إضغط لتفاصيل الإعلانات



Results 1 to 5 of 5
Share
  1. #1

    Default Enjoy those books

    http://www.comms.scitech.susx.ac.uk/fft/


    Computer Programming

    * Art of Assembly language [pdf,tgz]
    * Art of Assembly language (High Level Assembler) [pdf]
    * Thinking in C++, 2nd Edition, Volume 2 [online(frames,no frames)]
    * Thinking in C++, 2nd Edition, Volume 2, Example Codes [online,tgz]
    * C++ Programming style [txt]
    * Multithreaded Programming Guide (Sun Microsystems) [pdf]
    * POSIX.1c/D10 Summary (Sun Microsystems) [ps,pdf]
    * pthreads and Solaris threads: A comparison of two user level threads APIs (Sun Microsystems) [ps,pdf]
    * Thinking in Java, 2nd Edition [online(frames,no frames)]
    * Thinking in Java, 2nd Edition, Example Codes [online,tgz]
    * Intel Architecture optimizations [pdf]
    * HTML 4.0 Reference [online]
    * Data Display Debugger (DDD) 3.3.1 Manual [online]
    * Writing Multithreaded Code in Solaris [pdf]
    * Intel Architecture Optimization Manual [pdf]
    * Intel Architecture Software Developer's Manual, Volume 1, Basic Architecture [pdf]
    * Intel Architecture Software Developer's Manual, Volume 2, Instruction Set Reference [pdf]
    * Intel Architecture Software Developer's Manual, Volume 3, System Programming [pdf]
    * Performance of Various Computers Using Standard Linear Equations Software [pdf]
    * The SPARC Architecture Manual, Version 8 [pdf]
    * The SPARC Architecture Manual, Version 9 [pdf]
    * UltraSPARC I-II User's Manual [pdf]
    * UltraSPARC IIi User's Manual [pdf]
    * microSPARC IIep User's Manual [pdf]
    * SuperSPARC II Addendum [pdf]
    * Alpha Architecture Handbook, Version 4 [pdf]
    * System V Application Binary Interface, Edition 4.1 [pdf]
    * System V Application Binary Interface, Intel386 Architecture Processor Supplement, Edition 4 [pdf]
    * MIPS R4000 Microprocessor User's Manual, 2nd Edition [pdf]
    * The 32-bit PA-RISC Run-time Architecture Document, HP-UX 10.20, Version 3 [pdf]
    * The 32-bit PA-RISC Run-time Architecture Document, HP-UX 11.00, Version 1 [pdf]
    * ANSI/ISO C++ Professional Programmer's Handbook [pdf]

    VHDL

    * VHDL CookBook by Peter J. Ashenden [pdf]
    * Analog and Mixed-Signal Modeling using VHDL-AMS [pdf]
    * European Space Agency (ESA) VHDL Modelling Guidelines [pdf]
    * US Navy VHDL Modelling Guide [pdf(1,2,3,4,5,6,7)]

    Operating systems

    * Introduction to OS [pdf]
    * Process scheduling [pdf]
    * Resource management and deadlocks [pdf]
    * I/O Management [pdf]
    * Filesystem [pdf]
    * Memory management [pdf]
    * Interprocess communication [pdf]
    * System security [pdf]

    Cryptography

    * A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]
    * Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]
    * Cryptography - The myths [pdf]
    * A Cryptograpgic Compendium [link]
    * Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf]
    * Security protocols overview by RSA Laboratories [pdf]
    * Security Pitfalls in Cryptography [pdf]
    * Stream ciphers [pdf]
    * Understanding Public Key Infrastructure [pdf]
    * Trust Models and Management in Public-Key Infrastuctured [pdf]
    * Why Cryptography is Harder than it looks [pdf]
    * Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]
    * CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]
    * RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]
    * Smartcard security [pdf]
    * Digital Signatures, Certificates and Electronic Commerce [pdf]
    * Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf]
    * Implementation Experience with AES Candidate Algorithms [pdf]
    * Performance Analysis of AES candidates on the 6805 CPU core [pdf]
    * UK Government Organisations Involved in Communications and Information Systems Security [pdf]
    * The block cipher Square [pdf]
    * Attacks on Cryptoprocessor Transaction Sets [pdf]
    * Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]
    * Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf]
    * Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]
    * Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf]
    * Compliance Defects in Public-Key Cryptography [pdf]
    * Architectural considerations for cryptanalytic hardware [pdf]
    * WEP Fix using RC4 Fast Packet Keying [pdf]
    * RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf]
    * Block Ciphers [pdf]
    * Stream Ciphers [pdf]
    * C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf]
    * Universal Hashing and Multiple Authentication [pdf]
    * Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]
    * The simple ideal cipher system [pdf]
    * An FPGA Implementation of the Linear Cruptanalysis [pdf]

