Index of /library/Computing/

File NameFile SizeDate
Parent directory/--
2014 Internet Peering Playbook.epub 8M21-Oct-2016 19:08
A Discipline of Programming_ Edsger Dijkstra_ 1976.djvu 2M25-Oct-2011 22:59
A Large-Scale Study of Flash Memory Failures in the Field_ Facebook 2015.pdf 6M24-Jun-2015 09:51
A Peek on Numerical Programming in Perl and Python_ E Christopher Dyken_ 2005.pdf 100K24-Oct-2011 01:35
A Primer on Scientific Programming with Python_ 2nd Ed_ Hans Petter Langtangen_ 2011.pdf 5M25-Oct-2011 23:01
A2_ Analog Malicious Hardware_ K Yang_ M Hicks_ Q Dong_ T Austin_ D Sylvester_ 2016.pdf 3M25-May-2016 15:40
ASLR on the Line_ Practical Cache Attacks on the MMU_ Ben Gras_ Kaveh Razavi_ Erik Bosman_ Herbert Bos_ Cristiano Giu..> 771K15-Feb-2017 16:27
Abrupt rise of new machine ecology beyond human response time_ Neil Johnson_ Guannan Zhao_ Eric Hunsader_ Hong Qi_ Ni..> 1M13-Sep-2013 11:49
Accessible EPUB 3_ Matt_Garrish_ 2012.pdf 3M25-Mar-2012 18:23
Accessorize to a Crime_ Real and Stealthy Attacks on State-of-the-Art Face Recognition_ Mahmood Sharif_ Sruti Bhagava..> 4M02-Nov-2016 19:10
Against the Law_ Countering Lawful Abuses of Digital Surveillance_ Andrew bunnie Huang_ Edward Snoden_ 2016.pdf 8M08-Sep-2016 08:41
An Analysis of Chinas Great Cannon_ Marczak et al_ foci 2015.pdf 695K05-Sep-2015 05:53
An Industrial-Strength Audio Search Algorithm_ Avery Li-Chun Wang_ Shazam.pdf 477K17-Jul-2015 22:31
Applied Mathematical Programming_ Stephen P Bradley_ Arnoldo C Hax_ Thomas L Magnanti_ 1977.pdf 35M25-Oct-2011 22:58
Automating System Administration with Perl_ Tools to Make You More Efficient_ David N Blank-Edelman_ 2009.epub 2M14-Jul-2011 05:44
Beginning PDL_ Xavier Calbet_ 2001.pdf 422K25-Oct-2011 02:23
Bitcoin and Cryptocurrency Technologies_ A Narayanan_ J Bonneau E Felten_ A Miller_ S Goldfeder_ 2016.pdf 18M10-Feb-2016 17:39
Bitcoin_ A Peer-to-Peer Electronic Cash System_ Satoshi Nakamoto.pdf 180K27-Sep-2011 10:24
Breaking and Improving Protocol Obfuscation_ Erik Hjelmvik_ Wolfgang John_ 2010.pdf 682K05-May-2012 13:03
Circuit Fingerprinting Attacks_ Passive Deanonymization of Tor Hidden Services_ Albert Kwon_ Mashael AlSabah_ David L..> 523K22-Sep-2015 16:56
Computer Algebra Recipes for Mathematical Physics_ Richard H Enns_ 2004.pdf 4M25-Oct-2011 22:56
Computer Methods for Ordinary Differential Equations and Differential-Algebraic Equations_ L R Petzold_ SIAM Society ..> 2M27-Feb-2012 12:07
Concrete Mathematics_ A Foundation for Computer Science_ 2nd Ed_ Ronald L Graham_ Donald E Knuth_ Oren Patashnik_ 199..> 5M25-Oct-2011 23:04
Cryptographically secure shields_ J M Cioranesco_ J L Danger_ T Graba_ S Guilley_ Y Mathieu_ D Naccache_ X T Ngo_ HST..> 1M14-Sep-2016 12:07
CyberWarfare CyberComplacency_ is hollywoods blueprint for chaos coming true_ Mark Osborne_ 2013.pdf 15M22-Sep-2016 21:34
DNS & BIND Cookbook_ Cricket Liu.chm 576K15-Aug-2011 07:01
DNS and BIND on IPv6_ Cricket Liu_ 2011.pdf 4M15-Aug-2011 07:00
DNS and BIND_ 5th Ed_ Cricket Liu_ Paul Albitz_ 2006.chm 2M15-Aug-2011 06:53
