Search

Google
 

Saturday, December 16, 2006

Big List of various Books

Computer Programming
  • Art of Assembly language [pdf,tgz]
  • Art of Assembly language (High Level Assembler) [pdf]
  • Thinking in C++, 2nd Edition, Volume 2 [online(frames,no frames)]
  • Thinking in C++, 2nd Edition, Volume 2, Example Codes [online,tgz]
  • C++ Programming style [txt]
  • Multithreaded Programming Guide (Sun Microsystems) [pdf]
  • POSIX.1c/D10 Summary (Sun Microsystems) [ps,pdf]
  • pthreads and Solaris threads: A comparison of two user level threads APIs (Sun Microsystems) [ps,pdf]
  • Thinking in Java, 2nd Edition [online(frames,no frames)]
  • Thinking in Java, 2nd Edition, Example Codes [online,tgz]
  • Intel Architecture optimizations [pdf]
  • HTML 4.0 Reference [online]
  • Data Display Debugger (DDD) 3.3.1 Manual [online]
  • Writing Multithreaded Code in Solaris [pdf]
  • Intel Architecture Optimization Manual [pdf]
  • Intel Architecture Software Developer's Manual, Volume 1, Basic Architecture [pdf]
  • Intel Architecture Software Developer's Manual, Volume 2, Instruction Set Reference [pdf]
  • Intel Architecture Software Developer's Manual, Volume 3, System Programming [pdf]
  • Performance of Various Computers Using Standard Linear Equations Software [pdf]
  • The SPARC Architecture Manual, Version 8 [pdf]
  • The SPARC Architecture Manual, Version 9 [pdf]
  • UltraSPARC I-II User's Manual [pdf]
  • UltraSPARC IIi User's Manual [pdf]
  • microSPARC IIep User's Manual [pdf]
  • SuperSPARC II Addendum [pdf]
  • Alpha Architecture Handbook, Version 4 [pdf]
  • System V Application Binary Interface, Edition 4.1 [pdf]
  • System V Application Binary Interface, Intel386 Architecture Processor Supplement, Edition 4 [pdf]
  • MIPS R4000 Microprocessor User's Manual, 2nd Edition [pdf]
  • The 32-bit PA-RISC Run-time Architecture Document, HP-UX 10.20, Version 3 [pdf]
  • The 32-bit PA-RISC Run-time Architecture Document, HP-UX 11.00, Version 1 [pdf]
  • ANSI/ISO C++ Professional Programmer's Handbook [pdf]

VHDL
  • VHDL CookBook by Peter J. Ashenden [pdf]
  • Analog and Mixed-Signal Modeling using VHDL-AMS [pdf]
  • European Space Agency (ESA) VHDL Modelling Guidelines [pdf]
  • US Navy VHDL Modelling Guide [pdf(1,2,3,4,5,6,7)]

Operating systems
  • Introduction to OS [pdf]
  • Process scheduling [pdf]
  • Resource management and deadlocks [pdf]
  • I/O Management [pdf]
  • Filesystem [pdf]
  • Memory management [pdf]
  • Interprocess communication [pdf]
  • System security [pdf]

