:-: Home
:-: Quran
:-: Hadith
:-: Religious Books
:-: Secience Books
:-: Download Naats
:-: Download Hamd
:-: Read Articles
:-: Other Sites
:-: Contact Us
:-: About Us
| |
Computer Book Cornor
Computer's Books | Mathamatic's Books | Enggenring's Books | Language's Books
Recommanded Software For pdf files Download Foxit Reader
Books On Programming
Algorithms
And Complexity Progrmmer's
Guide Sams
Advanced C CGI Programming
Introduction Programming with STL in
C++ Event
Driven Function and
pointers Intro. to Win32
Prom. Building Blocks
of Windows Windows Prom. With
Graphics Mainfunction in
depth JavaScript In
7Days ActiveX
in 21 Days Teach
Yourself Borland Delphi In 14 Days Teach
Yourself Borland Delphi In 21 Days Teach
Yourself Oracle 8 In 21 Days Teach
Yourself Perl 5 In 21 Days Teach
Yourself Sql In 21 Days Second Edition Teach
Yourself Vbscript In 21 Days Teach
Yourself Visual Basic 5 In 24 Hours Teach
Yourself Visual Jpp In 21 Days
- Art of Assembly language [pdf,tgz]
- Art of Assembly language (High Level Assembler) [pdf]
- Thinking in C++, 2nd Edition, Volume 2 [online(frames,no frames)]
- Thinking in C++, 2nd Edition, Volume 2, Example Codes [online,tgz]
- C++ Programming style [txt]
- Multithreaded Programming Guide (Sun Microsystems) [pdf]
- POSIX.1c/D10 Summary (Sun Microsystems) [ps,pdf]
- pthreads and Solaris threads: A comparison of two user level
threads APIs (Sun Microsystems) [ps,pdf]
- Thinking in Java, 2nd Edition [online(frames,no frames)]
- Thinking in Java, 2nd Edition, Example Codes [online,tgz]
- Intel Architecture optimizations [pdf]
- HTML 4.0 Reference [online]
- Data Display Debugger (DDD) 3.3.1 Manual [online]
- Writing Multithreaded Code in Solaris [pdf]
- Intel Architecture Optimization Manual [pdf]
- Intel Architecture Software Developer's Manual, Volume 1,
Basic Architecture [pdf]
- Intel Architecture Software Developer's Manual, Volume 2,
Instruction Set Reference [pdf]
- Intel Architecture Software Developer's Manual, Volume 3,
System Programming [pdf]
- Performance of Various Computers Using Standard Linear
Equations Software [pdf]
- The SPARC Architecture Manual, Version 8 [pdf]
- The SPARC Architecture Manual, Version 9 [pdf]
- UltraSPARC I-II User's Manual [pdf]
- UltraSPARC IIi User's Manual [pdf]
- microSPARC IIep User's Manual [pdf]
- SuperSPARC II Addendum [pdf]
- Alpha Architecture Handbook, Version 4 [pdf]
- System V Application Binary Interface, Edition 4.1 [pdf]
- System V Application Binary Interface, Intel386 Architecture
Processor Supplement, Edition 4 [pdf]
- MIPS R4000 Microprocessor User's Manual, 2nd Edition [pdf]
- The 32-bit PA-RISC Run-time Architecture Document, HP-UX
10.20, Version 3 [pdf]
- The 32-bit PA-RISC Run-time Architecture Document, HP-UX
11.00, Version 1 [pdf]
- ANSI/ISO C++ Professional Programmer's Handbook [pdf]
VHDL
- VHDL CookBook by Peter J. Ashenden [pdf]
- Analog and Mixed-Signal Modeling using VHDL-AMS [pdf]
- European Space Agency (ESA) VHDL Modelling Guidelines [pdf]
- US Navy VHDL Modelling Guide [pdf(1,2,3,4,5,6,7)]
Operating Systems
- Introduction to OS [pdf]
- Process scheduling [pdf]
- Resource management and deadlocks [pdf]
- I/O Management [pdf]
- Filesystem [pdf]
- Memory management [pdf]
- Interprocess communication [pdf]
- System security [pdf]
Cryptography
- A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]
- Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]
- Cryptography - The myths [pdf]
- A Cryptograpgic Compendium [link]
- Frequently Asked Questions about Today's Cryptography by RSA
Laboratories [pdf]
- Security protocols overview by RSA Laboratories [pdf]
- Security Pitfalls in Cryptography [pdf]
