide_ A Stealthy GPU-based Keylogger_ E Ladakis_ L Koromilas_ G Vasiliadis_ M Polychronaki..> 345K15-Sep-2013 10:08
Zero Reserve_ A Distributed Exchange Platform_ anu_ 2013.pdf 124K19-Dec-2013 14:03
bash-tricks.txt 719122-Jan-2020 20:25
dot-com_zonefile_access_request_form.pdf 939K08-May-2018 02:15
ePub Straight to the Point_ Elizabeth Castro_ 2010.pdf 7M25-Mar-2012 18:30
grep awk and sed_ three VERY useful command-line utilities_ Matt Probert_ 2016.pdf 99K02-Feb-2021 17:12
nooshare cryptocurrency_ overview_ 2012.pdf 307K19-Feb-2012 03:58
pci21.pdf 3M28-Jul-2011 12:56
pci23.pdf 4M28-Jul-2011 12:56
spiPhone_ Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers_ P Traynor et al_ 2011.pdf 610K27-Sep-2013 18:53