Index of /sites/erewhon.superkuh.com/library/Computing
Name
Last modified
Size
Description
Parent Directory
-
2014 Internet Peering Playbook.epub
2016-10-21 12:08
7.9M
A2_ Analog Malicious Hardware_ K Yang_ M Hicks_ Q Dong_ T Austin_ D Sylvester_ 2016.pdf
2016-05-25 08:40
2.6M
A Discipline of Programming_ Edsger Dijkstra_ 1976.djvu
2011-10-25 15:59
1.6M
A Large-Scale Study of Flash Memory Failures in the Field_ Facebook 2015.pdf
2015-06-24 02:51
6.3M
A Peek on Numerical Programming in Perl and Python_ E Christopher Dyken_ 2005.pdf
2011-10-23 18:35
100K
A Primer on Scientific Programming with Python_ 2nd Ed_ Hans Petter Langtangen_ 2011.pdf
2011-10-25 16:01
5.0M
ASLR on the Line_ Practical Cache Attacks on the MMU_ Ben Gras_ Kaveh Razavi_ Erik Bosman_ Herbert Bos_ Cristiano Giuffrida_ 2017.pdf
2017-02-15 08:27
771K
Abrupt rise of new machine ecology beyond human response time_ Neil Johnson_ Guannan Zhao_ Eric Hunsader_ Hong Qi_ Nicholas Johnson_ Jing Meng_ Brian Tivnan_ SciRep 2013.pdf
2013-09-13 04:49
1.3M
Accessible EPUB 3_ Matt_Garrish_ 2012.pdf
2012-03-25 11:23
3.2M
Accessorize to a Crime_ Real and Stealthy Attacks on State-of-the-Art Face Recognition_ Mahmood Sharif_ Sruti Bhagavatula_ Lujo Bauer_ Michael K Reiter_ 2016.pdf
2016-11-02 12:10
4.2M
Against the Law_ Countering Lawful Abuses of Digital Surveillance_ Andrew bunnie Huang_ Edward Snoden_ 2016.pdf
2016-09-08 01:41
8.2M
An Analysis of Chinas Great Cannon_ Marczak et al_ foci 2015.pdf
2015-09-04 22:53
695K
An Industrial-Strength Audio Search Algorithm_ Avery Li-Chun Wang_ Shazam.pdf
2015-07-17 15:31
477K
Applied Mathematical Programming_ Stephen P Bradley_ Arnoldo C Hax_ Thomas L Magnanti_ 1977.pdf
2011-10-25 15:58
35M
Automating System Administration with Perl_ Tools to Make You More Efficient_ David N Blank-Edelman_ 2009.epub
2011-07-13 22:44
2.4M
Beginning PDL_ Xavier Calbet_ 2001.pdf
2011-10-24 19:23
422K
Bitcoin_ A Peer-to-Peer Electronic Cash System_ Satoshi Nakamoto.pdf
2011-09-27 03:24
180K
Bitcoin and Cryptocurrency Technologies_ A Narayanan_ J Bonneau E Felten_ A Miller_ S Goldfeder_ 2016.pdf
2016-02-10 09:39
18M
Breaking and Improving Protocol Obfuscation_ Erik Hjelmvik_ Wolfgang John_ 2010.pdf
2012-05-05 06:03
682K
Circuit Fingerprinting Attacks_ Passive Deanonymization of Tor Hidden Services_ Albert Kwon_ Mashael AlSabah_ David Lazar_ Marc Dacier_ Srinivas Devadas_ 2015.pdf
2015-09-22 09:56
523K
Computer Algebra Recipes for Mathematical Physics_ Richard H Enns_ 2004.pdf
2011-10-25 15:56
3.8M
Computer Methods for Ordinary Differential Equations and Differential-Algebraic Equations_ L R Petzold_ SIAM Society for Industrial and Applied Mathematics_ 1998.djvu
2012-02-27 04:07
1.8M
Concrete Mathematics_ A Foundation for Computer Science_ 2nd Ed_ Ronald L Graham_ Donald E Knuth_ Oren Patashnik_ 1994.pdf
2011-10-25 16:04
5.4M