- Stream ciphers [pdf]
- Understanding Public Key Infrastructure [pdf]
- Trust Models and Management in Public-Key Infrastuctured [pdf]
- Why Cryptography is Harder than it looks [pdf]
- Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]
- CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]
- RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]
- Smartcard security [pdf]
- Digital Signatures, Certificates and Electronic Commerce [pdf]
- Key recovery - Meeting the Needs of Users or Key Escrow in
Disguise [pdf]
- Implementation Experience with AES Candidate Algorithms [pdf]
- Performance Analysis of AES candidates on the 6805 CPU core
[pdf]
- UK Government Organisations Involved in Communications and
Information Systems Security [pdf]
- The block cipher Square [pdf]
- Attacks on Cryptoprocessor Transaction Sets [pdf]
- Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]
- Amplified Boomerang Attacks Against Reduced-Round MARS and
Serpent [pdf]
- Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]
- Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP,
and XML [pdf]
- Compliance Defects in Public-Key Cryptography [pdf]
- Architectural considerations for cryptanalytic hardware [pdf]
- WEP Fix using RC4 Fast Packet Keying [pdf]
- RSA Security Response to Weaknesses in Key Scheduling
Algorithm of RC4 [pdf]
- Block Ciphers [pdf]
- Stream Ciphers [pdf]
- C.R.I.S.I.S. - Cryptography's Role In Securing the Information
Society [pdf]
- Universal Hashing and Multiple Authentication [pdf]
- Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]
- The simple ideal cipher system [pdf]
- An FPGA Implementation of the Linear Cruptanalysis [pdf]
- The math behind the RSA cipher [txt]
- RSA hardware implementation [pdf]
- High-Speed RSA implementation [pdf]
- Are 'Strong' Primes Needed for RSA? [pdf]
- RSAES-OAEP Encryption scheme [pdf]
- Has the RSA algorithm been compromised as a result of
Bernstein's Papar? [pdf]
- Are 'Strong' Primed Needed for RSA? [pdf]
- Why Textbook ElGamal and RSA Encryption are Insecure [pdf]
- The DES algorithm [txt]
- The RC5 encryption algorithm [pdf]
- On The Security of the RC5 Encryption Algorithm [pdf]
- The ESP RC5-CBC Transform [txt]
- The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]
- The RC6 block cipher [pdf]
- RC6 as the AES [pdf]
- The security of RC6 block cipher [pdf]
- Statistical testing of RC6 block cipher [pdf]
- Blowfish algorithm in plain English [txt]
- Source code for Blowfish implementation [zip(C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)]
- Twofish: A 128-bit Block Cipher [pdf]
- Upper bounds on differential characteristics in Twofish [pdf]
- Impossible differentials in Twofish [pdf]
- A Twofish retreat: Related-Key attacks against Reduced-Round
Twofish [pdf]
- Further observations on the Key Schedule of Twofish [pdf]
- Empirical verification of Twofish key uniqueness properties
[pdf]
- Key separation in Twofish [pdf]
- Improved Twofish implementations [pdf]
- Implementation of the Twofish Cipher using FPGA devices [pdf]
- Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)]
- The Rijndael Block Cipher [pdf]
- A Specification of Rijndael, the AES Algorithm [pdf]
- Efficient Implementation of the Rijndael S-box [pdf]
- The Elliptic Curve Cryptosystem [pdf]
- Elliptic Curce Cryptosystems [pdf]
- Elliptic Curve Cryptography, Future Resiliency and High
Security Systems [pdf]
- The Elliptic Curve Cryptosystem for Smart Cards [pdf]
- The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]
- Recommendation on Elliptic Curve Cryptosystems [pdf]
- Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]
Security