Decentralized Anonymous Credentials_ Christina Garman_ Matthew Green_ Ian Miers_ 2013.pdf 595K04-Nov-2013 03:21
Dedup Est Machina_ Memory Deduplication as an Advanced Exploitation Vector_ E Bosman_ K Razavi_ H Bos_ C Giuffrida_ s..> 547K28-May-2016 08:25
Digital Design_ Verilog_ An Embedded Systems Approach Using Verilog_ Peter J Ashenden_ 2007.pdf 2M03-Jan-2013 04:37
Digital Signal Processing using Stream High Performance Computing_ A 512-Input Broadband Correlator for Radio Astrono..> 6M08-Jun-2015 22:41
DiskFiltration_ Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise_ arxiv160803431v1..> 3M12-Aug-2016 16:35
Effective Perl Programming_ Ways to Write Better More Idiomatic Perl_ 2nd Ed_ Joseph N Hall_ Joshua A McAdams_ brian ..> 2M14-Jul-2011 05:56
Effective awk Programming_ 3rd Ed_ Arnold Robbins_ 2001.pdf 2M15-Aug-2011 06:51
Efficient BackProp_ Yann LeCun_ Leon Bottou_ Genevieve B Orr_ Klaus-Rober Muller_ 1998.pdf 500K22-Mar-2013 08:05
Equation Group_ Questions and Answers_ HDD Firmware Trojans_ ver 15_ Kaspersky 2015.pdf 4M09-Nov-2016 06:58
Essential Linux Device Drivers_ Sreekrishnan Venkateswaran_ 2008.chm 4M15-Aug-2011 06:55
FM 99.9 Radio Virus_ Exploiting FM Radio Broadcasts for Malware Deployment_ E Fernandes_ B Crispo_ M Conti_ 2013.pdf 750K03-Dec-2015 00:34
Fansmitter_ Acoustic Data Exfiltration from Speakerless Air-Gapped Computers_ Mordechai Guri_ Yosef Solewicz_ Andrey ..> 2M27-Jun-2016 23:24
Fast String Searching_ Andrew Hume_ Daniel Sunday_ 1991.pdf 204K09-Aug-2011 17:06
Flash Reliability in Production_ The Expected and the Unexpected_ B Schroeder_ R Lagisetty_ A Merchent_ Google_ 2016.pdf 2M13-Mar-2016 03:44
Flipping Bits in Memory Without Accessing Them_ An Experimental Study of DRAM Disturbance Errors_ Yoongu Kim_ Ross Da..> 828K24-Dec-2014 00:12
Forced Decryption as a Foregone Conclusion_ Dan Terzian_ 2015.pdf 217K21-Mar-2017 02:25
Fundamentals of Scientific Computing_ Bertil Gustafsson_ 2011.pdf 4M15-Jul-2011 06:15
Games Diversions & Perl Culture_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf 4M14-Jul-2011 05:50
Hacking the Cable Modem_ Ryan Harris_ 2006.pdf 16M19-Jan-2014 19:04
Higher-Order Perl_ Mark Jason Dominus.epub 2M06-Jan-2013 06:53
Higher-Order Perl_ Transforming Programs with Programs_ Mark Jason Dominus_ 2005.pdf 2M14-Jul-2011 05:48
Honeypots_ A New Paradigm to Information Security_ R C Joshi_ Anjali Sardana_ 2011.pdf 4M05-Oct-2011 00:44
IEMI Threats for Information Security_ Remote Command Injection on Modern Smartphones_ Chaouki Kasmi_ Jose Lopes Este..> 239K18-Oct-2015 04:08
Imperfect Forward Secrecy_ How Diffie-Hellman Fails in Practice_ D Adrian_ K Bhargavan_ Z Curumeric_ P Gaudry_ M Gree..> 1M15-Oct-2015 03:47
Inside the Machine_ An Illustrated Introduction to Microprocessors and Computer Architecture_ Jon Stokes_ 2006.pdf 10M27-Nov-2013 06:44
Intel ME - Two Years Later_ Igor Skochinsky_ 2014.pdf 1M11-Nov-2016 10:03
Introduction to Algorithms_ 3rd Ed_ Thomas H Cormen_ Charles E Leiserson_ Ronald L Rivest_ Clifford Stein_ 2009.pdf 5M31-Aug-2011 05:33
Introduction to Automata Theory_ Languages_ and Computation_ 2nd Ed_ John E Hopcroft_ Rajeev Motwani_ Jeffrey D Ullma..> 16M31-Aug-2011 05:30