    * The math behind the RSA cipher [txt]
    * RSA hardware implementation [pdf]
    * High-Speed RSA implementation [pdf]
    * Are 'Strong' Primes Needed for RSA? [pdf]
    * RSAES-OAEP Encryption scheme [pdf]
    * Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf]
    * Are 'Strong' Primed Needed for RSA? [pdf]
    * Why Textbook ElGamal and RSA Encryption are Insecure [pdf]

    * The DES algorithm [txt]

    * The RC5 encryption algorithm [pdf]
    * On The Security of the RC5 Encryption Algorithm [pdf]
    * The ESP RC5-CBC Transform [txt]
    * The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]

    * The RC6 block cipher [pdf]
    * RC6 as the AES [pdf]
    * The security of RC6 block cipher [pdf]
    * Statistical testing of RC6 block cipher [pdf]

    * Blowfish algorithm in plain English [txt]
    * Source code for Blowfish implementation [zip(C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)]

    * Twofish: A 128-bit Block Cipher [pdf]
    * Upper bounds on differential characteristics in Twofish [pdf]
    * Impossible differentials in Twofish [pdf]
    * A Twofish retreat: Related-Key attacks against Reduced-Round Twofish [pdf]
    * Further observations on the Key Schedule of Twofish [pdf]
    * Empirical verification of Twofish key uniqueness properties [pdf]
    * Key separation in Twofish [pdf]
    * Improved Twofish implementations [pdf]
    * Implementation of the Twofish Cipher using FPGA devices [pdf]
    * Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)]

    * The Rijndael Block Cipher [pdf]
    * A Specification of Rijndael, the AES Algorithm [pdf]
    * Efficient Implementation of the Rijndael S-box [pdf]

    * The Elliptic Curve Cryptosystem [pdf]
    * Elliptic Curce Cryptosystems [pdf]
    * Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf]
    * The Elliptic Curve Cryptosystem for Smart Cards [pdf]
    * The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]
    * Recommendation on Elliptic Curve Cryptosystems [pdf]
    * Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]

    Security

    * Program Stack vulnerability [txt]
    * Non-executable Program Stack vulnerability [txt]
    * Strange Attractors and TCP/IP Sequence Number Analysis [link]
    * Rainbow book series [link]
    * Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf]
    * Attacks on and Countermeasures for USB Hardware Token Devices [pdf]
    * UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf]
    * Countermeasures against Buffer Overflow Attacks [pdf]
    * Integrating Flexible Support for Security Policies into the Linux Operating System [pdf]
    * Flaw in NTRU Signature Scheme (NSS) [pdf]
    * Meeting Critical Security Objectived with Security-Enhanced Linux [pdf]
    * Secure Programming with Linux and Unix [pdf]
    * Reverse Compilation Techniques [pdf]
    * What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf]
    * Stack Smashing Vulnerabilities in the UNIX Operation System [pdf]

    Networking

    * Networking concepts [pdf]
    * Introduction to Internet Protocols [txt]
    * Network planning and design [pdf]
    * Queuing analysis [pdf]
    * Parallel FTP performance in a High-Bandwidth High-Latency WAN [pdf]
    * Compete WAP Security [pdf]
    * Cryptographic Authentication fo Real-Time Network Protocols [pdf]
    * Temporary Committee on the ECHELON Interception System Report (Working Document) [pdf]
    * IP Multicast Configuration [pdf]
    * Can Shortest-path Routing and TCP Maximize Utility [pdf]
    * A new TCP congestion control with empty queues and scalable stability [pdf]
    * FAST Kernel: Backgroung Theory and Experimental Results [pdf]
    * Robustness and the Internet: Design and evolution [pdf]
    * Robust congestion control for the Internet [pdf]
    * A Mathematical Framework for Designing a Low-Loss, Low-Delay Internet [pdf]
    * On the stability of networks operating TCP-like congestion control [pdf]
    * Ultrascale Network Protocols for Computing and Science in the 21st Century [pdf]

    Computer Clusters

    * High Performance Computing and Beowulf Clusters [pdf]
    * Web Search for a Planet: The Google Cluster Architecture [pdf]

    Bluetooth

    * Specification of the Bluetooth System v1.1 22-02-2001 (Core) [pdf]
    * Specification of the Bluetooth System v1.1 22-02-2001 (Profiles) [pdf]
    * SyncML Over Bluetooth [pdf]
    * Bluetooth Network Encapsulation Protocol (BNEP) Specification [pdf]
    * Bluetooth Extended Service Deiscovery Profile (ESDP) for Universal Plug and Play (UPnP) [pdf]
    * Personal Area Networking (PAN) Profile [pdf]
    * Bluetooth Security White Paper [pdf]
    * Security Comparison: Bluetooth vs 802.11 [pdf]

