Index of /sites/erewhon.superkuh.com/library/Computing

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]2014 Internet Peering Playbook.epub2016-10-21 12:08 7.9M 
[   ]A2_ Analog Malicious Hardware_ K Yang_ M Hicks_ Q Dong_ T Austin_ D Sylvester_ 2016.pdf2016-05-25 08:40 2.6M 
[IMG]A Discipline of Programming_ Edsger Dijkstra_ 1976.djvu2011-10-25 15:59 1.6M 
[   ]A Large-Scale Study of Flash Memory Failures in the Field_ Facebook 2015.pdf2015-06-24 02:51 6.3M 
[   ]A Peek on Numerical Programming in Perl and Python_ E Christopher Dyken_ 2005.pdf2011-10-23 18:35 100K 
[   ]A Primer on Scientific Programming with Python_ 2nd Ed_ Hans Petter Langtangen_ 2011.pdf2011-10-25 16:01 5.0M 
[   ]ASLR on the Line_ Practical Cache Attacks on the MMU_ Ben Gras_ Kaveh Razavi_ Erik Bosman_ Herbert Bos_ Cristiano Giuffrida_ 2017.pdf2017-02-15 08:27 771K 
[   ]Abrupt rise of new machine ecology beyond human response time_ Neil Johnson_ Guannan Zhao_ Eric Hunsader_ Hong Qi_ Nicholas Johnson_ Jing Meng_ Brian Tivnan_ SciRep 2013.pdf2013-09-13 04:49 1.3M 
[   ]Accessible EPUB 3_ Matt_Garrish_ 2012.pdf2012-03-25 11:23 3.2M 
[   ]Accessorize to a Crime_ Real and Stealthy Attacks on State-of-the-Art Face Recognition_ Mahmood Sharif_ Sruti Bhagavatula_ Lujo Bauer_ Michael K Reiter_ 2016.pdf2016-11-02 12:10 4.2M 
[   ]Against the Law_ Countering Lawful Abuses of Digital Surveillance_ Andrew bunnie Huang_ Edward Snoden_ 2016.pdf2016-09-08 01:41 8.2M 
[   ]An Analysis of Chinas Great Cannon_ Marczak et al_ foci 2015.pdf2015-09-04 22:53 695K 
[   ]An Industrial-Strength Audio Search Algorithm_ Avery Li-Chun Wang_ Shazam.pdf2015-07-17 15:31 477K 
[   ]Applied Mathematical Programming_ Stephen P Bradley_ Arnoldo C Hax_ Thomas L Magnanti_ 1977.pdf2011-10-25 15:58 35M 
[   ]Automating System Administration with Perl_ Tools to Make You More Efficient_ David N Blank-Edelman_ 2009.epub2011-07-13 22:44 2.4M 
[   ]Beginning PDL_ Xavier Calbet_ 2001.pdf2011-10-24 19:23 422K 
[   ]Bitcoin_ A Peer-to-Peer Electronic Cash System_ Satoshi Nakamoto.pdf2011-09-27 03:24 180K 
[   ]Bitcoin and Cryptocurrency Technologies_ A Narayanan_ J Bonneau E Felten_ A Miller_ S Goldfeder_ 2016.pdf2016-02-10 09:39 18M 
[   ]Breaking and Improving Protocol Obfuscation_ Erik Hjelmvik_ Wolfgang John_ 2010.pdf2012-05-05 06:03 682K 
[   ]Circuit Fingerprinting Attacks_ Passive Deanonymization of Tor Hidden Services_ Albert Kwon_ Mashael AlSabah_ David Lazar_ Marc Dacier_ Srinivas Devadas_ 2015.pdf2015-09-22 09:56 523K 
[   ]Computer Algebra Recipes for Mathematical Physics_ Richard H Enns_ 2004.pdf2011-10-25 15:56 3.8M 
[IMG]Computer Methods for Ordinary Differential Equations and Differential-Algebraic Equations_ L R Petzold_ SIAM Society for Industrial and Applied Mathematics_ 1998.djvu2012-02-27 04:07 1.8M 
[   ]Concrete Mathematics_ A Foundation for Computer Science_ 2nd Ed_ Ronald L Graham_ Donald E Knuth_ Oren Patashnik_ 1994.pdf2011-10-25 16:04 5.4M 