Cryptographically secure shields_ J M Cioranesco_ J L Danger_ T Graba_ S Guilley_ Y Mathieu_ D Naccache_ X T Ngo_ HST 2014.pdf
2016-09-14 05:07
1.4M
CyberWarfare CyberComplacency_ is hollywoods blueprint for chaos coming true_ Mark Osborne_ 2013.pdf
2016-09-22 14:34
15M
DNS & BIND Cookbook_ Cricket Liu.chm
2011-08-15 00:01
576K
DNS and BIND_ 5th Ed_ Cricket Liu_ Paul Albitz_ 2006.chm
2011-08-14 23:53
2.4M
DNS and BIND on IPv6_ Cricket Liu_ 2011.pdf
2011-08-15 00:00
4.1M
Decentralized Anonymous Credentials_ Christina Garman_ Matthew Green_ Ian Miers_ 2013.pdf
2013-11-03 19:21
595K
Dedup Est Machina_ Memory Deduplication as an Advanced Exploitation Vector_ E Bosman_ K Razavi_ H Bos_ C Giuffrida_ sp16_ 2016.pdf
2016-05-28 01:25
547K
Digital Design_ Verilog_ An Embedded Systems Approach Using Verilog_ Peter J Ashenden_ 2007.pdf
2013-01-02 20:37
2.0M
Digital Signal Processing using Stream High Performance Computing_ A 512-Input Broadband Correlator for Radio Astronomy_ arxiv14113751.pdf
2015-06-08 15:41
5.7M
DiskFiltration_ Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise_ arxiv160803431v1.pdf
2016-08-12 09:35
3.2M
Effective Perl Programming_ Ways to Write Better More Idiomatic Perl_ 2nd Ed_ Joseph N Hall_ Joshua A McAdams_ brian d foy_ 2010.pdf
2011-07-13 22:56
1.5M
Effective awk Programming_ 3rd Ed_ Arnold Robbins_ 2001.pdf
2011-08-14 23:51
2.4M
Efficient BackProp_ Yann LeCun_ Leon Bottou_ Genevieve B Orr_ Klaus-Rober Muller_ 1998.pdf
2013-03-22 01:05
500K
Equation Group_ Questions and Answers_ HDD Firmware Trojans_ ver 15_ Kaspersky 2015.pdf
2016-11-08 22:58
4.0M
Essential Linux Device Drivers_ Sreekrishnan Venkateswaran_ 2008.chm
2011-08-14 23:55
4.1M
FM 99.9 Radio Virus_ Exploiting FM Radio Broadcasts for Malware Deployment_ E Fernandes_ B Crispo_ M Conti_ 2013.pdf
2015-12-02 16:34
750K
Fansmitter_ Acoustic Data Exfiltration from Speakerless Air-Gapped Computers_ Mordechai Guri_ Yosef Solewicz_ Andrey Daidakulov_ Yuval Elovici Ben-Gurion_ arxiv160605915v1.pdf
2016-06-27 16:24
2.1M
Fast String Searching_ Andrew Hume_ Daniel Sunday_ 1991.pdf
2011-08-09 10:06
204K
Flash Reliability in Production_ The Expected and the Unexpected_ B Schroeder_ R Lagisetty_ A Merchent_ Google_ 2016.pdf
2016-03-12 19:44
2.1M
Flipping Bits in Memory Without Accessing Them_ An Experimental Study of DRAM Disturbance Errors_ Yoongu Kim_ Ross Daly_ Jeremie Kim_ Chris Fallin_ Ji Hye Lee_ Donghyuk Lee_ Chris Wilkerson_ Konrad Lai_ Onur Mutlu_ 2014.pdf
2014-12-23 16:12
828K
Forced Decryption as a Foregone Conclusion_ Dan Terzian_ 2015.pdf
2017-03-20 19:25
217K
Fundamentals of Scientific Computing_ Bertil Gustafsson_ 2011.pdf
2011-07-14 23:15
3.8M
Games Diversions & Perl Culture_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf
2011-07-13 22:50
4.4M
Hacking the Cable Modem_ Ryan Harris_ 2006.pdf
2014-01-19 11:04
16M
Higher-Order Perl_ Mark Jason Dominus.epub