Introduction to Scientific Programming and Simulation using R_ Owen Jones_ Robert Maillardet_ Andrew Robinson_ 2009.pdf 8M25-Oct-2011 23:05
Introduction to Scilab_ 2010.pdf 1M25-Oct-2011 02:38
Introduction to the Theory of Computation_ 2nd Ed_ Michael Sipser_ 2005.djvu 5M12-Aug-2011 00:50
Joe Pardue - C Programming For Microcontrollers.pdf 4M21-Nov-2011 21:04
Keystroke Recognition Using WiFi Signals_ Kamran Ali_ Alex X Liu_ Wei Wang_ Muhammad Shahzad_ 2015.pdf 1M25-Aug-2016 04:18
LED-it-GO_ Leaking a lot of Data from Air-Gapped Computers via the HDD LED_ M Guri_ B Zadov_ E Atias_ Y Elovici_ 2017..> 2M27-Feb-2017 15:13
LIRA_ Lightweight Incentivized Routing for Anonymity_ Rob Jasen_ Aaron Johnson_ Paul Syverson_ US-NRL 2013.pdf 1M21-Sep-2013 20:30
Learning Perl Tk_ Graphical User Interfaces with Perl_ Nancy Walsh_ 1999.pdf 4M14-Jul-2011 05:52
Learning Perl_ 6th Edition_ Randal L Schwartz_ Brian D Foy_ Tom Phoenix_ 2011.pdf 8M14-Jul-2011 05:45
Learning to Win by Reading Manuals in a Monte-Carlo Framework_ S R K Branavan_ D Silver_ R Barzilay_ acl_2011.pdf 359K02-Jan-2012 01:59
Lest We Remember_ Cold Boot Attacks on Encryption Keys_ J A Halderman_ S D Schoen_ N Heniger_ W Clarkson_ W Paul_ J A..> 3M05-Nov-2014 23:13
Linux Device Drivers_ 3rd Ed_ Jonathan Corbet_ 2005.pdf 12M15-Aug-2011 06:56
Mastering Perl Tk_ Stephen O Lidie_ Nancy Walsh_ 2002.chm 3M14-Jul-2011 05:46
Mastering Perl for Bioinformatics_ James D Tisdall_ 2003.chm 717K15-Aug-2011 07:14
Mastering Perl_ Brian D Foy_ 2007.pdf 7M15-Aug-2011 07:19
Mathematical Introduction to Linear Programming and Game Theory_ Louis Brickman_ 1998.djvu 955K25-Oct-2011 22:59
Mathematical Structures for Computer Science_ A Modern Treatment of Discrete Mathematics_ 5th Ed_ Judith L Gersting_ ..> 7M25-Oct-2011 23:02
Matplotlib for Python Developers_ Sandro Tosi_ 2009.pdf 12M02-Sep-2012 10:12
Methods in Medical Informatics_ Fundamentals of Healthcare Programming in Perl, Python, and Ruby_ Jules J Berman_ 201..> 6M25-Oct-2011 22:58
Modern Perl_ Chromatic_ 2010.pdf 2M14-Jul-2011 05:42
Modern Perl_ Chromatic_ 2012.pdf 1M29-Feb-2012 02:35
Modern Perl_ Chromatic_ 2014.pdf 791K06-Nov-2015 14:23
Numerical Recipes_ The Art of Scientific Computing_ 3rd Ed_ William H Press_ Saul A Teukolsky_ William T Vetterling_ ..> 20M15-Jul-2011 07:43
On Covert Acoustical Mesh Networks in Air_ Michael Hanspach_ Michael Goetz_ 2013.pdf 3M25-Nov-2013 18:18
On Rationomics_ An Analysis into the Workings of a Bit Torrent Trackers Economy and Its Composition_ oorza_ 2008.pdf 104K19-Mar-2012 02:25
P might equal NP_ Scott Aaronson_ 2016.pdf 928K05-Jan-2017 13:05
PCI.Local.Bus.Specification.Revision.3.0.pdf 3M28-Jul-2011 12:56
PCI_22.pdf 4M28-Jul-2011 12:57
PDL Book_ 2012-02-05.pdf 8M06-Feb-2012 15:34
PDL for impatient IDL users_ Craig DeForest_ 2006_ switchers.pdf 188K25-Oct-2011 02:25
PDL_ Scientific Programming in Perl_ 2001.pdf 2M25-Oct-2011 02:25
Packet Guide to Routing and Switching_ Bruce Hartpence_ 2011.pdf 7M10-Sep-2011 04:54
Perl & LWP_ Sean M Burke_ 2002.chm 657K15-Aug-2011 07:18