[   ]Cryptographically secure shields_ J M Cioranesco_ J L Danger_ T Graba_ S Guilley_ Y Mathieu_ D Naccache_ X T Ngo_ HST 2014.pdf2016-09-14 05:07 1.4M 
[   ]CyberWarfare CyberComplacency_ is hollywoods blueprint for chaos coming true_ Mark Osborne_ 2013.pdf2016-09-22 14:34 15M 
[   ]DNS & BIND Cookbook_ Cricket Liu.chm2011-08-15 00:01 576K 
[   ]DNS and BIND_ 5th Ed_ Cricket Liu_ Paul Albitz_ 2006.chm2011-08-14 23:53 2.4M 
[   ]DNS and BIND on IPv6_ Cricket Liu_ 2011.pdf2011-08-15 00:00 4.1M 
[   ]Decentralized Anonymous Credentials_ Christina Garman_ Matthew Green_ Ian Miers_ 2013.pdf2013-11-03 19:21 595K 
[   ]Dedup Est Machina_ Memory Deduplication as an Advanced Exploitation Vector_ E Bosman_ K Razavi_ H Bos_ C Giuffrida_ sp16_ 2016.pdf2016-05-28 01:25 547K 
[   ]Digital Design_ Verilog_ An Embedded Systems Approach Using Verilog_ Peter J Ashenden_ 2007.pdf2013-01-02 20:37 2.0M 
[   ]Digital Signal Processing using Stream High Performance Computing_ A 512-Input Broadband Correlator for Radio Astronomy_ arxiv14113751.pdf2015-06-08 15:41 5.7M 
[   ]DiskFiltration_ Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise_ arxiv160803431v1.pdf2016-08-12 09:35 3.2M 
[   ]Effective Perl Programming_ Ways to Write Better More Idiomatic Perl_ 2nd Ed_ Joseph N Hall_ Joshua A McAdams_ brian d foy_ 2010.pdf2011-07-13 22:56 1.5M 
[   ]Effective awk Programming_ 3rd Ed_ Arnold Robbins_ 2001.pdf2011-08-14 23:51 2.4M 
[   ]Efficient BackProp_ Yann LeCun_ Leon Bottou_ Genevieve B Orr_ Klaus-Rober Muller_ 1998.pdf2013-03-22 01:05 500K 
[   ]Equation Group_ Questions and Answers_ HDD Firmware Trojans_ ver 15_ Kaspersky 2015.pdf2016-11-08 22:58 4.0M 
[   ]Essential Linux Device Drivers_ Sreekrishnan Venkateswaran_ 2008.chm2011-08-14 23:55 4.1M 
[   ]FM 99.9 Radio Virus_ Exploiting FM Radio Broadcasts for Malware Deployment_ E Fernandes_ B Crispo_ M Conti_ 2013.pdf2015-12-02 16:34 750K 
[   ]Fansmitter_ Acoustic Data Exfiltration from Speakerless Air-Gapped Computers_ Mordechai Guri_ Yosef Solewicz_ Andrey Daidakulov_ Yuval Elovici Ben-Gurion_ arxiv160605915v1.pdf2016-06-27 16:24 2.1M 
[   ]Fast String Searching_ Andrew Hume_ Daniel Sunday_ 1991.pdf2011-08-09 10:06 204K 
[   ]Flash Reliability in Production_ The Expected and the Unexpected_ B Schroeder_ R Lagisetty_ A Merchent_ Google_ 2016.pdf2016-03-12 19:44 2.1M 
[   ]Flipping Bits in Memory Without Accessing Them_ An Experimental Study of DRAM Disturbance Errors_ Yoongu Kim_ Ross Daly_ Jeremie Kim_ Chris Fallin_ Ji Hye Lee_ Donghyuk Lee_ Chris Wilkerson_ Konrad Lai_ Onur Mutlu_ 2014.pdf2014-12-23 16:12 828K 
[   ]Forced Decryption as a Foregone Conclusion_ Dan Terzian_ 2015.pdf2017-03-20 19:25 217K 
[   ]Fundamentals of Scientific Computing_ Bertil Gustafsson_ 2011.pdf2011-07-14 23:15 3.8M 
[   ]Games Diversions & Perl Culture_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf2011-07-13 22:50 4.4M 
[   ]Hacking the Cable Modem_ Ryan Harris_ 2006.pdf2014-01-19 11:04 16M 
[   ]Higher-Order Perl_ Mark Jason Dominus.epub2013-01-05 22:53 1.6M 