2013-01-05 22:53
1.6M
Higher-Order Perl_ Transforming Programs with Programs_ Mark Jason Dominus_ 2005.pdf
2011-07-13 22:48
1.9M
Honeypots_ A New Paradigm to Information Security_ R C Joshi_ Anjali Sardana_ 2011.pdf
2011-10-04 17:44
3.6M
IEMI Threats for Information Security_ Remote Command Injection on Modern Smartphones_ Chaouki Kasmi_ Jose Lopes Esteves_ 2015.pdf
2015-10-17 21:08
239K
Imperfect Forward Secrecy_ How Diffie-Hellman Fails in Practice_ D Adrian_ K Bhargavan_ Z Curumeric_ P Gaudry_ M Green_ J A Halderman_ N Heniger_ D Springall_ E Thome_ L Valenta_ B VanderSloot_ E Wustrow_ S Zanella-Beguelin_ P Zimmerman
2015-10-14 20:47
1.3M
Inside the Machine_ An Illustrated Introduction to Microprocessors and Computer Architecture_ Jon Stokes_ 2006.pdf
2013-11-26 22:44
9.8M
Instruction latencies and throughput for AMD and Intel x86 processors_ Torbjorn Granlund_ 2017.pdf
2017-06-04 11:25
204K
Intel ME - Two Years Later_ Igor Skochinsky_ 2014.pdf
2016-11-11 02:03
1.1M
Introduction to Algorithms_ 3rd Ed_ Thomas H Cormen_ Charles E Leiserson_ Ronald L Rivest_ Clifford Stein_ 2009.pdf
2011-08-30 22:33
5.2M
Introduction to Automata Theory_ Languages_ and Computation_ 2nd Ed_ John E Hopcroft_ Rajeev Motwani_ Jeffrey D Ullman_ 2001.djvu
2011-08-30 22:30
16M
Introduction to Scientific Programming and Simulation using R_ Owen Jones_ Robert Maillardet_ Andrew Robinson_ 2009.pdf
2011-10-25 16:05
7.7M
Introduction to Scilab_ 2010.pdf
2011-10-24 19:38
1.2M
Introduction to the Theory of Computation_ 2nd Ed_ Michael Sipser_ 2005.djvu
2011-08-11 17:50
5.0M
Joe Pardue - C Programming For Microcontrollers.pdf
2011-11-21 13:04
4.0M
Key Reinstallation Attacks_ Forcing Nonce Reuse in WPA2_ Mathy Vanhoef_ Frank Piessens_ 2017.pdf
2017-10-16 21:09
627K
Keystroke Recognition Using WiFi Signals_ Kamran Ali_ Alex X Liu_ Wei Wang_ Muhammad Shahzad_ 2015.pdf
2016-08-24 21:18
1.0M
LED-it-GO_ Leaking a lot of Data from Air-Gapped Computers via the HDD LED_ M Guri_ B Zadov_ E Atias_ Y Elovici_ 2017.pdf
2017-02-27 07:13
1.9M
LIRA_ Lightweight Incentivized Routing for Anonymity_ Rob Jasen_ Aaron Johnson_ Paul Syverson_ US-NRL 2013.pdf
2013-09-21 13:30
1.1M
Learning Perl Tk_ Graphical User Interfaces with Perl_ Nancy Walsh_ 1999.pdf
2011-07-13 22:52
3.9M
Learning Perl_ 6th Edition_ Randal L Schwartz_ Brian D Foy_ Tom Phoenix_ 2011.pdf
2011-07-13 22:45
7.5M
Learning to Win by Reading Manuals in a Monte-Carlo Framework_ S R K Branavan_ D Silver_ R Barzilay_ acl_2011.pdf
2012-01-01 17:59
359K
Lest We Remember_ Cold Boot Attacks on Encryption Keys_ J A Halderman_ S D Schoen_ N Heniger_ W Clarkson_ W Paul_ J A Calandrino_ A J Feldman_ J Appelbaum_ E W Felten_ 2008.pdf
2014-11-05 15:13
2.7M
Linux Device Drivers_ 3rd Ed_ Jonathan Corbet_ 2005.pdf
2011-08-14 23:56
12M
Mastering Perl Tk_ Stephen O Lidie_ Nancy Walsh_ 2002.chm
2011-07-13 22:46
3.3M