Perl Cookbook_ 2nd Ed_ Tom Christiansen_ 2003.chm 2M14-Jul-2011 06:02
Perl Medic_ Transforming Legacy Code_ Peter J Scott_ 2004.chm 1M14-Jul-2011 05:47
Perl Moose_ A Guide to the Revolution_ Ricardo Signes_ 2011.pdf 7M26-Jul-2011 19:08
Physical random bit generation from chaotic solitary laser diode_ arxiv14063005.pdf 410K15-Jun-2014 06:35
Practical Text Mining with Perl_ Roger Bilisoly_ 2008.pdf 17M15-Aug-2011 07:12
Principles of Uncertainty.pdf 3M24-May-2011 10:56
Programming from the Ground Up_ Jonathan Bartlett_ 2003.pdf 1M05-Apr-2012 17:17
Purely Functional Data Structures_ Chris Okasaki_ 1999.djvu 2M15-Nov-2011 16:05
Quantum Computing since Democritus_ Scott Aaronson_ 2013.pdf 3M20-Jul-2013 00:27
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis_ Daniel Genkin_ Adi Shamir_ Eran Tromer_ 2013.pdf 8M18-Dec-2013 19:16
Report on Smartphone Encryption and Public Safety_ Manhattan District Attorneys Office_ 2015.pdf 666K22-Nov-2015 18:53
Reversing Stealthy Dopant-Level Circuits_ T Sugawara_ D Suzuki_ R Fujii_ S Tawa_ R Hori_ M Shiozaki_ T Fujino_ IACR 2..> 6M04-Jul-2014 05:29
Ring Confidential Transactions_ Anonymous Blockchain Cryptocurrencies_ Shen Noether_ 2015.pdf 489K01-Sep-2016 01:22
Scientific Computing_ An Introductory Survey_ Michael T Heath_ 1997.pdf 2M25-Oct-2011 23:06
Scripting Languages Compared_ PHP Perl Python Ruby_Hyperpolyglot.html 338K16-Aug-2011 05:13
Security and Privacy Vulnerabilities of In-Car Wireless Networks_ A Tire Pressure MOnitoring System Case Study_ Ivan ..> 1M03-Nov-2013 08:33
Simulating Analyzing and Animating Dynamical Systems_ A Guide to XPPAUT for Researchers and Students_ Bard Ermentrout..> 3M25-Aug-2011 04:06
Stealthy Dopant-Level Hardware Trojans_ George T Becker_ Francessco Regazzoni_ Christof Paar_ Wayne P Burleson_ 2013.pdf 433K14-Sep-2013 16:50
StegTorrent_ a Steganographic Method for P2P File Sharing Service_ arxiv13034264.pdf 685K14-Aug-2013 02:43
Structure and Interpretation of Computer Programs_ 2nd Ed_ Harold Abelson_ 1996.pdf 4M07-Aug-2011 00:27
Survey of Text Mining_ Clustering Classification and Retrieval_ Michael W Berry_ 2003.pdf 6M15-Aug-2011 07:08
Survey of Text Mining_ II_ Clustering Classification and Retrieval_ Michael W Berry_ Malu Castellanos_ 2007.pdf 3M15-Aug-2011 07:09
TRESOR-HUNT_ Attacking CPU-Bound Encryption_ Erik-Oliver Blass_ William Robertson_ 2012.pdf 246K25-Feb-2016 13:21
Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks_ R Rasti_ M Murthy_ N Weaver_ V Paxson_ 201..> 1M22-Jul-2016 09:51
Text Mining_ Applications and Theory_ Michael W Berry_ Jacob Kogan_ 2010.pdf 2M15-Aug-2011 07:09
Text Mining_ Classification Clustering and Applications_ Ashok Srivastava_ Mehran Sahami_ 2009.pdf 4M15-Aug-2011 07:12
The Algorithm Design Manual_ 2nd Ed_ Steven S Skiena_ 2008.pdf 4M31-Aug-2011 04:57
The Art of Computer Programming_ Vol 1_ Fundamental Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu 5M25-Oct-2011 22:53
The Art of Computer Programming_ Vol 2_ Seminumerical Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu 7M25-Oct-2011 22:52