[   ]Higher-Order Perl_ Transforming Programs with Programs_ Mark Jason Dominus_ 2005.pdf2011-07-13 22:48 1.9M 
[   ]Honeypots_ A New Paradigm to Information Security_ R C Joshi_ Anjali Sardana_ 2011.pdf2011-10-04 17:44 3.6M 
[   ]IEMI Threats for Information Security_ Remote Command Injection on Modern Smartphones_ Chaouki Kasmi_ Jose Lopes Esteves_ 2015.pdf2015-10-17 21:08 239K 
[   ]Imperfect Forward Secrecy_ How Diffie-Hellman Fails in Practice_ D Adrian_ K Bhargavan_ Z Curumeric_ P Gaudry_ M Green_ J A Halderman_ N Heniger_ D Springall_ E Thome_ L Valenta_ B VanderSloot_ E Wustrow_ S Zanella-Beguelin_ P Zimmerman2015-10-14 20:47 1.3M 
[   ]Inside the Machine_ An Illustrated Introduction to Microprocessors and Computer Architecture_ Jon Stokes_ 2006.pdf2013-11-26 22:44 9.8M 
[   ]Instruction latencies and throughput for AMD and Intel x86 processors_ Torbjorn Granlund_ 2017.pdf2017-06-04 11:25 204K 
[   ]Intel ME - Two Years Later_ Igor Skochinsky_ 2014.pdf2016-11-11 02:03 1.1M 
[   ]Introduction to Algorithms_ 3rd Ed_ Thomas H Cormen_ Charles E Leiserson_ Ronald L Rivest_ Clifford Stein_ 2009.pdf2011-08-30 22:33 5.2M 
[IMG]Introduction to Automata Theory_ Languages_ and Computation_ 2nd Ed_ John E Hopcroft_ Rajeev Motwani_ Jeffrey D Ullman_ 2001.djvu2011-08-30 22:30 16M 
[   ]Introduction to Scientific Programming and Simulation using R_ Owen Jones_ Robert Maillardet_ Andrew Robinson_ 2009.pdf2011-10-25 16:05 7.7M 
[   ]Introduction to Scilab_ 2010.pdf2011-10-24 19:38 1.2M 
[IMG]Introduction to the Theory of Computation_ 2nd Ed_ Michael Sipser_ 2005.djvu2011-08-11 17:50 5.0M 
[   ]Joe Pardue - C Programming For Microcontrollers.pdf2011-11-21 13:04 4.0M 
[   ]Key Reinstallation Attacks_ Forcing Nonce Reuse in WPA2_ Mathy Vanhoef_ Frank Piessens_ 2017.pdf2017-10-16 21:09 627K 
[   ]Keystroke Recognition Using WiFi Signals_ Kamran Ali_ Alex X Liu_ Wei Wang_ Muhammad Shahzad_ 2015.pdf2016-08-24 21:18 1.0M 
[   ]LED-it-GO_ Leaking a lot of Data from Air-Gapped Computers via the HDD LED_ M Guri_ B Zadov_ E Atias_ Y Elovici_ 2017.pdf2017-02-27 07:13 1.9M 
[   ]LIRA_ Lightweight Incentivized Routing for Anonymity_ Rob Jasen_ Aaron Johnson_ Paul Syverson_ US-NRL 2013.pdf2013-09-21 13:30 1.1M 
[   ]Learning Perl Tk_ Graphical User Interfaces with Perl_ Nancy Walsh_ 1999.pdf2011-07-13 22:52 3.9M 
[   ]Learning Perl_ 6th Edition_ Randal L Schwartz_ Brian D Foy_ Tom Phoenix_ 2011.pdf2011-07-13 22:45 7.5M 
[   ]Learning to Win by Reading Manuals in a Monte-Carlo Framework_ S R K Branavan_ D Silver_ R Barzilay_ acl_2011.pdf2012-01-01 17:59 359K 
[   ]Lest We Remember_ Cold Boot Attacks on Encryption Keys_ J A Halderman_ S D Schoen_ N Heniger_ W Clarkson_ W Paul_ J A Calandrino_ A J Feldman_ J Appelbaum_ E W Felten_ 2008.pdf2014-11-05 15:13 2.7M 
[   ]Linux Device Drivers_ 3rd Ed_ Jonathan Corbet_ 2005.pdf2011-08-14 23:56 12M 
[   ]Mastering Perl Tk_ Stephen O Lidie_ Nancy Walsh_ 2002.chm2011-07-13 22:46 3.3M 
[   ]Mastering Perl_ Brian D Foy_ 2007.pdf2011-08-15 00:19 7.4M 