Mastering Perl_ Brian D Foy_ 2007.pdf
2011-08-15 00:19
7.4M
Mastering Perl for Bioinformatics_ James D Tisdall_ 2003.chm
2011-08-15 00:14
717K
Mathematical Introduction to Linear Programming and Game Theory_ Louis Brickman_ 1998.djvu
2011-10-25 15:59
955K
Mathematical Structures for Computer Science_ A Modern Treatment of Discrete Mathematics_ 5th Ed_ Judith L Gersting_ 2002.djvu
2011-10-25 16:02
6.8M
Matplotlib for Python Developers_ Sandro Tosi_ 2009.pdf
2012-09-02 03:12
12M
Methods in Medical Informatics_ Fundamentals of Healthcare Programming in Perl, Python, and Ruby_ Jules J Berman_ 2010.pdf
2011-10-25 15:58
5.9M
Minimal Perl For UNIX and Linux People_ Tim Maher_ 2007.pdf
2017-11-29 21:38
5.7M
Modern Perl_ Chromatic_ 2010.pdf
2011-07-13 22:42
1.5M
Modern Perl_ Chromatic_ 2012.pdf
2012-02-28 18:35
1.1M
Modern Perl_ Chromatic_ 2014.pdf
2015-11-06 06:23
791K
Numerical Recipes_ The Art of Scientific Computing_ 3rd Ed_ William H Press_ Saul A Teukolsky_ William T Vetterling_ Brian P Flannery_ 2007.pdf
2011-07-15 00:43
20M
On Covert Acoustical Mesh Networks in Air_ Michael Hanspach_ Michael Goetz_ 2013.pdf
2013-11-25 10:18
3.2M
On Rationomics_ An Analysis into the Workings of a Bit Torrent Trackers Economy and Its Composition_ oorza_ 2008.pdf
2012-03-18 19:25
104K
PCI.Local.Bus.Specification.Revision.3.0.pdf
2011-07-28 05:56
3.0M
PCI_22.pdf
2011-07-28 05:57
3.7M
PDL Book_ 2012-02-05.pdf
2012-02-06 07:34
7.8M
PDL_ Scientific Programming in Perl_ 2001.pdf
2011-10-24 19:25
2.1M
PDL for impatient IDL users_ Craig DeForest_ 2006_ switchers.pdf
2011-10-24 19:25
188K
Packet Guide to Routing and Switching_ Bruce Hartpence_ 2011.pdf
2011-09-09 21:54
7.4M
Perl & LWP_ Sean M Burke_ 2002.chm
2011-08-15 00:18
657K
Perl Cookbook_ 2nd Ed_ Tom Christiansen_ 2003.chm
2011-07-13 23:02
1.5M
Perl Medic_ Transforming Legacy Code_ Peter J Scott_ 2004.chm
2011-07-13 22:47
1.2M
Perl Moose_ A Guide to the Revolution_ Ricardo Signes_ 2011.pdf
2011-07-26 12:08
6.7M
Physical random bit generation from chaotic solitary laser diode_ arxiv14063005.pdf
2014-06-14 23:35
410K
P might equal NP_ Scott Aaronson_ 2016.pdf
2017-01-05 05:05
928K
Practical Text Mining with Perl_ Roger Bilisoly_ 2008.pdf
2011-08-15 00:12
17M
Predicting, Decrypting, and Abusing WPA2 80211 Group Keys_ Mathy Vanhoef_ Frank Piessens_ 2016.pdf
2017-10-15 17:38
1.0M
Principles of Uncertainty.pdf
2011-05-24 03:56
2.8M
Programming from the Ground Up_ Jonathan Bartlett_ 2003.pdf
2012-04-05 10:17
1.3M
Purely Functional Data Structures_ Chris Okasaki_ 1999.djvu
2011-11-15 08:05
1.6M
Quantum Computing since Democritus_ Scott Aaronson_ 2013.pdf
2013-07-19 17:27
3.2M
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis_ Daniel Genkin_ Adi Shamir_ Eran Tromer_ 2013.pdf
2013-12-18 11:16
7.7M
Report on Smartphone Encryption and Public Safety_ Manhattan District Attorneys Office_ 2015.pdf
2015-11-22 10:53
