Index of /library/Computing/

Name  ↓ Size  ↓ Date  ↓ 
Parent directory--
2014 Internet Peering Playbook.epub7.9 MiB2016-Oct-21 19:08
A Discipline of Programming_ Edsger Dijkstra_ 1976.djvu1.6 MiB2011-Oct-25 22:59
A Large-Scale Study of Flash Memory Failures in the Field_ Facebook 2015.pdf6.3 MiB2015-Jun-24 09:51
A Peek on Numerical Programming in Perl and Python_ E Christopher Dyken_ 2005.pdf99.7 KiB2011-Oct-24 01:35
A Primer on Scientific Programming with Python_ 2nd Ed_ Hans Petter Langtangen_ 2011.pdf5.0 MiB2011-Oct-25 23:01
A2_ Analog Malicious Hardware_ K Yang_ M Hicks_ Q Dong_ T Austin_ D Sylvester_ 2016.pdf2.6 MiB2016-May-25 15:40
ASLR on the Line_ Practical Cache Attacks on the MMU_ Ben Gras_ Kaveh Razavi_ Erik Bosman_ Herber..>770.6 KiB2017-Feb-15 16:27
Abrupt rise of new machine ecology beyond human response time_ Neil Johnson_ Guannan Zhao_ Eric H..>1.3 MiB2013-Sep-13 11:49
Accessible EPUB 3_ Matt_Garrish_ 2012.pdf3.2 MiB2012-Mar-25 18:23
Accessorize to a Crime_ Real and Stealthy Attacks on State-of-the-Art Face Recognition_ Mahmood S..>4.2 MiB2016-Nov-02 19:10
Against the Law_ Countering Lawful Abuses of Digital Surveillance_ Andrew bunnie Huang_ Edward Sn..>8.2 MiB2016-Sep-08 08:41
All Your GPS Are Belong To Us_ Towards Stealthy Manipulation of Road Navigation Systems_ K Zeng_ ..>4.5 MiB2018-Jul-23 02:01
An Analysis of Chinas Great Cannon_ Marczak et al_ foci 2015.pdf695.0 KiB2015-Sep-05 05:53
An Industrial-Strength Audio Search Algorithm_ Avery Li-Chun Wang_ Shazam.pdf477.3 KiB2015-Jul-17 22:31
Applied Mathematical Programming_ Stephen P Bradley_ Arnoldo C Hax_ Thomas L Magnanti_ 1977.pdf34.9 MiB2011-Oct-25 22:58
Automating System Administration with Perl_ Tools to Make You More Efficient_ David N Blank-Edelm..>2.4 MiB2011-Jul-14 05:44
Beginning PDL_ Xavier Calbet_ 2001.pdf422.1 KiB2011-Oct-25 02:23
Bitcoin and Cryptocurrency Technologies_ A Narayanan_ J Bonneau E Felten_ A Miller_ S Goldfeder_ ..>18.0 MiB2016-Feb-10 17:39
Bitcoin_ A Peer-to-Peer Electronic Cash System_ Satoshi Nakamoto.pdf180.0 KiB2011-Sep-27 10:24
Breaking and Improving Protocol Obfuscation_ Erik Hjelmvik_ Wolfgang John_ 2010.pdf681.7 KiB2012-May-05 13:03
Circuit Fingerprinting Attacks_ Passive Deanonymization of Tor Hidden Services_ Albert Kwon_ Mash..>522.5 KiB2015-Sep-22 16:56
Computer Algebra Recipes for Mathematical Physics_ Richard H Enns_ 2004.pdf3.8 MiB2011-Oct-25 22:56
Computer Methods for Ordinary Differential Equations and Differential-Algebraic Equations_ L R Pe..>1.8 MiB2012-Feb-27 12:07
Concrete Mathematics_ A Foundation for Computer Science_ 2nd Ed_ Ronald L Graham_ Donald E Knuth_..>5.4 MiB2011-Oct-25 23:04
Cryptographically secure shields_ J M Cioranesco_ J L Danger_ T Graba_ S Guilley_ Y Mathieu_ D Na..>1.4 MiB2016-Sep-14 12:07
