×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Computing
Home
/
Discover
/
erewhon.superkuh.com
/
library
/
Computing
/
Parent Folder
transformers
20 files
2014 Internet Peering Playbook.epub
EPUB
6 years ago
7.87 MB
Copy Link
A Discipline of Programming_ Edsger Dijkstra_ 1976.djvu
DJVU
6 years ago
1.61 MB
Copy Link
A Large-Scale Study of Flash Memory Failures in the Field_ Facebook 2015.pdf
PDF
6 years ago
6.27 MB
Copy Link
A Peek on Numerical Programming in Perl and Python_ E Christopher Dyken_ 2005.pdf
PDF
6 years ago
99.70 kB
Copy Link
A Primer on Scientific Programming with Python_ 2nd Ed_ Hans Petter Langtangen_ 2011.pdf
PDF
6 years ago
4.96 MB
Copy Link
A2_ Analog Malicious Hardware_ K Yang_ M Hicks_ Q Dong_ T Austin_ D Sylvester_ 2016.pdf
PDF
6 years ago
2.64 MB
Copy Link
AIR-FI_ Generating Covert Wi-Fi Signals from Air-Gapped Computers_ Mordechai Guri_ arxiv2012.06884.pdf
PDF
11 months ago
6.96 MB
Copy Link
ASLR on the Line_ Practical Cache Attacks on the MMU_ Ben Gras_ Kaveh Razavi_ Erik Bosman_ Herbert Bos_ Cristiano Giuffrida_ 2017.pdf
PDF
6 years ago
770.59 kB
Copy Link
Abrupt rise of new machine ecology beyond human response time_ Neil Johnson_ Guannan Zhao_ Eric Hunsader_ Hong Qi_ Nicholas Johnson_ Jing Meng_ Brian Tivnan_ SciRep 2013.pdf
PDF
6 years ago
1.26 MB
Copy Link
Accessible EPUB 3_ Matt_Garrish_ 2012.pdf
PDF
6 years ago
3.18 MB
Copy Link
Accessorize to a Crime_ Real and Stealthy Attacks on State-of-the-Art Face Recognition_ Mahmood Sharif_ Sruti Bhagavatula_ Lujo Bauer_ Michael K Reiter_ 2016.pdf
PDF
6 years ago
4.16 MB
Copy Link
Against the Law_ Countering Lawful Abuses of Digital Surveillance_ Andrew bunnie Huang_ Edward Snoden_ 2016.pdf
PDF
6 years ago
8.21 MB
Copy Link
Against the Law_ Countering Lawful Abuses of Digital Surveillance_ Andrew bunnie Huang_ Edward Snowden_ 2016.pdf
PDF
4 years ago
8.21 MB
Copy Link
All Your GPS Are Belong To Us_ Towards Stealthy Manipulation of Road Navigation Systems_ K Zeng_ S Liu_ Y Shu_ D Wang_ H Li_ Y Dou_ G Wang_ Y Yang_ 2018.pdf
PDF
4 years ago
4.46 MB
Copy Link
An Analysis of Chinas Great Cannon_ Marczak et al_ foci 2015.pdf
PDF
6 years ago
694.98 kB
Copy Link
An Industrial-Strength Audio Search Algorithm_ Avery Li-Chun Wang_ Shazam.pdf
PDF
6 years ago
477.27 kB
Copy Link
Applied Mathematical Programming_ Stephen P Bradley_ Arnoldo C Hax_ Thomas L Magnanti_ 1977.pdf
PDF
6 years ago
34.92 MB
Copy Link
Automating System Administration with Perl_ Tools to Make You More Efficient_ David N Blank-Edelman_ 2009.epub
EPUB
6 years ago
2.41 MB
Copy Link
BADFET_ Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection_ A Cui_ R Housley_ 2017.pdf
PDF
4 years ago
14.13 MB
Copy Link
Beginning PDL_ Xavier Calbet_ 2001.pdf
PDF
6 years ago
422.09 kB
Copy Link
Bitcoin and Cryptocurrency Technologies_ A Narayanan_ J Bonneau E Felten_ A Miller_ S Goldfeder_ 2016.pdf
PDF
6 years ago
18.02 MB
Copy Link
Bitcoin_ A Peer-to-Peer Electronic Cash System_ Satoshi Nakamoto.pdf
PDF
6 years ago
179.97 kB
Copy Link
Breaking and Improving Protocol Obfuscation_ Erik Hjelmvik_ Wolfgang John_ 2010.pdf
PDF
6 years ago
681.72 kB
Copy Link
Cheatsheets for Authentication and Key Agreements in 2G, 3G, 4G, and 5G_ arxiv2107.07416.pdf
PDF
11 months ago
1.27 MB
Copy Link
Circuit Fingerprinting Attacks_ Passive Deanonymization of Tor Hidden Services_ Albert Kwon_ Mashael AlSabah_ David Lazar_ Marc Dacier_ Srinivas Devadas_ 2015.pdf