- Program Stack vulnerability [txt]
- Non-executable Program Stack vulnerability [txt]
- Strange Attractors and TCP/IP Sequence Number Analysis [link]
- Rainbow book series [link]
- Kernel Level Vulnerabilities, Behind the Scenes of the 5th
Argus Hacking Challenge [pdf]
- Attacks on and Countermeasures for USB Hardware Token Devices
[pdf]
- UNIX Assembly Codes Development for Vulnerabilities
Illustration Purposes [pdf]
- Countermeasures against Buffer Overflow Attacks [pdf]
- Integrating Flexible Support for Security Policies into the
Linux Operating System [pdf]
- Flaw in NTRU Signature Scheme (NSS) [pdf]
- Meeting Critical Security Objectived with Security-Enhanced
Linux [pdf]
- Secure Programming with Linux and Unix [pdf]
- Reverse Compilation Techniques [pdf]
- What Should be Hidden and Open in Computer Security: Lessons
from Deception, the Art of War, Law, and Economic Theory [pdf]
- Stack Smashing Vulnerabilities in the UNIX Operation System
[pdf]
Networking
- Networking concepts [pdf]
- Introduction to Internet Protocols [txt]
- Network planning and design [pdf]
- Queuing analysis [pdf]
- Parallel FTP performance in a High-Bandwidth High-Latency WAN
[pdf]
- Compete WAP Security [pdf]
- Cryptographic Authentication fo Real-Time Network Protocols
[pdf]
- Temporary Committee on the ECHELON Interception System Report
(Working Document) [pdf]
- IP Multicast Configuration [pdf]
- Can Shortest-path Routing and TCP Maximize Utility [pdf]
- A new TCP congestion control with empty queues and scalable
stability [pdf]
- FAST Kernel: Backgroung Theory and Experimental Results [pdf]
- Robustness and the Internet: Design and evolution [pdf]
- Robust congestion control for the Internet [pdf]
- A Mathematical Framework for Designing a Low-Loss, Low-Delay
Internet [pdf]
- On the stability of networks operating TCP-like congestion
control [pdf]
- Ultrascale Network Protocols for Computing and Science in the
21st Century [pdf]
Computer Clusters
- High Performance Computing and Beowulf Clusters [pdf]
- Web Search for a Planet: The Google Cluster Architecture [pdf]
BlueTooth
- Specification of the Bluetooth System v1.1 22-02-2001 (Core)
[pdf]
- Specification of the Bluetooth System v1.1 22-02-2001
(Profiles) [pdf]
- SyncML Over Bluetooth [pdf]
- Bluetooth Network Encapsulation Protocol (BNEP) Specification
[pdf]
- Bluetooth Extended Service Deiscovery Profile (ESDP) for
Universal Plug and Play (UPnP) [pdf]
- Personal Area Networking (PAN) Profile [pdf]
- Bluetooth Security White Paper [pdf]
- Security Comparison: Bluetooth vs 802.11 [pdf]
Unix
- Unix is a Four Letter Word, and Vi is a Two Letter
Abbreviation [pdf]
- Some useful UNIX Commands written down by Razor for newbies to
get a start in UNIX [pdf]
- UNIX [pdf]
- Intermediate Unix Training [pdf]
- VI lovers [link]
- Unix Programming Tools [pdf]
- Unix history timeline (1969-2000) [pdf]
- Executable and Linkable Format (ELF) [txt]
- A Whirlwind Tutorial on Creating Really Teensy ELF Executables
for Linux [online]
- Guide to Unix IPC [link]
- The Linux Kernel API [pdf]
- Unreliable guide to Linux kernel locking [pdf]
- Unreliable guide to hacking the Linux kernel [pdf]
- Linux 2.4 NAT Howto [pdf]
- Linux advanced routing Howto [pdf]
- Linux Netfilter hacking Howto [pdf]
- Samba 2.2 [online]
- Samba TNG [online]
Usenix
- Token-Mediated Certification and Electronic Commerce [pdf]
- The Linux BIOS [pdf]
- LOBOS: (Linux OS Boots OS) Booting a kernel in 32-bit mode [pdf]
Miscelaneous
- CVS Manual [online]
- The Ultimate Memory Guide [pdf]
- The RAM Guy's Tech Notes [link]
- Sun-Tzu The Art of Warfare [online]
- Ko Ko Ko [avi]
ISO Images
Slackware
Splackware
FreeBSD
Solaris
|
|