CyberWarfare CyberComplacency_ is hollywoods blueprint for chaos coming true_ Mark Osborne_ 2013.pdf14.8 MiB2016-Sep-22 21:34
DNS & BIND Cookbook_ Cricket Liu.chm576.3 KiB2011-Aug-15 07:01
DNS and BIND on IPv6_ Cricket Liu_ 2011.pdf4.1 MiB2011-Aug-15 07:00
DNS and BIND_ 5th Ed_ Cricket Liu_ Paul Albitz_ 2006.chm2.4 MiB2011-Aug-15 06:53
Decentralized Anonymous Credentials_ Christina Garman_ Matthew Green_ Ian Miers_ 2013.pdf595.5 KiB2013-Nov-04 03:21
Dedup Est Machina_ Memory Deduplication as an Advanced Exploitation Vector_ E Bosman_ K Razavi_ H..>547.1 KiB2016-May-28 08:25
Digital Design_ Verilog_ An Embedded Systems Approach Using Verilog_ Peter J Ashenden_ 2007.pdf2.0 MiB2013-Jan-03 04:37
Digital Signal Processing using Stream High Performance Computing_ A 512-Input Broadband Correlat..>5.7 MiB2015-Jun-08 22:41
DiskFiltration_ Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noi..>3.2 MiB2016-Aug-12 16:35
Effective Perl Programming_ Ways to Write Better More Idiomatic Perl_ 2nd Ed_ Joseph N Hall_ Josh..>1.5 MiB2011-Jul-14 05:56
Effective awk Programming_ 3rd Ed_ Arnold Robbins_ 2001.pdf2.4 MiB2011-Aug-15 06:51
Efficient BackProp_ Yann LeCun_ Leon Bottou_ Genevieve B Orr_ Klaus-Rober Muller_ 1998.pdf499.5 KiB2013-Mar-22 08:05
Equation Group_ Questions and Answers_ HDD Firmware Trojans_ ver 15_ Kaspersky 2015.pdf4.0 MiB2016-Nov-09 06:58
Essential Linux Device Drivers_ Sreekrishnan Venkateswaran_ 2008.chm4.1 MiB2011-Aug-15 06:55
FM 99.9 Radio Virus_ Exploiting FM Radio Broadcasts for Malware Deployment_ E Fernandes_ B Crispo..>750.0 KiB2015-Dec-03 00:34
Fansmitter_ Acoustic Data Exfiltration from Speakerless Air-Gapped Computers_ Mordechai Guri_ Yos..>2.1 MiB2016-Jun-27 23:24
Fast String Searching_ Andrew Hume_ Daniel Sunday_ 1991.pdf204.3 KiB2011-Aug-09 17:06
Flash Reliability in Production_ The Expected and the Unexpected_ B Schroeder_ R Lagisetty_ A Mer..>2.1 MiB2016-Mar-13 03:44
Flipping Bits in Memory Without Accessing Them_ An Experimental Study of DRAM Disturbance Errors_..>827.9 KiB2014-Dec-24 00:12
Forced Decryption as a Foregone Conclusion_ Dan Terzian_ 2015.pdf217.4 KiB2017-Mar-21 02:25
Forensic Analysis and Anonymisation of Printed Documents_ T Richter_ S Escher_ D Schonfeld_ T Str..>1.5 MiB2018-Jun-28 17:39
Fundamentals of Scientific Computing_ Bertil Gustafsson_ 2011.pdf3.8 MiB2011-Jul-15 06:15
Furby source code_ D Hampton_ W Shulz_ 1998.pdf6.4 MiB2018-Aug-13 20:12
Games Diversions & Perl Culture_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf4.4 MiB2011-Jul-14 05:50
Hacking the Cable Modem_ Ryan Harris_ 2006.pdf15.6 MiB2014-Jan-19 19:04
Higher-Order Perl_ Mark Jason Dominus.epub1.6 MiB2013-Jan-06 06:53
Higher-Order Perl_ Transforming Programs with Programs_ Mark Jason Dominus_ 2005.pdf1.9 MiB2011-Jul-14 05:48
Honeypots_ A New Paradigm to Information Security_ R C Joshi_ Anjali Sardana_ 2011.pdf3.6 MiB2011-Oct-05 00:44