[   ]Mastering Perl for Bioinformatics_ James D Tisdall_ 2003.chm2011-08-15 00:14 717K 
[IMG]Mathematical Introduction to Linear Programming and Game Theory_ Louis Brickman_ 1998.djvu2011-10-25 15:59 955K 
[IMG]Mathematical Structures for Computer Science_ A Modern Treatment of Discrete Mathematics_ 5th Ed_ Judith L Gersting_ 2002.djvu2011-10-25 16:02 6.8M 
[   ]Matplotlib for Python Developers_ Sandro Tosi_ 2009.pdf2012-09-02 03:12 12M 
[   ]Methods in Medical Informatics_ Fundamentals of Healthcare Programming in Perl, Python, and Ruby_ Jules J Berman_ 2010.pdf2011-10-25 15:58 5.9M 
[   ]Minimal Perl For UNIX and Linux People_ Tim Maher_ 2007.pdf2017-11-29 21:38 5.7M 
[   ]Modern Perl_ Chromatic_ 2010.pdf2011-07-13 22:42 1.5M 
[   ]Modern Perl_ Chromatic_ 2012.pdf2012-02-28 18:35 1.1M 
[   ]Modern Perl_ Chromatic_ 2014.pdf2015-11-06 06:23 791K 
[   ]Numerical Recipes_ The Art of Scientific Computing_ 3rd Ed_ William H Press_ Saul A Teukolsky_ William T Vetterling_ Brian P Flannery_ 2007.pdf2011-07-15 00:43 20M 
[   ]On Covert Acoustical Mesh Networks in Air_ Michael Hanspach_ Michael Goetz_ 2013.pdf2013-11-25 10:18 3.2M 
[   ]On Rationomics_ An Analysis into the Workings of a Bit Torrent Trackers Economy and Its Composition_ oorza_ 2008.pdf2012-03-18 19:25 104K 
[   ]PCI.Local.Bus.Specification.Revision.3.0.pdf2011-07-28 05:56 3.0M 
[   ]PCI_22.pdf2011-07-28 05:57 3.7M 
[   ]PDL Book_ 2012-02-05.pdf2012-02-06 07:34 7.8M 
[   ]PDL_ Scientific Programming in Perl_ 2001.pdf2011-10-24 19:25 2.1M 
[   ]PDL for impatient IDL users_ Craig DeForest_ 2006_ switchers.pdf2011-10-24 19:25 188K 
[   ]Packet Guide to Routing and Switching_ Bruce Hartpence_ 2011.pdf2011-09-09 21:54 7.4M 
[   ]Perl & LWP_ Sean M Burke_ 2002.chm2011-08-15 00:18 657K 
[   ]Perl Cookbook_ 2nd Ed_ Tom Christiansen_ 2003.chm2011-07-13 23:02 1.5M 
[   ]Perl Medic_ Transforming Legacy Code_ Peter J Scott_ 2004.chm2011-07-13 22:47 1.2M 
[   ]Perl Moose_ A Guide to the Revolution_ Ricardo Signes_ 2011.pdf2011-07-26 12:08 6.7M 
[   ]Physical random bit generation from chaotic solitary laser diode_ arxiv14063005.pdf2014-06-14 23:35 410K 
[   ]P might equal NP_ Scott Aaronson_ 2016.pdf2017-01-05 05:05 928K 
[   ]Practical Text Mining with Perl_ Roger Bilisoly_ 2008.pdf2011-08-15 00:12 17M 
[   ]Predicting, Decrypting, and Abusing WPA2 80211 Group Keys_ Mathy Vanhoef_ Frank Piessens_ 2016.pdf2017-10-15 17:38 1.0M 
[   ]Principles of Uncertainty.pdf2011-05-24 03:56 2.8M 
[   ]Programming from the Ground Up_ Jonathan Bartlett_ 2003.pdf2012-04-05 10:17 1.3M 
[IMG]Purely Functional Data Structures_ Chris Okasaki_ 1999.djvu2011-11-15 08:05 1.6M 
[   ]Quantum Computing since Democritus_ Scott Aaronson_ 2013.pdf2013-07-19 17:27 3.2M 
[   ]RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis_ Daniel Genkin_ Adi Shamir_ Eran Tromer_ 2013.pdf2013-12-18 11:16 7.7M 
[   ]Report on Smartphone Encryption and Public Safety_ Manhattan District Attorneys Office_ 2015.pdf2015-11-22 10:53 666K 
