×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
A Peek on Numerical Programming in Perl and Python_ E Christopher Dyken_ 2005.pdf
Home
/
Discover
/
www.superkuh.com
/
library
/
Computing
/
Parent Folder
A Peek on Numerical Programming in Perl and Python_ E Christopher Dyken_ 2005.pdf
PDF
2 years ago
99.70 kB
Copy Link
ASLR on the Line_ Practical Cache Attacks on the MMU_ Ben Gras_ Kaveh Razavi_ Erik Bosman_ Herbert Bos_ Cristiano Giuffrida_ 2017.pdf
PDF
2 years ago
770.59 kB
Copy Link
An Industrial-Strength Audio Search Algorithm_ Avery Li-Chun Wang_ Shazam.pdf
PDF
2 years ago
477.27 kB
Copy Link
BADFET_ Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection_ A Cui_ R Housley_ 2017.pdf
PDF
2 years ago
14.13 MB
Copy Link
An Analysis of Chinas Great Cannon_ Marczak et al_ foci 2015.pdf
PDF
2 years ago
694.98 kB
Copy Link
Beginning PDL_ Xavier Calbet_ 2001.pdf
PDF
2 years ago
422.09 kB
Copy Link
Bitcoin and Cryptocurrency Technologies_ A Narayanan_ J Bonneau E Felten_ A Miller_ S Goldfeder_ 2016.pdf
PDF
2 years ago
18.02 MB
Copy Link
All Your GPS Are Belong To Us_ Towards Stealthy Manipulation of Road Navigation Systems_ K Zeng_ S Liu_ Y Shu_ D Wang_ H Li_ Y Dou_ G Wang_ Y Yang_ 2018.pdf
PDF
2 years ago
4.46 MB
Copy Link
A Large-Scale Study of Flash Memory Failures in the Field_ Facebook 2015.pdf
PDF
2 years ago
6.27 MB
Copy Link
Bitcoin_ A Peer-to-Peer Electronic Cash System_ Satoshi Nakamoto.pdf
PDF
2 years ago
179.97 kB
Copy Link
AIR-FI_ Generating Covert Wi-Fi Signals from Air-Gapped Computers_ Mordechai Guri_ arxiv2012.06884.pdf
PDF
2 years ago
6.96 MB
Copy Link
Breaking and Improving Protocol Obfuscation_ Erik Hjelmvik_ Wolfgang John_ 2010.pdf
PDF
2 years ago
681.72 kB
Copy Link
Against the Law_ Countering Lawful Abuses of Digital Surveillance_ Andrew bunnie Huang_ Edward Snowden_ 2016.pdf
PDF
2 years ago
8.21 MB
Copy Link
Cheatsheets for Authentication and Key Agreements in 2G, 3G, 4G, and 5G_ arxiv2107.07416.pdf
PDF
2 years ago
1.27 MB
Copy Link
A Discipline of Programming_ Edsger Dijkstra_ 1976.djvu
DJVU
2 years ago
1.61 MB
Copy Link
Circuit Fingerprinting Attacks_ Passive Deanonymization of Tor Hidden Services_ Albert Kwon_ Mashael AlSabah_ David Lazar_ Marc Dacier_ Srinivas Devadas_ 2015.pdf
PDF
2 years ago
522.52 kB
Copy Link
Accessorize to a Crime_ Real and Stealthy Attacks on State-of-the-Art Face Recognition_ Mahmood Sharif_ Sruti Bhagavatula_ Lujo Bauer_ Michael K Reiter_ 2016.pdf
PDF
2 years ago
4.16 MB
Copy Link
Computer Methods for Ordinary Differential Equations and Differential-Algebraic Equations_ L R Petzold_ SIAM Society for Industrial and Applied Mathematics_ 1998.djvu
DJVU
2 years ago
1.85 MB
Copy Link
Abrupt rise of new machine ecology beyond human response time_ Neil Johnson_ Guannan Zhao_ Eric Hunsader_ Hong Qi_ Nicholas Johnson_ Jing Meng_ Brian Tivnan_ SciRep 2013.pdf
PDF
2 years ago
1.26 MB
Copy Link
Computer Science from the Bottom Up_ Ian Wienand_ 2016.pdf
PDF
2 years ago
995.58 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.