    Mathematics

    * SOS Mathematics [link]
    * Mathematics archives [link]
    * Dave's math tables [link]
    * On-line Encyclopedia of Integer Sequences [link]
    * Notes on Fermat's Last Theorem by A. J. Van Der Poorten [pdf(1,2,3,4,5,6,7,8)]
    * p-adic Chaos and Random Number Generation [pdf]
    * Introduction to Probability Theory [pdf]
    * Calculus - One-Variable Calculus, with an Introduction to Linear Algebra [pdf]
    * Introduction to Methods of Applied Mathematics or Advances Mathematical Methods for Scientists and Engineers [pdf]
    * Tables of Integrals and other Mathematical data [pdf]
    * Random Generators and Normal Numbers [pdf]
    * Ramanujan's Notebooks [pdf(pdf,pdf)]
    * Prime Percolation [pdf]
    * Prime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary Representation [pdf]
    * Perturbation Theory of Dynamical Systems [pdf]
    * On Fourier and Zeta(s) [pdf]
    * Newton's Formula and the Continued Fraction Expansion of sqrt(d) [pdf]
    * Linear Algebra [pdf]
    * Linear Algebra - Answers [pdf]
    * New Representations for the Madelung Constant [pdf]
    * Sums of Squares, Cubes, and Higher Powers [pdf]
    * Computing A Glimpse of Randomness [pdf]
    * Computing the Generating Function of a Series Given its First Few Terms [pdf]
    * Asymptotic Behavior of Excitable Cellular Automata [pdf]
    * An Efficient Algorithm for Computing the Ith Letter of phi^n(a).pdf [pdf]
    * Algebraic Topology [pdf]
    * A Proof of a Conjecture of Knuth [pdf]
    * A Practical Version of the Generalized Lagrange Algorithm [pdf]

    Engineering

    * Theoretical Computer Science cheat sheet [pdf]
    * A mathematical theory of Communication [pdf]
    * A Primer on Asynchronous Modem Communication [pdf]
    * Dictionary of Algorithms, Data Structured, and Problems [link]
    * Computing dictionary [link]
    * Acronym lookup engine [link]
    * StudyWeb search engine [link]

    UNIX

    * Unix is a Four Letter Word, and Vi is a Two Letter Abbreviation [pdf]
    * Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX [pdf]
    * UNIX [pdf]
    * Intermediate Unix Training [pdf]
    * VI lovers [link]
    * Unix Programming Tools [pdf]
    * Unix history timeline (1969-2000) [pdf]
    * Executable and Linkable Format (ELF) [txt]
    * A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux [online]
    * Guide to Unix IPC [link]
    * The Linux Kernel API [pdf]
    * Unreliable guide to Linux kernel locking [pdf]
    * Unreliable guide to hacking the Linux kernel [pdf]
    * Linux 2.4 NAT Howto [pdf]
    * Linux advanced routing Howto [pdf]
    * Linux Netfilter hacking Howto [pdf]
    * Samba 2.2 [online]
    * Samba TNG [online]

    USENIX

    * Token-Mediated Certification and Electronic Commerce [pdf]
    * The Linux BIOS [pdf]
    * LOBOS: (Linux OS Boots OS) Booting a kernel in 32-bit mode [pdf]

    Miscelaneous

    * CVS Manual [online]
    * The Ultimate Memory Guide [pdf]
    * The RAM Guy's Tech Notes [link]
    * Sun-Tzu The Art of Warfare [online]
    * Ko Ko Ko [avi]

    ISO Images

    * Slackware
    * Splackware
    * FreeBSD
    * Solaris


  2. Facebook Comments - تعليقـك على الفيس بوك يسعدنا ويطور مجهوداتنـا


  3. Forum Ads:

  4. Forum Ads:

    اضفط هنا لمعرفة تفاصيل الإعلانات بالموقع


  5. Forum Ads:

    -->

  6. #2
    Join Date
    Nov 2007
    Location
    Arab world!
    Posts
    6,133
    Blog Entries
    4
    Rep Power
    10

  7. #3
    Join Date
    Jan 2009
    Location
    iN mY SElf
    Posts
    70
    Rep Power
    12

  8. Forum Ads:

  9. #4

  10. #5

    Default

    Thank You Mohamadoz

  11. Forum Ads:

Similar Threads

  1. Car (DK Eyewitness Books)
    By Mohamed Sabir in forum vehicle
    Replies: 1
    Last Post: 22-06-2012, 01:16 PM
  2. web design books
    By neama1987 in forum Web development
    Replies: 7
    Last Post: 02-08-2010, 12:26 AM
  3. All Microsoft Cbts Enjoy Them
    By Mohamed Fouad in forum Microsoft Certifications
    Replies: 4
    Last Post: 22-05-2009, 01:42 AM
  4. Click on below and Enjoy...
    By ah_khairy in forum Engineers discussions
    Replies: 10
    Last Post: 12-06-2008, 02:26 AM
  5. ASP.Net 3.5 Books U Can get now
    By NeSqUiKa in forum Web development
    Replies: 3
    Last Post: 21-01-2008, 07:19 PM

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

أقسام المنتدى

الروابط النصية

تابع جروبنا على الفيس بوك

صفحة Egypt Engineers على الفيس بوك

تابعنا على linkedin

جروبنا على الياهو جروب