Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 625


Part of Sterling’s extremely popular Milestones series, this illustrated exploration of computer science ranges from the ancient abacus to superintelligence and social media.   With 250 illustrated landmark inventions, publications, and events—encompassing everything from ancient record-keeping devices to the latest computing technologies—this highly topical addition to the Sterling Milestones series takes a chronological... more...

PoC or GTFO, Volume 2 follows-up the wildly popular first volume with issues 9-13 of the eponymous hacker zine. Contributions range from humorous poems to deeply technical essays. The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated magazine of reverse engineering, retro-computing, and systems internals. This second collected volume holds all of the articles from releases nine to thirteen. Learn how to patch the firmware... more...

The editors of this volume bring to life a major part of Ettore Majorana s work that up to now was not accessible to the general audience. These are the contents of the Quaderni (notebooks) of Ettore Majorana, edited and translated in English. Ettore Majorana had an astounding talent for Physics that made an impression on all the colleagues who had the opportunity to know him. Enrico Fermi, who took him in his group when he was a student, ranked him... more...

Designed for use in a second course in circuit analysis, this text engages a full spectrum of circuit analysis related subjects ranging from the most abstract to the most practical. This is not a math text. However, the differential equations and Laplace transformation material presented in this text is adequate for the derivation of pertinent relations and there is no need to refer to advanced math texts. Featured are methods of expressing signals in... more...


This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Membrane Computing, CMC 2012, held in Budapest, Hungary, in August 2012. The 21 revised selected papers presented together with 6 invited lectures were carefully reviewed and selected from 25 papers presented at the conference. The book also deals with membrane systems, also called P systems, which are distributed and parallel algebraic... more...

Working in Cybersecurity is an oral history of the people who are working to improve the safety and security of cyberspace: its physical underpinnings, the information that flows through it, and the people who use it. Inspired by the book Working by Studs Terkel, Working in Cybersecurity looks at both the day-to-day activities of those working in myriad roles in cybersecurity - technical, operational, and policy - as well as the mental, social, and... more...

This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out. PoC||GTFO follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and file format internals. Until now, the journal has only been available online or printed and distributed for free at hacker... more...

The nonfiction debut from the author of the international bestseller Sacred Games about the surprising overlap between writing and computer coding Vikram Chandra has been a computer programmer for almost as long as he has been a novelist. In this extraordinary new book, his first work of nonfiction, he searches for the connections between the worlds of art and technology. Coders are obsessed with elegance and style, just as writers... more...

Modern cryptology increasingly employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research topics in complexity theory are often motivated by questions and problems from cryptology. This book takes account of this situation, and therefore its subject is what may be dubbed "cryptocomplexity'', a kind of symbiosis of these two areas. This book is written for undergraduate and graduate students of computer... more...