[   ]Reverse Engineering x86 Processor Microcode_ P Koppe et al_ sec17_ 2017 .pdf2017-09-01 02:13 2.5M 
[   ]Reversing Stealthy Dopant-Level Circuits_ T Sugawara_ D Suzuki_ R Fujii_ S Tawa_ R Hori_ M Shiozaki_ T Fujino_ IACR 2014.pdf2014-07-03 22:29 6.5M 
[   ]Ring Confidential Transactions_ Anonymous Blockchain Cryptocurrencies_ Shen Noether_ 2015.pdf2016-08-31 18:22 489K 
[   ]Scientific Computing_ An Introductory Survey_ Michael T Heath_ 1997.pdf2011-10-25 16:06 2.0M 
[TXT]Scripting Languages Compared_ PHP Perl Python Ruby_Hyperpolyglot.html2018-03-02 21:42 338K 
[   ]Security and Privacy Vulnerabilities of In-Car Wireless Networks_ A Tire Pressure MOnitoring System Case Study_ Ivan Seskar et al_ 2013.pdf2013-11-03 01:33 1.2M 
[IMG]Simulating Analyzing and Animating Dynamical Systems_ A Guide to XPPAUT for Researchers and Students_ Bard Ermentrout_ 2009.djvu2011-08-24 21:06 2.8M 
[   ]Stealing Keys from PCs using a Radio_ Cheap Electromagnetic Attacks on WIndowed Exponentiation_ D Genkin_ L Pachmanov_ I Pipman_ E Tromer_ 2015.pdf2017-03-29 18:39 2.0M 
[   ]Stealthy Dopant-Level Hardware Trojans_ George T Becker_ Francessco Regazzoni_ Christof Paar_ Wayne P Burleson_ 2013.pdf2013-09-14 09:50 433K 
[   ]StegTorrent_ a Steganographic Method for P2P File Sharing Service_ arxiv13034264.pdf2013-08-13 19:43 685K 
[   ]Structure and Interpretation of Computer Programs_ 2nd Ed_ Harold Abelson_ 1996.pdf2011-08-06 17:27 4.4M 
[   ]Survey of Text Mining_ Clustering Classification and Retrieval_ Michael W Berry_ 2003.pdf2011-08-15 00:08 5.8M 
[   ]Survey of Text Mining_ II_ Clustering Classification and Retrieval_ Michael W Berry_ Malu Castellanos_ 2007.pdf2011-08-15 00:09 2.9M 
[   ]TRESOR-HUNT_ Attacking CPU-Bound Encryption_ Erik-Oliver Blass_ William Robertson_ 2012.pdf2016-02-25 05:21 246K 
[   ]Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks_ R Rasti_ M Murthy_ N Weaver_ V Paxson_ 2015.pdf2016-07-22 02:51 1.4M 
[   ]Text Mining_ Applications and Theory_ Michael W Berry_ Jacob Kogan_ 2010.pdf2011-08-15 00:09 2.4M 
[   ]Text Mining_ Classification Clustering and Applications_ Ashok Srivastava_ Mehran Sahami_ 2009.pdf2011-08-15 00:12 4.4M 
[   ]The Algorithm Design Manual_ 2nd Ed_ Steven S Skiena_ 2008.pdf2011-08-30 21:57 3.9M 
[IMG]The Art of Computer Programming_ Vol 1_ Fundamental Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu2011-10-25 15:53 5.5M 
[IMG]The Art of Computer Programming_ Vol 2_ Seminumerical Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu2011-10-25 15:52 6.9M 
[IMG]The Art of Computer Programming_ Vol 3_ Sorting and Searching_ Donald E Knuth_ 1973.djvu2011-10-25 15:55 7.1M 
[   ]The Complete ESP8266 Psionics Handbook_ Thotcon 2016.pdf2016-06-22 22:24 6.4M 
[   ]The Elements of Computing Systems_ Building a Modern Computer from First Principles_ Noam Nisan_ Shimon Schocken_ 2005.epub2012-04-04 14:01 4.3M 
[   ]The Linux Programming Interface_ A Linux and UNIX System Programming Handbook_ Michael Kerrisk_ 2010.pdf2011-08-14 23:50 6.9M 