IEMI Threats for Information Security_ Remote Command Injection on Modern Smartphones_ Chaouki Ka..>238.8 KiB2015-Oct-18 04:08
Imperfect Forward Secrecy_ How Diffie-Hellman Fails in Practice_ D Adrian_ K Bhargavan_ Z Curumer..>1.3 MiB2015-Oct-15 03:47
Inside the Machine_ An Illustrated Introduction to Microprocessors and Computer Architecture_ Jon..>9.8 MiB2013-Nov-27 06:44
Instruction latencies and throughput for AMD and Intel x86 processors_ Torbjorn Granlund_ 2017.pdf203.8 KiB2017-Jun-04 18:25
Intel ME - Two Years Later_ Igor Skochinsky_ 2014.pdf1.1 MiB2016-Nov-11 10:03
Introduction to Algorithms_ 3rd Ed_ Thomas H Cormen_ Charles E Leiserson_ Ronald L Rivest_ Cliffo..>5.2 MiB2011-Aug-31 05:33
Introduction to Automata Theory_ Languages_ and Computation_ 2nd Ed_ John E Hopcroft_ Rajeev Motw..>16.2 MiB2011-Aug-31 05:30
Introduction to Scientific Programming and Simulation using R_ Owen Jones_ Robert Maillardet_ And..>7.7 MiB2011-Oct-25 23:05
Introduction to Scilab_ 2010.pdf1.2 MiB2011-Oct-25 02:38
Introduction to the Theory of Computation_ 2nd Ed_ Michael Sipser_ 2005.djvu5.0 MiB2011-Aug-12 00:50
Invisible Mask_ Practical Attacks on Face Recognition with Infrared_ arxiv180304683.pdf3.3 MiB2018-Mar-27 22:03
Joe Pardue - C Programming For Microcontrollers.pdf4.0 MiB2011-Nov-21 21:04
Key Reinstallation Attacks_ Forcing Nonce Reuse in WPA2_ Mathy Vanhoef_ Frank Piessens_ 2017.pdf626.6 KiB2017-Oct-17 04:09
Keystroke Recognition Using WiFi Signals_ Kamran Ali_ Alex X Liu_ Wei Wang_ Muhammad Shahzad_ 201..>1.0 MiB2016-Aug-25 04:18
LED-it-GO_ Leaking a lot of Data from Air-Gapped Computers via the HDD LED_ M Guri_ B Zadov_ E At..>1.9 MiB2017-Feb-27 15:13
LIRA_ Lightweight Incentivized Routing for Anonymity_ Rob Jasen_ Aaron Johnson_ Paul Syverson_ US..>1.1 MiB2013-Sep-21 20:30
Learning Perl Tk_ Graphical User Interfaces with Perl_ Nancy Walsh_ 1999.pdf3.9 MiB2011-Jul-14 05:52
Learning Perl_ 6th Edition_ Randal L Schwartz_ Brian D Foy_ Tom Phoenix_ 2011.pdf7.5 MiB2011-Jul-14 05:45
Learning to Win by Reading Manuals in a Monte-Carlo Framework_ S R K Branavan_ D Silver_ R Barzil..>359.1 KiB2012-Jan-02 01:59
Lest We Remember_ Cold Boot Attacks on Encryption Keys_ J A Halderman_ S D Schoen_ N Heniger_ W C..>2.7 MiB2014-Nov-05 23:13
Linux Device Drivers_ 3rd Ed_ Jonathan Corbet_ 2005.pdf12.3 MiB2011-Aug-15 06:56
Listening through a Vibration Motor_ N Roy_ R R Choudhury_ 2016.pdf1.6 MiB2018-Feb-27 05:41
Mastering Perl Tk_ Stephen O Lidie_ Nancy Walsh_ 2002.chm3.3 MiB2011-Jul-14 05:46
Mastering Perl for Bioinformatics_ James D Tisdall_ 2003.chm717.4 KiB2011-Aug-15 07:14
Mastering Perl_ Brian D Foy_ 2007.pdf7.4 MiB2011-Aug-15 07:19
Mathematical Introduction to Linear Programming and Game Theory_ Louis Brickman_ 1998.djvu954.8 KiB2011-Oct-25 22:59