PDF
6 years ago
522.52 kB
Copy Link
Computer Algebra Recipes for Mathematical Physics_ Richard H Enns_ 2004.pdf
PDF
6 years ago
3.85 MB
Copy Link
Computer Methods for Ordinary Differential Equations and Differential-Algebraic Equations_ L R Petzold_ SIAM Society for Industrial and Applied Mathematics_ 1998.djvu
DJVU
6 years ago
1.85 MB
Copy Link
Computer Science from the Bottom Up_ Ian Wienand_ 2016.pdf
PDF
4 years ago
995.58 kB
Copy Link
Concrete Mathematics_ A Foundation for Computer Science_ 2nd Ed_ Ronald L Graham_ Donald E Knuth_ Oren Patashnik_ 1994.pdf
PDF
6 years ago
5.42 MB
Copy Link
Crowd Counting Through Walls Using WiFi_ S Depatla_ Y Mostofi_ Percom 2018.pdf
PDF
4 years ago
2.14 MB
Copy Link
Cryptographically secure shields_ J M Cioranesco_ J L Danger_ T Graba_ S Guilley_ Y Mathieu_ D Naccache_ X T Ngo_ HST 2014.pdf
PDF
6 years ago
1.40 MB
Copy Link
CyberWarfare CyberComplacency_ is hollywoods blueprint for chaos coming true_ Mark Osborne_ 2013.pdf
PDF
6 years ago
14.78 MB
Copy Link
DNS and BIND on IPv6_ Cricket Liu_ 2011.pdf
PDF
6 years ago
4.14 MB
Copy Link
DeDRM_tools_10.0.2.zip
ZIP
11 months ago
457.70 kB
Copy Link
Decentralized Anonymous Credentials_ Christina Garman_ Matthew Green_ Ian Miers_ 2013.pdf
PDF
6 years ago
595.45 kB
Copy Link
Dedup Est Machina_ Memory Deduplication as an Advanced Exploitation Vector_ E Bosman_ K Razavi_ H Bos_ C Giuffrida_ sp16_ 2016.pdf
PDF
6 years ago
547.14 kB
Copy Link
Digital Design_ Verilog_ An Embedded Systems Approach Using Verilog_ Peter J Ashenden_ 2007.pdf
PDF
6 years ago
2.05 MB
Copy Link
Digital Signal Processing using Stream High Performance Computing_ A 512-Input Broadband Correlator for Radio Astronomy_ arxiv14113751.pdf
PDF
6 years ago
5.75 MB
Copy Link
DiskFiltration_ Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise_ arxiv160803431v1.pdf
PDF
6 years ago
3.23 MB
Copy Link
Effective Perl Programming_ Ways to Write Better More Idiomatic Perl_ 2nd Ed_ Joseph N Hall_ Joshua A McAdams_ brian d foy_ 2010.pdf
PDF
6 years ago
1.53 MB
Copy Link
Effective awk Programming_ 3rd Ed_ Arnold Robbins_ 2001.pdf
PDF
6 years ago
2.45 MB
Copy Link
Efficient BackProp_ Yann LeCun_ Leon Bottou_ Genevieve B Orr_ Klaus-Rober Muller_ 1998.pdf
PDF
6 years ago
499.51 kB
Copy Link
Encyclopedia of Distances_ Michel M Deza_ Elena Deza_ 2009.pdf
PDF
3 months ago
4.49 MB
Copy Link
Equation Group_ Questions and Answers_ HDD Firmware Trojans_ ver 15_ Kaspersky 2015.pdf
PDF
6 years ago
3.98 MB
Copy Link
Error Characterization, Mitigation, and Recovery in Flash Memory Based Solid-State Drives_ Yu Cai_ Saugata Ghose_ Erich F Haratsch_ Yixin Luo_ Onur Mutlu_ arxiv1706.08642.pdf
PDF
3 months ago
Get Size
Copy Link
FM 99.9 Radio Virus_ Exploiting FM Radio Broadcasts for Malware Deployment_ E Fernandes_ B Crispo_ M Conti_ 2013.pdf
PDF
6 years ago
750.01 kB
Copy Link
Fansmitter_ Acoustic Data Exfiltration from Speakerless Air-Gapped Computers_ Mordechai Guri_ Yosef Solewicz_ Andrey Daidakulov_ Yuval Elovici Ben-Gurion_ arxiv160605915v1.pdf
PDF
6 years ago
2.07 MB
Copy Link
Fast Microwave Logic Circuits_ D J Blattner_ F Sterzer_ 1959.pdf
PDF
4 years ago
3.00 MB
Copy Link
Fast String Searching_ Andrew Hume_ Daniel Sunday_ 1991.pdf
PDF
6 years ago
204.29 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.