Computer Programming |
- Art of Assembly language [pdf,tgz]
- Art of Assembly language (High Level Assembler) [pdf]
- Thinking in C++, 2nd Edition, Volume 2 [online(frames,no frames)]
- Thinking in C++, 2nd Edition, Volume 2, Example Codes [online,tgz]
- C++ Programming style [txt]
- Multithreaded Programming Guide (Sun Microsystems) [pdf]
- POSIX.1c/D10 Summary (Sun Microsystems) [ps,pdf]
- pthreads and Solaris threads: A comparison of two user level threads APIs (Sun Microsystems) [ps,pdf]
- Thinking in Java, 2nd Edition [online(frames,no frames)]
- Thinking in Java, 2nd Edition, Example Codes [online,tgz]
- Intel Architecture optimizations [pdf]
- HTML 4.0 Reference [online]
- Data Display Debugger (DDD) 3.3.1 Manual [online]
- Writing Multithreaded Code in Solaris [pdf]
- Intel Architecture Optimization Manual [pdf]
- Intel Architecture Software Developer's Manual, Volume 1, Basic Architecture [pdf]
- Intel Architecture Software Developer's Manual, Volume 2, Instruction Set Reference [pdf]
- Intel Architecture Software Developer's Manual, Volume 3, System Programming [pdf]
- Performance of Various Computers Using Standard Linear Equations Software [pdf]
- The SPARC Architecture Manual, Version 8 [pdf]
- The SPARC Architecture Manual, Version 9 [pdf]
- UltraSPARC I-II User's Manual [pdf]
- UltraSPARC IIi User's Manual [pdf]
- microSPARC IIep User's Manual [pdf]
- SuperSPARC II Addendum [pdf]
- Alpha Architecture Handbook, Version 4 [pdf]
- System V Application Binary Interface, Edition 4.1 [pdf]
- System V Application Binary Interface, Intel386 Architecture Processor Supplement, Edition 4 [pdf]
- MIPS R4000 Microprocessor User's Manual, 2nd Edition [pdf]
- The 32-bit PA-RISC Run-time Architecture Document, HP-UX 10.20, Version 3 [pdf]
- The 32-bit PA-RISC Run-time Architecture Document, HP-UX 11.00, Version 1 [pdf]
- ANSI/ISO C++ Professional Programmer's Handbook [pdf]
|
|
VHDL |
- VHDL CookBook by Peter J. Ashenden [pdf]
- Analog and Mixed-Signal Modeling using VHDL-AMS [pdf]
- European Space Agency (ESA) VHDL Modelling Guidelines [pdf]
- US Navy VHDL Modelling Guide [pdf(1,2,3,4,5,6,7)]
|
|
Operating systems |
- Introduction to OS [pdf]
- Process scheduling [pdf]
- Resource management and deadlocks [pdf]
- I/O Management [pdf]
- Filesystem [pdf]
- Memory management [pdf]
- Interprocess communication [pdf]
- System security [pdf]
|
|
Cryptography |
- A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]
- Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]
- Cryptography - The myths [pdf]
- A Cryptograpgic Compendium [link]
- Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf]
- Security protocols overview by RSA Laboratories [pdf]
- Security Pitfalls in Cryptography [pdf]
- Stream ciphers [pdf]
- Understanding Public Key Infrastructure [pdf]
- Trust Models and Management in Public-Key Infrastuctured [pdf]
- Why Cryptography is Harder than it looks [pdf]
- Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]
- CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]
- RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]
- Smartcard security [pdf]
- Digital Signatures, Certificates and Electronic Commerce [pdf]
- Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf]
- Implementation Experience with AES Candidate Algorithms [pdf]
- Performance Analysis of AES candidates on the 6805 CPU core [pdf]
- UK Government Organisations Involved in Communications and Information Systems Security [pdf]
- The block cipher Square [pdf]
- Attacks on Cryptoprocessor Transaction Sets [pdf]
- Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]
- Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf]
- Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]
- Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf]
- Compliance Defects in Public-Key Cryptography [pdf]
- Architectural considerations for cryptanalytic hardware [pdf]
- WEP Fix using RC4 Fast Packet Keying [pdf]
- RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf]
- Block Ciphers [pdf]
- Stream Ciphers [pdf]
- C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf]
- Universal Hashing and Multiple Authentication [pdf]
- Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]
- The simple ideal cipher system [pdf]
- An FPGA Implementation of the Linear Cruptanalysis [pdf]
|
- The math behind the RSA cipher [txt]
- RSA hardware implementation [pdf]
- High-Speed RSA implementation [pdf]
- Are 'Strong' Primes Needed for RSA? [pdf]
- RSAES-OAEP Encryption scheme [pdf]
- Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf]
- Are 'Strong' Primed Needed for RSA? [pdf]
- Why Textbook ElGamal and RSA Encryption are Insecure [pdf]
|
|
- The RC5 encryption algorithm [pdf]
- On The Security of the RC5 Encryption Algorithm [pdf]
- The ESP RC5-CBC Transform [txt]
- The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]
|
- The RC6 block cipher [pdf]
- RC6 as the AES [pdf]
- The security of RC6 block cipher [pdf]
- Statistical testing of RC6 block cipher [pdf]
|
|
|
- The Rijndael Block Cipher [pdf]
- A Specification of Rijndael, the AES Algorithm [pdf]
- Efficient Implementation of the Rijndael S-box [pdf]
|
- The Elliptic Curve Cryptosystem [pdf]
- Elliptic Curce Cryptosystems [pdf]
- Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf]
- The Elliptic Curve Cryptosystem for Smart Cards [pdf]
- The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]
- Recommendation on Elliptic Curve Cryptosystems [pdf]
- Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]
|
|
Security |
- Program Stack vulnerability [txt]
- Non-executable Program Stack vulnerability [txt]
- Strange Attractors and TCP/IP Sequence Number Analysis [link]
- Rainbow book series [link]
- Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf]
- Attacks on and Countermeasures for USB Hardware Token Devices [pdf]
- UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf]
- Countermeasures against Buffer Overflow Attacks [pdf]
- Integrating Flexible Support for Security Policies into the Linux Operating System [pdf]
- Flaw in NTRU Signature Scheme (NSS) [pdf]
- Meeting Critical Security Objectived with Security-Enhanced Linux [pdf]
- Secure Programming with Linux and Unix [pdf]
- Reverse Compilation Techniques [pdf]
- What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf]
- Stack Smashing Vulnerabilities in the UNIX Operation System [pdf]
|
|
Networking |
- Networking concepts [pdf]
- Introduction to Internet Protocols [txt]
- Network planning and design [pdf]
- Queuing analysis [pdf]
- Parallel FTP performance in a High-Bandwidth High-Latency WAN [pdf]
- Compete WAP Security [pdf]
- Cryptographic Authentication fo Real-Time Network Protocols [pdf]
- Temporary Committee on the ECHELON Interception System Report (Working Document) [pdf]
- IP Multicast Configuration [pdf]
- Can Shortest-path Routing and TCP Maximize Utility [pdf]
- A new TCP congestion control with empty queues and scalable stability [pdf]
- FAST Kernel: Backgroung Theory and Experimental Results [pdf]
- Robustness and the Internet: Design and evolution [pdf]
- Robust congestion control for the Internet [pdf]
- A Mathematical Framework for Designing a Low-Loss, Low-Delay Internet [pdf]