Mathematical Structures for Computer Science_ A Modern Treatment of Discrete Mathematics_ 5th Ed_..>6.8 MiB2011-Oct-25 23:02
Matplotlib for Python Developers_ Sandro Tosi_ 2009.pdf12.4 MiB2012-Sep-02 10:12
Methods in Medical Informatics_ Fundamentals of Healthcare Programming in Perl, Python, and Ruby_..>5.9 MiB2011-Oct-25 22:58
Minimal Perl For UNIX and Linux People_ Tim Maher_ 2007.pdf5.7 MiB2017-Nov-30 05:38
Modern Perl_ Chromatic_ 2010.pdf1.5 MiB2011-Jul-14 05:42
Modern Perl_ Chromatic_ 2012.pdf1.1 MiB2012-Feb-29 02:35
Modern Perl_ Chromatic_ 2014.pdf790.6 KiB2015-Nov-06 14:23
Numerical Recipes_ The Art of Scientific Computing_ 3rd Ed_ William H Press_ Saul A Teukolsky_ Wi..>20.4 MiB2011-Jul-15 07:43
ODINI_ Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields_ arxi..>1020.4 KiB2018-Feb-10 21:52
On Covert Acoustical Mesh Networks in Air_ Michael Hanspach_ Michael Goetz_ 2013.pdf3.2 MiB2013-Nov-25 18:18
On Rationomics_ An Analysis into the Workings of a Bit Torrent Trackers Economy and Its Compositi..>104.3 KiB2012-Mar-19 02:25
P might equal NP_ Scott Aaronson_ 2016.pdf927.7 KiB2017-Jan-05 13:05
PCI.Local.Bus.Specification.Revision.3.0.pdf3.0 MiB2011-Jul-28 12:56
PCI_22.pdf3.7 MiB2011-Jul-28 12:57
PDL Book_ 2012-02-05.pdf7.8 MiB2012-Feb-06 15:34
PDL for impatient IDL users_ Craig DeForest_ 2006_ switchers.pdf188.2 KiB2011-Oct-25 02:25
PDL_ Scientific Programming in Perl_ 2001.pdf2.1 MiB2011-Oct-25 02:25
Packet Guide to Routing and Switching_ Bruce Hartpence_ 2011.pdf7.4 MiB2011-Sep-10 04:54
Perl & LWP_ Sean M Burke_ 2002.chm657.2 KiB2011-Aug-15 07:18
Perl Cookbook_ 2nd Ed_ Tom Christiansen_ 2003.chm1.5 MiB2011-Jul-14 06:02
Perl Medic_ Transforming Legacy Code_ Peter J Scott_ 2004.chm1.2 MiB2011-Jul-14 05:47
Perl Moose_ A Guide to the Revolution_ Ricardo Signes_ 2011.pdf6.7 MiB2011-Jul-26 19:08
Physical random bit generation from chaotic solitary laser diode_ arxiv14063005.pdf409.5 KiB2014-Jun-15 06:35
Practical Text Mining with Perl_ Roger Bilisoly_ 2008.pdf17.4 MiB2011-Aug-15 07:12
Predicting, Decrypting, and Abusing WPA2 80211 Group Keys_ Mathy Vanhoef_ Frank Piessens_ 2016.pdf982.9 KiB2017-Oct-16 00:38
Principles of Uncertainty.pdf2.8 MiB2011-May-24 10:56
Programming from the Ground Up_ Jonathan Bartlett_ 2003.pdf1.3 MiB2012-Apr-05 17:17
Purely Functional Data Structures_ Chris Okasaki_ 1999.djvu1.6 MiB2011-Nov-15 16:05
Quantum Computing since Democritus_ Scott Aaronson_ 2013.pdf3.2 MiB2013-Jul-20 00:27
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis_ Daniel Genkin_ Adi Shamir_ Eran Trom..>7.7 MiB2013-Dec-18 19:16
Report on Smartphone Encryption and Public Safety_ Manhattan District Attorneys Office_ 2015.pdf665.9 KiB2015-Nov-22 18:53
Reverse Engineering x86 Processor Microcode_ P Koppe et al_ sec17_ 2017 .pdf2.5 MiB2017-Sep-01 09:13
