LinuxSir.cn,穿越时空的Linuxsir!

 找回密码
 注册
搜索
热搜: shell linux mysql
查看: 2685|回复: 4

推荐一个好的网站,有很多好书可以下

[复制链接]
发表于 2005-1-12 16:40:44 | 显示全部楼层 |阅读模式
http://www.comms.scitech.susx.ac.uk/fft/
这个网站有很多的好书

是在oldlinux论坛上看到这个链接的, sportsman  发的贴.

Food for Thought

以下是书名:

Computer Programming
Art of Assembly language [pdf,tgz]
Art of Assembly language (High Level Assembler) [pdf]
Thinking in C++, 2nd Edition, Volume 2 [online(frames,no frames)]
Thinking in C++, 2nd Edition, Volume 2, Example Codes [online,tgz]
C++ Programming style [txt]
Multithreaded Programming Guide (Sun Microsystems) [pdf]
POSIX.1c/D10 Summary (Sun Microsystems) [ps,pdf]
pthreads and Solaris threads: A comparison of two user level threads APIs (Sun Microsystems) [ps,pdf]
Thinking in Java, 2nd Edition [online(frames,no frames)]
Thinking in Java, 2nd Edition, Example Codes [online,tgz]
Intel Architecture optimizations [pdf]
HTML 4.0 Reference [online]
Data Display Debugger (DDD) 3.3.1 Manual [online]
Writing Multithreaded Code in Solaris [pdf]
Intel Architecture Optimization Manual [pdf]
Intel Architecture Software Developer's Manual, Volume 1, Basic Architecture [pdf]
Intel Architecture Software Developer's Manual, Volume 2, Instruction Set Reference [pdf]
Intel Architecture Software Developer's Manual, Volume 3, System Programming [pdf]
Performance of Various Computers Using Standard Linear Equations Software [pdf]
The SPARC Architecture Manual, Version 8 [pdf]
The SPARC Architecture Manual, Version 9 [pdf]
UltraSPARC I-II User's Manual [pdf]
UltraSPARC IIi User's Manual [pdf]
microSPARC IIep User's Manual [pdf]
SuperSPARC II Addendum [pdf]
Alpha Architecture Handbook, Version 4 [pdf]
System V Application Binary Interface, Edition 4.1 [pdf]
System V Application Binary Interface, Intel386 Architecture Processor Supplement, Edition 4 [pdf]
MIPS R4000 Microprocessor User's Manual, 2nd Edition [pdf]
The 32-bit PA-RISC Run-time Architecture Document, HP-UX 10.20, Version 3 [pdf]
The 32-bit PA-RISC Run-time Architecture Document, HP-UX 11.00, Version 1 [pdf]
ANSI/ISO C++ Professional Programmer's Handbook [pdf]


VHDL
VHDL CookBook by Peter J. Ashenden [pdf]
Analog and Mixed-Signal Modeling using VHDL-AMS [pdf]
European Space Agency (ESA) VHDL Modelling Guidelines [pdf]
US Navy VHDL Modelling Guide [pdf(1,2,3,4,5,6,7)]


Operating systems
Introduction to OS [pdf]
Process scheduling [pdf]
Resource management and deadlocks [pdf]
I/O Management [pdf]
Filesystem [pdf]
Memory management [pdf]
Interprocess communication [pdf]
System security [pdf]


Cryptography
A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]
Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]
Cryptography - The myths [pdf]
A Cryptograpgic Compendium [link]
Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf]
Security protocols overview by RSA Laboratories [pdf]
Security Pitfalls in Cryptography [pdf]
Stream ciphers [pdf]
Understanding Public Key Infrastructure [pdf]
Trust Models and Management in Public-Key Infrastuctured [pdf]
Why Cryptography is Harder than it looks [pdf]
Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]
CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]
RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]
Smartcard security [pdf]
Digital Signatures, Certificates and Electronic Commerce [pdf]
Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf]
Implementation Experience with AES Candidate Algorithms [pdf]
Performance Analysis of AES candidates on the 6805 CPU core [pdf]
UK Government Organisations Involved in Communications and Information Systems Security [pdf]
The block cipher Square [pdf]
Attacks on Cryptoprocessor Transaction Sets [pdf]
Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf]
Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]
Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf]
Compliance Defects in Public-Key Cryptography [pdf]
Architectural considerations for cryptanalytic hardware [pdf]
WEP Fix using RC4 Fast Packet Keying [pdf]
RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf]
Block Ciphers [pdf]
Stream Ciphers [pdf]
C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf]
Universal Hashing and Multiple Authentication [pdf]
Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]
The simple ideal cipher system [pdf]
An FPGA Implementation of the Linear Cruptanalysis [pdf]