- On the stability of networks operating TCP-like congestion control [pdf]
- Ultrascale Network Protocols for Computing and Science in the 21st Century [pdf]
|
|
Computer Clusters |
- High Performance Computing and Beowulf Clusters [pdf]
- Web Search for a Planet: The Google Cluster Architecture [pdf]
|
|
Bluetooth |
- Specification of the Bluetooth System v1.1 22-02-2001 (Core) [pdf]
- Specification of the Bluetooth System v1.1 22-02-2001 (Profiles) [pdf]
- SyncML Over Bluetooth [pdf]
- Bluetooth Network Encapsulation Protocol (BNEP) Specification [pdf]
- Bluetooth Extended Service Deiscovery Profile (ESDP) for Universal Plug and Play (UPnP) [pdf]
- Personal Area Networking (PAN) Profile [pdf]
- Bluetooth Security White Paper [pdf]
- Security Comparison: Bluetooth vs 802.11 [pdf]
|
|
Mathematics |
- SOS Mathematics [link]
- Mathematics archives [link]
- Dave's math tables [link]
- On-line Encyclopedia of Integer Sequences [link]
- Notes on Fermat's Last Theorem by A. J. Van Der Poorten [pdf(1,2,3,4,5,6,7,8)]
- p-adic Chaos and Random Number Generation [pdf]
- Introduction to Probability Theory [pdf]
- Calculus - One-Variable Calculus, with an Introduction to Linear Algebra [pdf]
- Introduction to Methods of Applied Mathematics or Advances Mathematical Methods for Scientists and Engineers [pdf]
- Tables of Integrals and other Mathematical data [pdf]
- Random Generators and Normal Numbers [pdf]
- Ramanujan's Notebooks [pdf(pdf,pdf)]
- Prime Percolation [pdf]
- Prime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary Representation [pdf]
- Perturbation Theory of Dynamical Systems [pdf]
- On Fourier and Zeta(s) [pdf]
- Newton's Formula and the Continued Fraction Expansion of sqrt(d) [pdf]
- Linear Algebra [pdf]
- Linear Algebra - Answers [pdf]
- New Representations for the Madelung Constant [pdf]
- Sums of Squares, Cubes, and Higher Powers [pdf]
- Computing A Glimpse of Randomness [pdf]
- Computing the Generating Function of a Series Given its First Few Terms [pdf]
- Asymptotic Behavior of Excitable Cellular Automata [pdf]
- An Efficient Algorithm for Computing the Ith Letter of phi^n(a).pdf [pdf]
- Algebraic Topology [pdf]
- A Proof of a Conjecture of Knuth [pdf]
- A Practical Version of the Generalized Lagrange Algorithm [pdf]
|
|
Engineering |
- Theoretical Computer Science cheat sheet [pdf]
- A mathematical theory of Communication [pdf]
- A Primer on Asynchronous Modem Communication [pdf]
- Dictionary of Algorithms, Data Structured, and Problems [link]
- Computing dictionary [link]
- Acronym lookup engine [link]
- StudyWeb search engine [link]
|
|
UNIX |
- Unix is a Four Letter Word, and Vi is a Two Letter Abbreviation [pdf]
- Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX [pdf]
- UNIX [pdf]
- Intermediate Unix Training [pdf]
- VI lovers [link]
- Unix Programming Tools [pdf]
- Unix history timeline (1969-2000) [pdf]
- Executable and Linkable Format (ELF) [txt]
- A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux [online]
- Guide to Unix IPC [link]
- The Linux Kernel API [pdf]
- Unreliable guide to Linux kernel locking [pdf]
- Unreliable guide to hacking the Linux kernel [pdf]
- Linux 2.4 NAT Howto [pdf]
- Linux advanced routing Howto [pdf]
- Linux Netfilter hacking Howto [pdf]
- Samba 2.2 [online]
- Samba TNG [online]
|
|
USENIX |
- Token-Mediated Certification and Electronic Commerce [pdf]
- The Linux BIOS [pdf]
- LOBOS: (Linux OS Boots OS) Booting a kernel in 32-bit mode [pdf]
|
|
Miscelaneous |
- CVS Manual [online]
- The Ultimate Memory Guide [pdf]
- The RAM Guy's Tech Notes [link]
- Sun-Tzu The Art of Warfare [online]
- Ko Ko Ko [avi]
|
No comments:
Post a Comment