Reversing Stealthy Dopant-Level Circuits_ T Sugawara_ D Suzuki_ R Fujii_ S Tawa_ R Hori_ M Shioza..>6.5 MiB2014-Jul-04 05:29
Ring Confidential Transactions_ Anonymous Blockchain Cryptocurrencies_ Shen Noether_ 2015.pdf489.1 KiB2016-Sep-01 01:22
Scientific Computing_ An Introductory Survey_ Michael T Heath_ 1997.pdf2.0 MiB2011-Oct-25 23:06
Screaming Channels_ When Eletromagnetic Side Channels Meet Radio Transceivers_ G Camurati_ S Poep..>3.8 MiB2018-Jul-26 20:32
Scripting Languages Compared_ PHP Perl Python Ruby_Hyperpolyglot.html338.0 KiB2011-Aug-16 05:13
Security and Privacy Vulnerabilities of In-Car Wireless Networks_ A Tire Pressure MOnitoring Syst..>1.2 MiB2013-Nov-03 08:33
Simulating Analyzing and Animating Dynamical Systems_ A Guide to XPPAUT for Researchers and Stude..>2.8 MiB2011-Aug-25 04:06
Stealing Keys from PCs using a Radio_ Cheap Electromagnetic Attacks on WIndowed Exponentiation_ D..>2.0 MiB2017-Mar-30 01:39
Stealthy Dopant-Level Hardware Trojans_ George T Becker_ Francessco Regazzoni_ Christof Paar_ Way..>432.5 KiB2013-Sep-14 16:50
StegTorrent_ a Steganographic Method for P2P File Sharing Service_ arxiv13034264.pdf684.9 KiB2013-Aug-14 02:43
Structure and Interpretation of Computer Programs_ 2nd Ed_ Harold Abelson_ 1996.pdf4.4 MiB2011-Aug-07 00:27
Survey of Text Mining_ Clustering Classification and Retrieval_ Michael W Berry_ 2003.pdf5.8 MiB2011-Aug-15 07:08
Survey of Text Mining_ II_ Clustering Classification and Retrieval_ Michael W Berry_ Malu Castell..>2.9 MiB2011-Aug-15 07:09
TRESOR-HUNT_ Attacking CPU-Bound Encryption_ Erik-Oliver Blass_ William Robertson_ 2012.pdf246.3 KiB2016-Feb-25 13:21
Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks_ R Rasti_ M Murthy_ N W..>1.4 MiB2016-Jul-22 09:51
Text Mining_ Applications and Theory_ Michael W Berry_ Jacob Kogan_ 2010.pdf2.4 MiB2011-Aug-15 07:09
Text Mining_ Classification Clustering and Applications_ Ashok Srivastava_ Mehran Sahami_ 2009.pdf4.4 MiB2011-Aug-15 07:12
The Algorithm Design Manual_ 2nd Ed_ Steven S Skiena_ 2008.pdf3.9 MiB2011-Aug-31 04:57
The Art of Computer Programming_ Vol 1_ Fundamental Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu5.5 MiB2011-Oct-25 22:53
The Art of Computer Programming_ Vol 2_ Seminumerical Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu6.9 MiB2011-Oct-25 22:52
The Art of Computer Programming_ Vol 3_ Sorting and Searching_ Donald E Knuth_ 1973.djvu7.1 MiB2011-Oct-25 22:55
The Complete ESP8266 Psionics Handbook_ Thotcon 2016.pdf6.4 MiB2016-Jun-23 05:24
The Elements of Computing Systems_ Building a Modern Computer from First Principles_ Noam Nisan_ ..>4.3 MiB2012-Apr-04 21:01
The Genuine Sieve of Eratosthenes_ M E ONeill_ 2009.pdf217.2 KiB2018-Mar-25 14:50
The Linux Programming Interface_ A Linux and UNIX System Programming Handbook_ Michael Kerrisk_ 2..>6.9 MiB2011-Aug-15 06:50