The math behind the RSA cipher [txt]
RSA hardware implementation [pdf]
High-Speed RSA implementation [pdf]
Are 'Strong' Primes Needed for RSA? [pdf]
RSAES-OAEP Encryption scheme [pdf]
Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf]
Are 'Strong' Primed Needed for RSA? [pdf]
Why Textbook ElGamal and RSA Encryption are Insecure [pdf]

The DES algorithm [txt]

The RC5 encryption algorithm [pdf]
On The Security of the RC5 Encryption Algorithm [pdf]
The ESP RC5-CBC Transform [txt]
The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]

The RC6 block cipher [pdf]
RC6 as the AES [pdf]
The security of RC6 block cipher [pdf]
Statistical testing of RC6 block cipher [pdf]

Blowfish algorithm in plain English [txt]
Source code for Blowfish implementation [zip(C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)]

Twofish: A 128-bit Block Cipher [pdf]
Upper bounds on differential characteristics in Twofish [pdf]
Impossible differentials in Twofish [pdf]
A Twofish retreat: Related-Key attacks against Reduced-Round Twofish [pdf]
Further observations on the Key Schedule of Twofish [pdf]
Empirical verification of Twofish key uniqueness properties [pdf]
Key separation in Twofish [pdf]
Improved Twofish implementations [pdf]
Implementation of the Twofish Cipher using FPGA devices [pdf]
Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)]

The Rijndael Block Cipher [pdf]
A Specification of Rijndael, the AES Algorithm [pdf]
Efficient Implementation of the Rijndael S-box [pdf]

The Elliptic Curve Cryptosystem [pdf]
Elliptic Curce Cryptosystems [pdf]
Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf]
The Elliptic Curve Cryptosystem for Smart Cards [pdf]
The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]
Recommendation on Elliptic Curve Cryptosystems [pdf]
Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]


Security
Program Stack vulnerability [txt]
Non-executable Program Stack vulnerability [txt]
Strange Attractors and TCP/IP Sequence Number Analysis [link]
Rainbow book series [link]
Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf]
Attacks on and Countermeasures for USB Hardware Token Devices [pdf]
UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf]
Countermeasures against Buffer Overflow Attacks [pdf]
Integrating Flexible Support for Security Policies into the Linux Operating System [pdf]
Flaw in NTRU Signature Scheme (NSS) [pdf]
Meeting Critical Security Objectived with Security-Enhanced Linux [pdf]
Secure Programming with Linux and Unix [pdf]
Reverse Compilation Techniques [pdf]
What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf]
Stack Smashing Vulnerabilities in the UNIX Operation System [pdf]


Networking
Networking concepts [pdf]
Introduction to Internet Protocols [txt]
Network planning and design [pdf]
Queuing analysis [pdf]
Parallel FTP performance in a High-Bandwidth High-Latency WAN [pdf]
Compete WAP Security [pdf]
Cryptographic Authentication fo Real-Time Network Protocols [pdf]
Temporary Committee on the ECHELON Interception System Report (Working Document) [pdf]
IP Multicast Configuration [pdf]
Can Shortest-path Routing and TCP Maximize Utility [pdf]
A new TCP congestion control with empty queues and scalable stability [pdf]
FAST Kernel: Backgroung Theory and Experimental Results [pdf]
Robustness and the Internet: Design and evolution [pdf]
Robust congestion control for the Internet [pdf]
A Mathematical Framework for Designing a Low-Loss, Low-Delay Internet [pdf]
On the stability of networks operating TCP-like congestion control [pdf]
Ultrascale Network Protocols for Computing and Science in the 21st Century [pdf]


Computer Clusters
High Performance Computing and Beowulf Clusters [pdf]
Web Search for a Planet: The Google Cluster Architecture [pdf]