666K
Reverse Engineering x86 Processor Microcode_ P Koppe et al_ sec17_ 2017 .pdf
2017-09-01 02:13
2.5M
Reversing Stealthy Dopant-Level Circuits_ T Sugawara_ D Suzuki_ R Fujii_ S Tawa_ R Hori_ M Shiozaki_ T Fujino_ IACR 2014.pdf
2014-07-03 22:29
6.5M
Ring Confidential Transactions_ Anonymous Blockchain Cryptocurrencies_ Shen Noether_ 2015.pdf
2016-08-31 18:22
489K
Scientific Computing_ An Introductory Survey_ Michael T Heath_ 1997.pdf
2011-10-25 16:06
2.0M
Scripting Languages Compared_ PHP Perl Python Ruby_Hyperpolyglot.html
2018-03-02 21:42
338K
Security and Privacy Vulnerabilities of In-Car Wireless Networks_ A Tire Pressure MOnitoring System Case Study_ Ivan Seskar et al_ 2013.pdf
2013-11-03 01:33
1.2M
Simulating Analyzing and Animating Dynamical Systems_ A Guide to XPPAUT for Researchers and Students_ Bard Ermentrout_ 2009.djvu
2011-08-24 21:06
2.8M
Stealing Keys from PCs using a Radio_ Cheap Electromagnetic Attacks on WIndowed Exponentiation_ D Genkin_ L Pachmanov_ I Pipman_ E Tromer_ 2015.pdf
2017-03-29 18:39
2.0M
Stealthy Dopant-Level Hardware Trojans_ George T Becker_ Francessco Regazzoni_ Christof Paar_ Wayne P Burleson_ 2013.pdf
2013-09-14 09:50
433K
StegTorrent_ a Steganographic Method for P2P File Sharing Service_ arxiv13034264.pdf
2013-08-13 19:43
685K
Structure and Interpretation of Computer Programs_ 2nd Ed_ Harold Abelson_ 1996.pdf
2011-08-06 17:27
4.4M
Survey of Text Mining_ Clustering Classification and Retrieval_ Michael W Berry_ 2003.pdf
2011-08-15 00:08
5.8M
Survey of Text Mining_ II_ Clustering Classification and Retrieval_ Michael W Berry_ Malu Castellanos_ 2007.pdf
2011-08-15 00:09
2.9M
TRESOR-HUNT_ Attacking CPU-Bound Encryption_ Erik-Oliver Blass_ William Robertson_ 2012.pdf
2016-02-25 05:21
246K
Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks_ R Rasti_ M Murthy_ N Weaver_ V Paxson_ 2015.pdf
2016-07-22 02:51
1.4M
Text Mining_ Applications and Theory_ Michael W Berry_ Jacob Kogan_ 2010.pdf
2011-08-15 00:09
2.4M
Text Mining_ Classification Clustering and Applications_ Ashok Srivastava_ Mehran Sahami_ 2009.pdf
2011-08-15 00:12
4.4M
The Algorithm Design Manual_ 2nd Ed_ Steven S Skiena_ 2008.pdf
2011-08-30 21:57
3.9M
The Art of Computer Programming_ Vol 1_ Fundamental Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu
2011-10-25 15:53
5.5M
The Art of Computer Programming_ Vol 2_ Seminumerical Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu
2011-10-25 15:52
6.9M
The Art of Computer Programming_ Vol 3_ Sorting and Searching_ Donald E Knuth_ 1973.djvu
2011-10-25 15:55
7.1M
The Complete ESP8266 Psionics Handbook_ Thotcon 2016.pdf
2016-06-22 22:24
6.4M
The Elements of Computing Systems_ Building a Modern Computer from First Principles_ Noam Nisan_ Shimon Schocken_ 2005.epub
2012-04-04 14:01
4.3M
The Linux Programming Interface_ A Linux and UNIX System Programming Handbook_ Michael Kerrisk_ 2010.pdf
