×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Structure and Interpretation of Computer Programs_ 2nd Ed_ Harold Abelson_ 1996.pdf
Home
/
Discover
/
erewhon.superkuh.com
/
library
/
Computing
/
Parent Folder
Structure and Interpretation of Computer Programs_ 2nd Ed_ Harold Abelson_ 1996.pdf
PDF
7 years ago
4.37 MB
Copy Link
StegTorrent_ a Steganographic Method for P2P File Sharing Service_ arxiv13034264.pdf
PDF
7 years ago
684.85 kB
Copy Link
Survey of Text Mining_ Clustering Classification and Retrieval_ Michael W Berry_ 2003.pdf
PDF
7 years ago
5.83 MB
Copy Link
Stealthy Dopant-Level Hardware Trojans_ George T Becker_ Francessco Regazzoni_ Christof Paar_ Wayne P Burleson_ 2013.pdf
PDF
7 years ago
432.53 kB
Copy Link
Survey of Text Mining_ II_ Clustering Classification and Retrieval_ Michael W Berry_ Malu Castellanos_ 2007.pdf
PDF
7 years ago
2.94 MB
Copy Link
Stealing Keys from PCs using a Radio_ Cheap Electromagnetic Attacks on WIndowed Exponentiation_ D Genkin_ L Pachmanov_ I Pipman_ E Tromer_ 2015.pdf
PDF
7 years ago
1.97 MB
Copy Link
TRESOR-HUNT_ Attacking CPU-Bound Encryption_ Erik-Oliver Blass_ William Robertson_ 2012.pdf
PDF
7 years ago
246.25 kB
Copy Link
Simulating Analyzing and Animating Dynamical Systems_ A Guide to XPPAUT for Researchers and Students_ Bard Ermentrout_ 2009.djvu
DJVU
7 years ago
2.77 MB
Copy Link
Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks_ R Rasti_ M Murthy_ N Weaver_ V Paxson_ 2015.pdf
PDF
7 years ago
1.37 MB
Copy Link
Security and Privacy Vulnerabilities of In-Car Wireless Networks_ A Tire Pressure MOnitoring System Case Study_ Ivan Seskar et al_ 2013.pdf
PDF
7 years ago
1.24 MB
Copy Link
Text Mining_ Applications and Theory_ Michael W Berry_ Jacob Kogan_ 2010.pdf
PDF
7 years ago
2.38 MB
Copy Link
Scientific Computing_ An Introductory Survey_ Michael T Heath_ 1997.pdf
PDF
7 years ago
1.96 MB
Copy Link
Text Mining_ Classification Clustering and Applications_ Ashok Srivastava_ Mehran Sahami_ 2009.pdf
PDF
7 years ago
4.37 MB
Copy Link
Ring Confidential Transactions_ Anonymous Blockchain Cryptocurrencies_ Shen Noether_ 2015.pdf
PDF
7 years ago
489.10 kB
Copy Link
The Algorithm Design Manual_ 2nd Ed_ Steven S Skiena_ 2008.pdf
PDF
7 years ago
3.89 MB
Copy Link
Reversing Stealthy Dopant-Level Circuits_ T Sugawara_ D Suzuki_ R Fujii_ S Tawa_ R Hori_ M Shiozaki_ T Fujino_ IACR 2014.pdf
PDF
7 years ago
6.49 MB
Copy Link
The Art of Computer Programming_ Vol 1_ Fundamental Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu
DJVU
7 years ago
5.49 MB
Copy Link
Reverse Engineering x86 Processor Microcode_ P Koppe et al_ sec17_ 2017 .pdf
PDF
7 years ago
2.46 MB
Copy Link
The Art of Computer Programming_ Vol 2_ Seminumerical Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu
DJVU
7 years ago
6.92 MB
Copy Link
Report on Smartphone Encryption and Public Safety_ Manhattan District Attorneys Office_ 2015.pdf
PDF
7 years ago
665.89 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.