[   ]The Tangled Web_ A Guide to Securing Modern Web Applications_ Michal Zalewski_ 2011.epub2012-10-17 12:10 1.9M 
[   ]The Text Mining Handbook_ Advanced Approaches in Analyzing Unstructured Data_ Ronen Feldman_ James Sanger_ 2006.pdf2011-08-15 00:07 4.8M 
[IMG]The Theory of Matrices_ With Applications_ 2nd Ed_ Peter Lancaster_ Miron Tismenetsky_ 1985.djvu2011-07-15 00:41 5.4M 
[   ]Top 10 algorithms in data mining_ X Wu_ V Kumar_ J R Quinlan_ J Ghosh_ Q Yang_ H Motoda_ 2007.pdf2012-12-18 18:44 783K 
[   ]Tor_ The Second-Generation Onion Router_ R Dingledine_ N Mathewson_ P Syverson.pdf2016-02-02 17:42 171K 
[   ]Transparent Firewall_ Filtering Bridge_ pfSense 2_ William Tarrh_ 2013.pdf2016-12-30 02:06 375K 
[   ]UEFI_ Unified Extensible Firmware Interface Specification_ 2v5_ 2015.pdf2017-03-07 07:37 20M 
[IMG]UNIX Network Programming_ Vol 2_ Interprocess Communications_ 2nd Ed_ W Richard Stevens_ 1998.djvu2011-08-15 00:00 5.7M 
[   ]USBee_ Air-Gate Convert-Channel via Electromagnetic Emissions form USB_ M Guri_ M Monitz_ Y Elovici_ 2016.pdf2016-09-06 06:46 1.0M 
[   ]Uncovering Spoken Phrases in Encrypted Voice over IP Conversations_ C V Wright_ L Ballard_ S E Coull_ F Monrose_ G M Masson_ 2010.pdf2012-09-28 16:32 2.0M 
[IMG]Understanding FFT Applications_ 2nd ed_ Anders E Zonst_ 2004.djvu2014-01-19 10:57 2.6M 
[   ]Understanding IPv6_ Youngsong Mun_ Hyewon Keren Lee_ 2005.pdf2011-09-01 03:38 16M 
[   ]Understanding Linux Network Internals_ Christian Benvenuti_ 2006.pdf2011-08-14 23:59 18M 
[   ]Understanding the Linux Kernel_ 3rd Ed_ Daniel P Bovet_ Marco Cesati_ 2005.pdf2011-08-14 23:58 4.8M 
[TXT]Understanding the bin, sbin, usr_bin , usr_sbin split.html2018-03-02 21:44 6.8K 
[   ]Unix Network Programming_ Vol 1_ The Sockets Networking API_ 3rd Ed_ W Richard Stevens_ 2003.chm2011-08-14 23:40 5.4M 
[   ]Using Perl for Statistics_ Data Processing and Statistical Computing_ v11i01.pdf2011-02-28 16:20 1.1M 
[   ]Vi for nano users_ Markus Schnalke.pdf2013-03-05 10:25 7.4K 
[   ]Web_ Graphics_ Perl TK_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf2011-07-13 22:55 4.0M 
[   ]What Is EPUB 3_ Matt Garrish_ 2011.pdf2011-10-10 08:19 399K 
[   ]Writing Linux Device Drivers_ a guide with exercises_ Dr Jerry Cooperstein_ 2009.pdf2011-08-14 23:54 18M 
[   ]You Can Type, but You Cant Hide_ A Stealthy GPU-based Keylogger_ E Ladakis_ L Koromilas_ G Vasiliadis_ M Polychronakis_ S Loannidis_ eurosec 2013.pdf2013-09-15 03:08 345K 
[   ]Zero Reserve_ A Distributed Exchange Platform_ anu_ 2013.pdf2013-12-19 06:03 124K 
[   ]ePub Straight to the Point_ Elizabeth Castro_ 2010.pdf2012-03-25 11:30 7.5M 
[   ]nooshare cryptocurrency_ overview_ 2012.pdf2012-02-18 19:58 307K 
[   ]pci21.pdf2011-07-28 05:56 2.8M 
[   ]pci23.pdf2011-07-28 05:56 4.3M 
[   ]spiPhone_ Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers_ P Traynor et al_ 2011.pdf2013-09-27 11:53 610K 

Apache/2.4.18 (Ubuntu) Server at mirror.thelifeofkenneth.com Port 80