×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Whitepaper
Home
/
Discover
/
theswissbay.ch
/
pdf
/
Whitepaper
/
Parent Folder
Android
3 files
Cisco
1 files
Crypto
86 files
Hacking
7 files
Hardware
8 files
Health & medicine
2 files
Infosec
9 files
Lustre
2 files
Microsoft
20 files
Network
44 files
Probability theory
1 files
RouterOS
6 files
Side channels
12 files
Software engineering
9 files
"I've got nothing to hide" and other misunderstanding of privacy - Daniel J. Solove.pdf
PDF
6 years ago
564 bytes
Copy Link
(Cross-)browser fingerprinting via OS and hardware level features - Yinzhi Cao, Song Li, Erik Wijmans.pdf
PDF
6 years ago
1.00 MB
Copy Link
10 Things to Know Before Deploying 10 Gigabit Ethernet - Netgear.pdf
PDF
6 years ago
719.86 kB
Copy Link
A Plan for the next phase in Weather Modification Science and Technology Development - T.P. DeFelice.pdf
PDF
7 months ago
178.69 kB
Copy Link
ASIC design SHA256 implementation.pdf
PDF
6 years ago
102.89 kB
Copy Link
Art of anti detection - 1_Introduction to AV & detection techniques - Ege Balci (Invictus Europe).pdf
PDF
6 years ago
898.37 kB
Copy Link
Automated Crowdturfing Attacks and Defenses in Online Review Systems - Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao.pdf
PDF
7 months ago
2.11 MB
Copy Link
CAIN_Silently Breaking ASLR in the Cloud - Antonio Barresi, Kaveh Razavi, Mathias Payer & Thomas R. Gross.pdf
PDF
6 years ago
599.66 kB
Copy Link
CERN Data Integrity - Bernd Panzer-Steindel.pdf
PDF
6 years ago
110.89 kB
Copy Link
CHVote System Specifications v1.2 - Rolf Haenni, Reto E. Koenig, Philipp Locher, Eric Dubuis, Bern University of Applied Sciences.pdf
PDF
7 months ago
1.22 MB
Copy Link
Case study_a computer science perspective of bridge design - Alfred Spector, David Gifford.pdf
PDF
6 years ago
3.30 MB
Copy Link
Ceph, Gluster, Swift_Similarities and differences - Thiago da Silva, Prashanth Pai.pdf
PDF
6 years ago
1.33 MB
Copy Link
DDOS Reflection and Amplification - Arbor Networks.pdf
PDF
6 years ago
7.25 MB
Copy Link
Defeating DEP and ASLR in Windows - High-Tech Bridge.pdf
PDF
6 years ago
1.24 MB
Copy Link
Defending the Homeland - Nullthreat.pdf
PDF
6 years ago
1.38 MB
Copy Link
DiskFiltration_Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise - Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici, Ben-Gurion University of Negev, Cyber Security Research Center.pdf
PDF
6 years ago
3.23 MB
Copy Link
Does the online card payment landscape unwittingly facilitate fraud - Mohammed Aamir Ali, Budi Arief, Martin Emms, Aad van Moorsel.pdf
PDF
6 years ago
832.83 kB
Copy Link
Electromagnetic Radiation from Video Display Units_An Eavesdropping Risk - Wim van Eck.pdf
PDF
6 years ago
702.51 kB
Copy Link
Equation Group-Q&A - Kaspersky Lab.pdf
PDF
6 years ago
3.98 MB
Copy Link
Erasure Codes for Storage Systems_A Brief Primer - James S. Plank.pdf
PDF
6 years ago
1.28 MB
Copy Link
From DTrace to Linux - Brendan Gregg.pdf
PDF
6 years ago
9.17 MB
Copy Link
Google infrastructure security design overview - Google.pdf
PDF
6 years ago
1.66 MB
Copy Link
HateMemeHandbook.pdf
PDF
7 months ago
90.69 MB
Copy Link
High Availability for Citrix XenServer - Citrix.pdf
PDF
6 years ago
544.63 kB
Copy Link
I know where your page lives_De-randomizing the latest Windows 10 kernel - Enrique Elias Nissim (IOActive).pdf
PDF
6 years ago
1.23 MB
Copy Link
Information security in Sweden_Situational assessement 2009 - Swedish Civil Contigencies Agency.pdf
PDF
6 years ago
557.54 kB
Copy Link
Installer un tableau électrique - Thierry Gallauziaux & David Fedullo.pdf
PDF
6 years ago
4.81 MB
Copy Link
Intel x86 considered harmful - Joanna Rutkowska.pdf
PDF
6 years ago
344.70 kB
Copy Link
Linux Performance Tools (LinuxCon EU) - Brendan Gregg.pdf
PDF
6 years ago
5.40 MB
Copy Link
Linux Performance Tools (LinuxCon NA) - Brendan Gregg.pdf
PDF
6 years ago
5.80 MB
Copy Link
Making master_slave systems work better with pgpool-II - Tatsuo Ishii, SRAA OSS, Inc. Japan.pdf
PDF
6 years ago
807.74 kB
Copy Link
Memory Deduplication as a Threat to the Guest OS - Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi & Cyrille Artho @ EuroSec2011.pdf
PDF
6 years ago
648.84 kB
Copy Link
Microsoft Security Intelligence Report Volume 16 - Microsoft Corporation.pdf
PDF
6 years ago
3.64 MB
Copy Link
OpenSolaris DTrace - Harry J Foxwell.pdf
PDF
6 years ago
1.33 MB
Copy Link
Penetration Testing with BackTrack (Lab Guide) v3.2 - Offensive Security.pdf
PDF
6 years ago
10.45 MB
Copy Link
Performance Analysis - Brendan Gregg.pdf
PDF
6 years ago
4.00 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.