The Art of Computer Programming_ Vol 3_ Sorting and Searching_ Donald E Knuth_ 1973.djvu 7M25-Oct-2011 22:55
The Complete ESP8266 Psionics Handbook_ Thotcon 2016.pdf 6M23-Jun-2016 05:24
The Elements of Computing Systems_ Building a Modern Computer from First Principles_ Noam Nisan_ Shimon Schocken_ 200..> 4M04-Apr-2012 21:01
The Linux Programming Interface_ A Linux and UNIX System Programming Handbook_ Michael Kerrisk_ 2010.pdf 7M15-Aug-2011 06:50
The Tangled Web_ A Guide to Securing Modern Web Applications_ Michal Zalewski_ 2011.epub 2M17-Oct-2012 19:10
The Text Mining Handbook_ Advanced Approaches in Analyzing Unstructured Data_ Ronen Feldman_ James Sanger_ 2006.pdf 5M15-Aug-2011 07:07
The Theory of Matrices_ With Applications_ 2nd Ed_ Peter Lancaster_ Miron Tismenetsky_ 1985.djvu 5M15-Jul-2011 07:41
Top 10 algorithms in data mining_ X Wu_ V Kumar_ J R Quinlan_ J Ghosh_ Q Yang_ H Motoda_ 2007.pdf 783K19-Dec-2012 02:44
Tor_ The Second-Generation Onion Router_ R Dingledine_ N Mathewson_ P Syverson.pdf 171K03-Feb-2016 01:42
Transparent Firewall_ Filtering Bridge_ pfSense 2_ William Tarrh_ 2013.pdf 375K30-Dec-2016 10:06
UEFI_ Unified Extensible Firmware Interface Specification_ 2v5_ 2015.pdf 20M07-Mar-2017 15:37
UNIX Network Programming_ Vol 2_ Interprocess Communications_ 2nd Ed_ W Richard Stevens_ 1998.djvu 6M15-Aug-2011 07:00
USBee_ Air-Gate Convert-Channel via Electromagnetic Emissions form USB_ M Guri_ M Monitz_ Y Elovici_ 2016.pdf 1017K06-Sep-2016 13:46
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations_ C V Wright_ L Ballard_ S E Coull_ F Monrose_ G M ..> 2M28-Sep-2012 23:32
Understanding FFT Applications_ 2nd ed_ Anders E Zonst_ 2004.djvu 3M19-Jan-2014 18:57
Understanding IPv6_ Youngsong Mun_ Hyewon Keren Lee_ 2005.pdf 16M01-Sep-2011 10:38
Understanding Linux Network Internals_ Christian Benvenuti_ 2006.pdf 18M15-Aug-2011 06:59
Understanding the Linux Kernel_ 3rd Ed_ Daniel P Bovet_ Marco Cesati_ 2005.pdf 5M15-Aug-2011 06:58
Understanding the bin, sbin, usr_bin , usr_sbin split.html 691728-Jan-2012 08:42
Unix Network Programming_ Vol 1_ The Sockets Networking API_ 3rd Ed_ W Richard Stevens_ 2003.chm 5M15-Aug-2011 06:40
Using Perl for Statistics_ Data Processing and Statistical Computing_ v11i01.pdf 1M01-Mar-2011 00:20
Vi for nano users_ Markus Schnalke.pdf 756105-Mar-2013 18:25
Web_ Graphics_ Perl TK_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf 4M14-Jul-2011 05:55
What Is EPUB 3_ Matt Garrish_ 2011.pdf 399K10-Oct-2011 15:19
Writing Linux Device Drivers_ a guide with exercises_ Dr Jerry Cooperstein_ 2009.pdf 18M15-Aug-2011 06:54
You Can Type, but You Cant Hide_ A Stealthy GPU-based Keylogger_ E Ladakis_ L Koromilas_ G Vasiliadis_ M Polychronaki..> 345K15-Sep-2013 10:08
Zero Reserve_ A Distributed Exchange Platform_ anu_ 2013.pdf 124K19-Dec-2013 14:03
ePub Straight to the Point_ Elizabeth Castro_ 2010.pdf 7M25-Mar-2012 18:30
nooshare cryptocurrency_ overview_ 2012.pdf 307K19-Feb-2012 03:58
pci21.pdf 3M28-Jul-2011 12:56
pci23.pdf 4M28-Jul-2011 12:56
spiPhone_ Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers_ P Traynor et al_ 2011.pdf 610K27-Sep-2013 18:53