Bluetooth
Specification of the Bluetooth System v1.1 22-02-2001 (Core) [pdf]
Specification of the Bluetooth System v1.1 22-02-2001 (Profiles) [pdf]
SyncML Over Bluetooth [pdf]
Bluetooth Network Encapsulation Protocol (BNEP) Specification [pdf]
Bluetooth Extended Service Deiscovery Profile (ESDP) for Universal Plug and Play (UPnP) [pdf]
Personal Area Networking (PAN) Profile [pdf]
Bluetooth Security White Paper [pdf]
Security Comparison: Bluetooth vs 802.11 [pdf]


Mathematics
SOS Mathematics [link]
Mathematics archives [link]
Dave's math tables [link]
On-line Encyclopedia of Integer Sequences [link]
Notes on Fermat's Last Theorem by A. J. Van Der Poorten [pdf(1,2,3,4,5,6,7,8)]
p-adic Chaos and Random Number Generation [pdf]
Introduction to Probability Theory [pdf]
Calculus - One-Variable Calculus, with an Introduction to Linear Algebra [pdf]
Introduction to Methods of Applied Mathematics or Advances Mathematical Methods for Scientists and Engineers [pdf]
Tables of Integrals and other Mathematical data [pdf]
Random Generators and Normal Numbers [pdf]
Ramanujan's Notebooks [pdf(pdf,pdf)]
Prime Percolation [pdf]
Prime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary Representation [pdf]
Perturbation Theory of Dynamical Systems [pdf]
On Fourier and Zeta(s) [pdf]
Newton's Formula and the Continued Fraction Expansion of sqrt(d) [pdf]
Linear Algebra [pdf]
Linear Algebra - Answers [pdf]
New Representations for the Madelung Constant [pdf]
Sums of Squares, Cubes, and Higher Powers [pdf]
Computing A Glimpse of Randomness [pdf]
Computing the Generating Function of a Series Given its First Few Terms [pdf]
Asymptotic Behavior of Excitable Cellular Automata [pdf]
An Efficient Algorithm for Computing the Ith Letter of phi^n(a).pdf [pdf]
Algebraic Topology [pdf]
A Proof of a Conjecture of Knuth [pdf]
A Practical Version of the Generalized Lagrange Algorithm [pdf]


Engineering
Theoretical Computer Science cheat sheet [pdf]
A mathematical theory of Communication [pdf]
A Primer on Asynchronous Modem Communication [pdf]
Dictionary of Algorithms, Data Structured, and Problems [link]
Computing dictionary [link]
Acronym lookup engine [link]
StudyWeb search engine [link]


UNIX
Unix is a Four Letter Word, and Vi is a Two Letter Abbreviation [pdf]
Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX [pdf]
UNIX [pdf]
Intermediate Unix Training [pdf]
VI lovers [link]
Unix Programming Tools [pdf]
Unix history timeline (1969-2000) [pdf]
Executable and Linkable Format (ELF) [txt]
A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux [online]
Guide to Unix IPC [link]
The Linux Kernel API [pdf]
Unreliable guide to Linux kernel locking [pdf]
Unreliable guide to hacking the Linux kernel [pdf]
Linux 2.4 NAT Howto [pdf]
Linux advanced routing Howto [pdf]
Linux Netfilter hacking Howto [pdf]
Samba 2.2 [online]
Samba TNG [online]


USENIX
Token-Mediated Certification and Electronic Commerce [pdf]
The Linux BIOS [pdf]
LOBOS: (Linux OS Boots OS) Booting a kernel in 32-bit mode [pdf]


Miscelaneous
CVS Manual [online]
The Ultimate Memory Guide [pdf]
Sun-Tzu The Art of Warfare [online]
Ko Ko Ko [avi]
发表于 2005-1-12 19:23:08 | 显示全部楼层
多谢兄弟,收下了。
发表于 2005-1-16 13:05:18 | 显示全部楼层
感谢兄弟.
回复 支持 反对

使用道具 举报

发表于 2005-1-17 13:07:12 | 显示全部楼层
确实不错
回复 支持 反对

使用道具 举报

发表于 2010-12-1 14:34:43 | 显示全部楼层
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

快速回复 返回顶部 返回列表