Cryptography
  • A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]
  • Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]
  • Cryptography - The myths [pdf]
  • A Cryptograpgic Compendium [link]
  • Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf]
  • Security protocols overview by RSA Laboratories [pdf]
  • Security Pitfalls in Cryptography [pdf]
  • Stream ciphers [pdf]
  • Understanding Public Key Infrastructure [pdf]
  • Trust Models and Management in Public-Key Infrastuctured [pdf]
  • Why Cryptography is Harder than it looks [pdf]
  • Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]
  • CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]
  • RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]
  • Smartcard security [pdf]
  • Digital Signatures, Certificates and Electronic Commerce [pdf]
  • Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf]
  • Implementation Experience with AES Candidate Algorithms [pdf]
  • Performance Analysis of AES candidates on the 6805 CPU core [pdf]
  • UK Government Organisations Involved in Communications and Information Systems Security [pdf]
  • The block cipher Square [pdf]
  • Attacks on Cryptoprocessor Transaction Sets [pdf]
  • Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]
  • Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf]
  • Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]
  • Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf]
  • Compliance Defects in Public-Key Cryptography [pdf]
  • Architectural considerations for cryptanalytic hardware [pdf]
  • WEP Fix using RC4 Fast Packet Keying [pdf]
  • RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf]
  • Block Ciphers [pdf]
  • Stream Ciphers [pdf]
  • C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf]
  • Universal Hashing and Multiple Authentication [pdf]
  • Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]
  • The simple ideal cipher system [pdf]
  • An FPGA Implementation of the Linear Cruptanalysis [pdf]
  • The math behind the RSA cipher [txt]
  • RSA hardware implementation [pdf]
  • High-Speed RSA implementation [pdf]
  • Are 'Strong' Primes Needed for RSA? [pdf]
  • RSAES-OAEP Encryption scheme [pdf]
  • Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf]
  • Are 'Strong' Primed Needed for RSA? [pdf]
  • Why Textbook ElGamal and RSA Encryption are Insecure [pdf]
  • The DES algorithm [txt]
  • The RC5 encryption algorithm [pdf]
  • On The Security of the RC5 Encryption Algorithm [pdf]
  • The ESP RC5-CBC Transform [txt]
  • The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]
  • The RC6 block cipher [pdf]
  • RC6 as the AES [pdf]
  • The security of RC6 block cipher [pdf]
  • Statistical testing of RC6 block cipher [pdf]
  • The Rijndael Block Cipher [pdf]
  • A Specification of Rijndael, the AES Algorithm [pdf]
  • Efficient Implementation of the Rijndael S-box [pdf]
  • The Elliptic Curve Cryptosystem [pdf]
  • Elliptic Curce Cryptosystems [pdf]
  • Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf]
  • The Elliptic Curve Cryptosystem for Smart Cards [pdf]
  • The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]
  • Recommendation on Elliptic Curve Cryptosystems [pdf]
  • Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]

Security
  • Program Stack vulnerability [txt]
  • Non-executable Program Stack vulnerability [txt]
  • Strange Attractors and TCP/IP Sequence Number Analysis [link]
  • Rainbow book series [link]
  • Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf]
  • Attacks on and Countermeasures for USB Hardware Token Devices [pdf]
  • UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf]
  • Countermeasures against Buffer Overflow Attacks [pdf]
  • Integrating Flexible Support for Security Policies into the Linux Operating System [pdf]
  • Flaw in NTRU Signature Scheme (NSS) [pdf]
  • Meeting Critical Security Objectived with Security-Enhanced Linux [pdf]
  • Secure Programming with Linux and Unix [pdf]
  • Reverse Compilation Techniques [pdf]
  • What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf]
  • Stack Smashing Vulnerabilities in the UNIX Operation System [pdf]

Networking
  • Networking concepts [pdf]
  • Introduction to Internet Protocols [txt]
  • Network planning and design [pdf]
  • Queuing analysis [pdf]
  • Parallel FTP performance in a High-Bandwidth High-Latency WAN [pdf]
  • Compete WAP Security [pdf]
  • Cryptographic Authentication fo Real-Time Network Protocols [pdf]
  • Temporary Committee on the ECHELON Interception System Report (Working Document) [pdf]
  • IP Multicast Configuration [pdf]
  • Can Shortest-path Routing and TCP Maximize Utility [pdf]
  • A new TCP congestion control with empty queues and scalable stability [pdf]
  • FAST Kernel: Backgroung Theory and Experimental Results [pdf]
  • Robustness and the Internet: Design and evolution [pdf]
  • Robust congestion control for the Internet [pdf]
  • A Mathematical Framework for Designing a Low-Loss, Low-Delay Internet [pdf]
  • On the stability of networks operating TCP-like congestion control [pdf]
  • Ultrascale Network Protocols for Computing and Science in the 21st Century [pdf]

Computer Clusters
  • High Performance Computing and Beowulf Clusters [pdf]
  • Web Search for a Planet: The Google Cluster Architecture [pdf]