The Tangled Web_ A Guide to Securing Modern Web Applications_ Michal Zalewski_ 2011.epub1.9 MiB2012-Oct-17 19:10
The Text Mining Handbook_ Advanced Approaches in Analyzing Unstructured Data_ Ronen Feldman_ Jame..>4.8 MiB2011-Aug-15 07:07
The Theory of Matrices_ With Applications_ 2nd Ed_ Peter Lancaster_ Miron Tismenetsky_ 1985.djvu5.4 MiB2011-Jul-15 07:41
Top 10 algorithms in data mining_ X Wu_ V Kumar_ J R Quinlan_ J Ghosh_ Q Yang_ H Motoda_ 2007.pdf783.2 KiB2012-Dec-19 02:44
Tor_ The Second-Generation Onion Router_ R Dingledine_ N Mathewson_ P Syverson.pdf171.1 KiB2016-Feb-03 01:42
Transparent Firewall_ Filtering Bridge_ pfSense 2_ William Tarrh_ 2013.pdf374.9 KiB2016-Dec-30 10:06
UEFI_ Unified Extensible Firmware Interface Specification_ 2v5_ 2015.pdf19.8 MiB2017-Mar-07 15:37
UNIX Network Programming_ Vol 2_ Interprocess Communications_ 2nd Ed_ W Richard Stevens_ 1998.djvu5.7 MiB2011-Aug-15 07:00
USBee_ Air-Gate Convert-Channel via Electromagnetic Emissions form USB_ M Guri_ M Monitz_ Y Elovi..>1016.7 KiB2016-Sep-06 13:46
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations_ C V Wright_ L Ballard_ S E Co..>2.0 MiB2012-Sep-28 23:32
Understanding FFT Applications_ 2nd ed_ Anders E Zonst_ 2004.djvu2.6 MiB2014-Jan-19 18:57
Understanding IPv6_ Youngsong Mun_ Hyewon Keren Lee_ 2005.pdf16.2 MiB2011-Sep-01 10:38
Understanding Linux Network Internals_ Christian Benvenuti_ 2006.pdf18.2 MiB2011-Aug-15 06:59
Understanding the Linux Kernel_ 3rd Ed_ Daniel P Bovet_ Marco Cesati_ 2005.pdf4.8 MiB2011-Aug-15 06:58
Understanding the bin, sbin, usr_bin , usr_sbin split.html6.8 KiB2012-Jan-28 08:42
Unix Network Programming_ Vol 1_ The Sockets Networking API_ 3rd Ed_ W Richard Stevens_ 2003.chm5.4 MiB2011-Aug-15 06:40
Using Perl for Statistics_ Data Processing and Statistical Computing_ v11i01.pdf1.1 MiB2011-Mar-01 00:20
Vi for nano users_ Markus Schnalke.pdf7.4 KiB2013-Mar-05 18:25
Web_ Graphics_ Perl TK_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf4.0 MiB2011-Jul-14 05:55
What Is EPUB 3_ Matt Garrish_ 2011.pdf399.0 KiB2011-Oct-10 15:19
Writing Linux Device Drivers_ a guide with exercises_ Dr Jerry Cooperstein_ 2009.pdf18.2 MiB2011-Aug-15 06:54
You Can Type, but You Cant Hide_ A Stealthy GPU-based Keylogger_ E Ladakis_ L Koromilas_ G Vasili..>344.9 KiB2013-Sep-15 10:08
Zero Reserve_ A Distributed Exchange Platform_ anu_ 2013.pdf124.1 KiB2013-Dec-19 14:03
dot-com_zonefile_access_request_form.pdf938.8 KiB2018-May-08 02:15
ePub Straight to the Point_ Elizabeth Castro_ 2010.pdf7.5 MiB2012-Mar-25 18:30
nooshare cryptocurrency_ overview_ 2012.pdf307.3 KiB2012-Feb-19 03:58
pci21.pdf2.8 MiB2011-Jul-28 12:56
pci23.pdf4.3 MiB2011-Jul-28 12:56
spiPhone_ Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers_ P Traynor ..>610.3 KiB2013-Sep-27 18:53