×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Higher-Order Perl_ Transforming Programs with Programs_ Mark Jason Dominus_ 2005.pdf
Home
/
Discover
/
superkuh.com
/
library
/
Computing
/
Parent Folder
Higher-Order Perl_ Transforming Programs with Programs_ Mark Jason Dominus_ 2005.pdf
PDF
2 years ago
1.92 MB
Copy Link
Higher-Order Perl_ Mark Jason Dominus.epub
EPUB
2 years ago
1.58 MB
Copy Link
IEMI Threats for Information Security_ Remote Command Injection on Modern Smartphones_ Chaouki Kasmi_ Jose Lopes Esteves_ 2015.pdf
PDF
2 years ago
238.81 kB
Copy Link
Hacking the Cable Modem_ Ryan Harris_ 2006.pdf
PDF
2 years ago
15.63 MB
Copy Link
Imperfect Forward Secrecy_ How Diffie-Hellman Fails in Practice_ D Adrian_ K Bhargavan_ Z Curumeric_ P Gaudry_ M Green_ J A Halderman_ N Heniger_ D Springall_ E Thome_ L Valenta_ B VanderSloot_ E Wustrow_ S Zanella-Beguelin_ P Zimmerman_ 2015.pdf
PDF
2 years ago
1.32 MB
Copy Link
grep awk and sed_ three VERY useful command-line utilities_ Matt Probert_ 2016.pdf
PDF
2 years ago
99.14 kB
Copy Link
Inferring Persistent Interdomain Congestion_ A Dhamdhere_ D D Clark_ A Gamero-Garrido_ M Luckie_ R K P Mok_ G Akiwate_ K Gogia_ V Bajpai_ A C Snoeren_ kc claffy_ 2018.pdf
PDF
2 years ago
1.06 MB
Copy Link
Inside the Machine_ An Illustrated Introduction to Microprocessors and Computer Architecture_ Jon Stokes_ 2006.pdf
PDF
2 years ago
9.79 MB
Copy Link
Games Diversions & Perl Culture_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf
PDF
2 years ago
4.38 MB
Copy Link
Furby source code_ D Hampton_ W Shulz_ 1998.pdf
PDF
2 years ago
6.39 MB
Copy Link
Instruction latencies and throughput for AMD and Intel x86 processors_ Torbjorn Granlund_ 2017.pdf
PDF
2 years ago
203.84 kB
Copy Link
Forensic Analysis and Anonymisation of Printed Documents_ T Richter_ S Escher_ D Schonfeld_ T Strufe_ 2018.pdf
PDF
2 years ago
1.46 MB
Copy Link
Intel ME - Two Years Later_ Igor Skochinsky_ 2014.pdf
PDF
2 years ago
1.07 MB
Copy Link
Forced Decryption as a Foregone Conclusion_ Dan Terzian_ 2015.pdf
PDF
2 years ago
217.43 kB
Copy Link
Introduction to Scilab_ 2010.pdf
PDF
2 years ago
1.19 MB
Copy Link
FM 99.9 Radio Virus_ Exploiting FM Radio Broadcasts for Malware Deployment_ E Fernandes_ B Crispo_ M Conti_ 2013.pdf
PDF
2 years ago
750.01 kB
Copy Link
Invisible Mask_ Practical Attacks on Face Recognition with Infrared_ arxiv180304683.pdf
PDF
2 years ago
3.34 MB
Copy Link
IPv6 Address Planning_ Designing an Address Plan for the Future_ Tom Coffeen_ 2014.pdf
PDF
2 years ago
14.34 MB
Copy Link
Flipping Bits in Memory Without Accessing Them_ An Experimental Study of DRAM Disturbance Errors_ Yoongu Kim_ Ross Daly_ Jeremie Kim_ Chris Fallin_ Ji Hye Lee_ Donghyuk Lee_ Chris Wilkerson_ Konrad Lai_ Onur Mutlu_ 2014.pdf
PDF
2 years ago
827.91 kB
Copy Link
Flash Reliability in Production_ The Expected and the Unexpected_ B Schroeder_ R Lagisetty_ A Merchent_ Google_ 2016.pdf
PDF
2 years ago
2.12 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.