2011-08-14 23:50
6.9M
The Tangled Web_ A Guide to Securing Modern Web Applications_ Michal Zalewski_ 2011.epub
2012-10-17 12:10
1.9M
The Text Mining Handbook_ Advanced Approaches in Analyzing Unstructured Data_ Ronen Feldman_ James Sanger_ 2006.pdf
2011-08-15 00:07
4.8M
The Theory of Matrices_ With Applications_ 2nd Ed_ Peter Lancaster_ Miron Tismenetsky_ 1985.djvu
2011-07-15 00:41
5.4M
Top 10 algorithms in data mining_ X Wu_ V Kumar_ J R Quinlan_ J Ghosh_ Q Yang_ H Motoda_ 2007.pdf
2012-12-18 18:44
783K
Tor_ The Second-Generation Onion Router_ R Dingledine_ N Mathewson_ P Syverson.pdf
2016-02-02 17:42
171K
Transparent Firewall_ Filtering Bridge_ pfSense 2_ William Tarrh_ 2013.pdf
2016-12-30 02:06
375K
UEFI_ Unified Extensible Firmware Interface Specification_ 2v5_ 2015.pdf
2017-03-07 07:37
20M
UNIX Network Programming_ Vol 2_ Interprocess Communications_ 2nd Ed_ W Richard Stevens_ 1998.djvu
2011-08-15 00:00
5.7M
USBee_ Air-Gate Convert-Channel via Electromagnetic Emissions form USB_ M Guri_ M Monitz_ Y Elovici_ 2016.pdf
2016-09-06 06:46
1.0M
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations_ C V Wright_ L Ballard_ S E Coull_ F Monrose_ G M Masson_ 2010.pdf
2012-09-28 16:32
2.0M
Understanding FFT Applications_ 2nd ed_ Anders E Zonst_ 2004.djvu
2014-01-19 10:57
2.6M
Understanding IPv6_ Youngsong Mun_ Hyewon Keren Lee_ 2005.pdf
2011-09-01 03:38
16M
Understanding Linux Network Internals_ Christian Benvenuti_ 2006.pdf
2011-08-14 23:59
18M
Understanding the Linux Kernel_ 3rd Ed_ Daniel P Bovet_ Marco Cesati_ 2005.pdf
2011-08-14 23:58
4.8M
Understanding the bin, sbin, usr_bin , usr_sbin split.html
2018-03-02 21:44
6.8K
Unix Network Programming_ Vol 1_ The Sockets Networking API_ 3rd Ed_ W Richard Stevens_ 2003.chm
2011-08-14 23:40
5.4M
Using Perl for Statistics_ Data Processing and Statistical Computing_ v11i01.pdf
2011-02-28 16:20
1.1M
Vi for nano users_ Markus Schnalke.pdf
2013-03-05 10:25
7.4K
Web_ Graphics_ Perl TK_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf
2011-07-13 22:55
4.0M
What Is EPUB 3_ Matt Garrish_ 2011.pdf
2011-10-10 08:19
399K
Writing Linux Device Drivers_ a guide with exercises_ Dr Jerry Cooperstein_ 2009.pdf
2011-08-14 23:54
18M
You Can Type, but You Cant Hide_ A Stealthy GPU-based Keylogger_ E Ladakis_ L Koromilas_ G Vasiliadis_ M Polychronakis_ S Loannidis_ eurosec 2013.pdf
2013-09-15 03:08
345K
Zero Reserve_ A Distributed Exchange Platform_ anu_ 2013.pdf
2013-12-19 06:03
124K
ePub Straight to the Point_ Elizabeth Castro_ 2010.pdf
2012-03-25 11:30
7.5M
nooshare cryptocurrency_ overview_ 2012.pdf
2012-02-18 19:58
307K
pci21.pdf
2011-07-28 05:56
2.8M
pci23.pdf
2011-07-28 05:56
4.3M
spiPhone_ Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers_ P Traynor et al_ 2011.pdf
2013-09-27 11:53
610K
Apache/2.4.18 (Ubuntu) Server at mirror.thelifeofkenneth.com Port 80