Bluetooth
  • Specification of the Bluetooth System v1.1 22-02-2001 (Core) [pdf]
  • Specification of the Bluetooth System v1.1 22-02-2001 (Profiles) [pdf]
  • SyncML Over Bluetooth [pdf]
  • Bluetooth Network Encapsulation Protocol (BNEP) Specification [pdf]
  • Bluetooth Extended Service Deiscovery Profile (ESDP) for Universal Plug and Play (UPnP) [pdf]
  • Personal Area Networking (PAN) Profile [pdf]
  • Bluetooth Security White Paper [pdf]
  • Security Comparison: Bluetooth vs 802.11 [pdf]

Mathematics
  • SOS Mathematics [link]
  • Mathematics archives [link]
  • Dave's math tables [link]
  • On-line Encyclopedia of Integer Sequences [link]
  • Notes on Fermat's Last Theorem by A. J. Van Der Poorten [pdf(1,2,3,4,5,6,7,8)]
  • p-adic Chaos and Random Number Generation [pdf]
  • Introduction to Probability Theory [pdf]
  • Calculus - One-Variable Calculus, with an Introduction to Linear Algebra [pdf]
  • Introduction to Methods of Applied Mathematics or Advances Mathematical Methods for Scientists and Engineers [pdf]
  • Tables of Integrals and other Mathematical data [pdf]
  • Random Generators and Normal Numbers [pdf]
  • Ramanujan's Notebooks [pdf(pdf,pdf)]
  • Prime Percolation [pdf]
  • Prime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary Representation [pdf]
  • Perturbation Theory of Dynamical Systems [pdf]
  • On Fourier and Zeta(s) [pdf]
  • Newton's Formula and the Continued Fraction Expansion of sqrt(d) [pdf]
  • Linear Algebra [pdf]
  • Linear Algebra - Answers [pdf]
  • New Representations for the Madelung Constant [pdf]
  • Sums of Squares, Cubes, and Higher Powers [pdf]
  • Computing A Glimpse of Randomness [pdf]
  • Computing the Generating Function of a Series Given its First Few Terms [pdf]
  • Asymptotic Behavior of Excitable Cellular Automata [pdf]
  • An Efficient Algorithm for Computing the Ith Letter of phi^n(a).pdf [pdf]
  • Algebraic Topology [pdf]
  • A Proof of a Conjecture of Knuth [pdf]
  • A Practical Version of the Generalized Lagrange Algorithm [pdf]

Engineering
  • Theoretical Computer Science cheat sheet [pdf]
  • A mathematical theory of Communication [pdf]
  • A Primer on Asynchronous Modem Communication [pdf]
  • Dictionary of Algorithms, Data Structured, and Problems [link]
  • Computing dictionary [link]
  • Acronym lookup engine [link]
  • StudyWeb search engine [link]

UNIX
  • Unix is a Four Letter Word, and Vi is a Two Letter Abbreviation [pdf]
  • Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX [pdf]
  • UNIX [pdf]
  • Intermediate Unix Training [pdf]
  • VI lovers [link]
  • Unix Programming Tools [pdf]
  • Unix history timeline (1969-2000) [pdf]
  • Executable and Linkable Format (ELF) [txt]
  • A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux [online]
  • Guide to Unix IPC [link]
  • The Linux Kernel API [pdf]
  • Unreliable guide to Linux kernel locking [pdf]
  • Unreliable guide to hacking the Linux kernel [pdf]
  • Linux 2.4 NAT Howto [pdf]
  • Linux advanced routing Howto [pdf]
  • Linux Netfilter hacking Howto [pdf]
  • Samba 2.2 [online]
  • Samba TNG [online]

USENIX
  • Token-Mediated Certification and Electronic Commerce [pdf]
  • The Linux BIOS [pdf]
  • LOBOS: (Linux OS Boots OS) Booting a kernel in 32-bit mode [pdf]

Miscelaneous
  • CVS Manual [online]
  • The Ultimate Memory Guide [pdf]
  • The RAM Guy's Tech Notes [link]
  • Sun-Tzu The Art of Warfare [online]
  • Ko Ko Ko [avi]

No comments: