*博客头图：

RGB颜色，例如：#AFAFAF

Hover：

RGB颜色，例如：#AFAFAF

RGB颜色，例如：#AFAFAF

# fetag's blog

• 博客(0)
• 资源 (45)
• 论坛 (103)

2013-09-09

#### SMO Algorithm

SMO algorithm. Private.

2013-09-07

#### Advanced Programming in the Unix Environment 3rd edition

Advanced Programming in the Unix Environment 3rd edition. 是最新版的第三版！请看仔细了。

2013-09-05

#### The CPP Programming Language 4th Edition

The C++ Programming Language, 4th Edition 这是最新的第四版。

2013-08-11

#### Introduction to the Theory of Computation 3rd edition --- by Michael Sipser

This is the 3rd Edition. This highly anticipated revision builds upon the strengths of the previous edition. Sipser's candid, crystal-clear style allows students at every level to understand and enjoy this field. His innovative "proof idea" sections explain profound concepts in plain English. The new edition incorporates many improvements students and professors have suggested over the years, and offers updated, classroom-tested problem sets at the end of each chapter.

2013-06-10

#### The Riemann Hypothesis

Contains recent advances and results in number theory Collects papers never before published in book form Explains the Riemann Hypothesis to someone without a background in complex analysis The Riemann Hypothesis has become the Holy Grail of mathematics in the century and a half since 1859 when Bernhard Riemann, one of the extraordinary mathematical talents of the 19th century, originally posed the problem. While the problem is notoriously difficult, and complicated even to state carefully, it can be loosely formulated as "the number of integers with an even number of prime factors is the same as the number of integers with an odd number of prime factors." The Hypothesis makes a very precise connection between two seemingly unrelated mathematical objects, namely prime numbers and the zeros of analytic functions. If solved, it would give us profound insight into number theory and, in particular, the nature of prime numbers. This book is an introduction to the theory surrounding the Riemann Hypothesis. Part I serves as a compendium of known results and as a primer for the material presented in the 20 original papers contained in Part II. The original papers place the material into historical context and illustrate the motivations for research on and around the Riemann Hypothesis. Several of these papers focus on computation of the zeta function, while others give proofs of the Prime Number Theorem, since the Prime Number Theorem is so closely connected to the Riemann Hypothesis. The text is suitable for a graduate course or seminar or simply as a reference for anyone interested in this extraordinary conjecture. Content Level » Professional/practitioner Related subjects » History of Mathematical Sciences - Number Theory and Discrete Mathematics

2013-06-05

#### Primality Testing in Polynomial Time

Primality Testing in Polynomial Time: From Randomized Algorithms to "PRIMES Is in P"

2013-06-05

#### Handbook of Elliptic and Hyperelliptic Curve Cryptography

Handbook of Elliptic and Hyperelliptic Curve Cryptography

2013-06-05

#### Limits to Parallel Computation

This book is an introduction to the rapidly growing theory of P completeness — the branch of complexity theory that focuses on identifying the “hardest” problems in the class P of problems solvable in polynomial time. P -complete problems are of interest because they all appear to lack highly parallel solutions. That is, algorithm designers have failed to find NC algorithms, feasible highly parallel solutions that take time polynomial in the logarithm of the problem size while using only a polynomial number of processors, for them. Consequently, the promise of parallel computation, namely that applying more processors to a problem can greatly speed its solution, appears to be broken by the entire class of P -complete problems. This state of affairs is succinctly expressed as the following question: Does P equal NC ?

2013-06-05

#### Boolean.Functions.and.Computation.Models,.Clote,.Kranakis,.Springer,.2002

This textbook presents a survey of research on boolean functions, circuits, parallel computation models, function algebras, and proof systems. Its main aim is to elucidate the structure of "fast" parallel computation. The complexity of parallel computation is emphasized through a variety of techniques ranging from finite combinatorics, probability theory, and finite group theory to finite model theory and proof theory. Nonuniform computation models are studied in the form of boolean circuits, uniform ones in a variety of forms. Steps in the investigation of non-deterministic polynomial time are surveyed as is the complexity of various proof systems. The book will benefit advanced undergraduate and graduate students as well as researchers in the field of complexity theory. Content Level » Research Keywords » Beweissysteme - Boolesche Funktionen - Komplexitätstheorie - Paralleles Rechnen Related subjects » Mathematics - Software Engineering - Theoretical Computer Science

2013-06-05

#### COMPUTATIONAL COMPLEXITY A Modern Approach

COMPUTATIONAL COMPLEXITY A Modern Approach。英文正式出版，非draft version

2013-06-05

#### Applied Cryptanalysis: Breaking Ciphers in the Real World

The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.

2012-11-23

#### Handbook of Applied Cryptography

Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.

2012-11-23

#### Mathematics of Public Key Cryptography

Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and researchers in mathematics, computer science and electrical engineering. Carefully written to communicate the major ideas and techniques of public key cryptography to a wide readership, this text is enlivened throughout with historical remarks and insightful perspectives on the development of the subject. Numerous examples, proofs and exercises make it suitable as a textbook for an advanced course, as well as for self-study. For more experienced researchers it serves as a convenient reference for many important topics: the Pollard algorithms, Maurer reduction, isogenies, algebraic tori, hyperelliptic curves and many more.

2012-11-23

#### Efficient Hashing with Lookups in two Memory Accesses

Efficient Hashing with Lookups in two Memory Accesses

2012-11-06

#### Hashing in Computer Science: Fifty Years of Slicing and Dicing

Written by one of the developers of the technology, Hashing is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security. The material in this book is based on courses taught by the author, and key points are reinforced in sample problems and an accompanying instructor s manual. Graduate students and researchers in mathematics, cryptography, and security will benefit from this overview of hashing and the complicated mathematics that it requires.

2012-11-06

#### PhD Thesis Marc Stevens Attacks on Hash Functions and Applications

PhD Thesis Marc Stevens Attacks on Hash Functions and Applications

2012-11-06

#### Hashing Searching Sketching

The Information Age has enabled the search for information in ways never imagined before. The search criteria may be exact where the input query is expected to exactly match the search object, or fuzzy -- for instance image search, news search, and similar document search -- making the search problem much harder. Hashing is a simple and effective method for exact search that uses a random hash function to map items into buckets, often viewed as throwing balls into bins. This book studies algorithms for different kinds of search using hashing and sketching, and some fundamental limits of what can be realized using some of these approaches. For exact search, we will see how variants of balls- and-bins processes can be used to derive space efficient methods for maintaining hash tables. For fuzzy search, we will see a variant of a special type of hashing, called locality-sensitive hashing, that uses linear space and how the underlying ideas can be used in the kd-tree data structure for improved performance. We will also probe the fundamental limits of some of these approaches by showing lower bounds on their performance.

2012-11-06

#### Hacker's Delight (2nd Edition)

In Hacker’s Delight, Second Edition, Hank Warren once again compiles an irresistible collection of programming hacks: timesaving techniques, algorithms, and tricks that help programmers build more elegant and efficient software, while also gaining deeper insights into their craft. Warren’s hacks are eminently practical, but they’re also intrinsically interesting, and sometimes unexpected, much like the solution to a great puzzle. They are, in a word, a delight to any programmer who is excited by the opportunity to improve.

2012-11-06

2012-10-20

2011-12-16

2011-12-16

2011-08-17

#### Linux Kernel Development (3rd Edition)

Product Description Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive in their coding. The book details the major subsystems and features of the Linux kernel, including its design, implementation, and interfaces. It covers the Linux kernel with both a practical and theoretical eye, which should appeal to readers with a variety of interests and needs. The author, a core kernel developer, shares valuable knowledge and experience on the 2.6 Linux kernel. Specific topics covered include process management, scheduling, time management and timers, the system call interface, memory addressing, memory management, the page cache, the VFS, kernel synchronization, portability concerns, and debugging techniques. This book covers the most interesting features of the Linux 2.6 kernel, including the CFS scheduler, preemptive kernel, block I/O layer, and I/O schedulers. The third edition of Linux Kernel Development includes new and updated material throughout the book: * An all-new chapter on kernel data structures * Details on interrupt handlers and bottom halves * Extended coverage of virtual memory and memory allocation * Tips on debugging the Linux kernel * In-depth coverage of kernel synchronization and locking * Useful insight into submitting kernel patches and working with the Linux kernel community From the Back Cover Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive in their coding. ¿ The book details the major subsystems and features of the Linux kernel, including its design, implementation, and interfaces. It covers the Linux kernel with both a practical and theoretical eye, which should appeal to readers with a variety of interests and needs. ¿ The author, a core kernel developer, shares valuable knowledge and experience on the 2.6 Linux kernel. Specific topics covered include process management, scheduling, time management and timers, the system call interface, memory addressing, memory management, the page cache, the VFS, kernel synchronization, portability concerns, and debugging techniques. This book covers the most interesting features of the Linux 2.6 kernel, including the CFS scheduler, preemptive kernel, block I/O layer, and I/O schedulers. ¿ The third edition of Linux Kernel Development includes new and updated material throughout the book: * An all-new chapter on kernel data structures * Details on interrupt handlers and bottom halves * Extended coverage of virtual memory and memory allocation * Tips on debugging the Linux kernel * In-depth coverage of kernel synchronization and locking * Useful insight into submitting kernel patches and working with the Linux kernel community

2011-03-16

#### Windows NT 2000 Native API Reference

2010-08-05

《Windows高级调试》的英文原版 参考链接： http://www.china-pub.com/195640 http://www.amazon.com/Advanced-Windows-Debugging-Mario-Hewardt/dp/0321374460/ref=sr_1_1?ie=UTF8&s=books&qid=1280847198&sr=8-1-spell This book enables you to * Master today’s most powerful Windows debugging tools, including NTSD, CDB, WinDbg, KD, and ADPlus * Debug code that wasn’t designed or written for easy debugging * Understand debuggers “under the hood,” and manage symbols and sources efficiently * Debug complex memory corruptions related to stacks and heaps * Resolve complex security problems * Debug across processes: identity tracking, RPC debugger extensions, and tracking IPCs with Ethereal * Find and fix resource leaks, such as memory and handle leaks. * Debug common thread synchronization problems * Learn when and how to write custom debugger extensions * Perform “postmortem debugging” using crash dumps and Windows Error Reporting * Automate debugging with DebugDiag and the Analyze Debugger command

2010-08-03

#### Shared Source CLI Essentials (2nd Edition) Draft

http://www.amazon.com/Shared-Source-Essentials-David-Stutz/dp/059600351X/ref=sr_1_1?ie=UTF8&s=books&qid=1280815814&sr=8-1 Product Description Microsoft's Shared Source CLI (code-named "Rotor") is the publicly available implementation of the ECMA Common Language Infrastructure (CLI) and the ECMA C# language specification. Loaded with three million lines of source code, it presents a wealth of programming language technology that targets developers interested in the internal workings of the Microsoft .NET Framework, academics working with advanced compiler technology, and people developing their own CLI implementations. The CLI, at its heart, is an approach to building software that enables code from many independent sources to co-exist and interoperate safely. Shared Source CLI Essentials is a companion guide to Rotor's code. This concise and insightful volume provides a road map for anyone wishing to navigate, understand, or alter the Shared Source CLI code. This book illustrates the design principles used in the CLI standard and discusses the complexities involved when building virtual machines. Included with the book is a CD-ROM that contains all the source code and files.

2010-08-03

#### Professional Linux Kernel Architecture

Product Description Find an introduction to the architecture, concepts and algorithms of the Linux kernel in Professional Linux Kernel Architecture, a guide to the kernel sources and large number of connections among subsystems. Find an introduction to the relevant structures and functions exported by the kernel to userland, understand the theoretical and conceptual aspects of the Linux kernel and Unix derivatives, and gain a deeper understanding of the kernel. Learn how to reduce the vast amount of information contained in the kernel sources and obtain the skills necessary to understand the kernel sources. From the Back Cover Professional Linux Kernel Architecture As the Linux kernel constantly evolves, so must your understanding of the central functions of the kernel. Linux expert Wolfgang Mauerer focuses on version 2.6.24 (as well as summarizing changes to versions 2.6.25 and 2.6.26) of the kernel as he walks you through the concepts, underlying structures, and implementation of the Linux kernel. Keeping a close connection with the source code—as well as the components and subsystems of the kernel—this book reviews the VFS layer and discusses virtual filesystems and the Extended filesystem family and examines how the page and buffer cache speed up kernel operations. You'll take a look at the peculiarities of various architectures supported by the kernel, explore the assorted tools and means of working efficiently with the kernel sources, and investigate the numerous social aspects of kernel development and the Linux kernel community. Ultimately, this insightful book will serve as an indispensable step towards understanding structure and implementation of the Linux kernel. What you will learn from this book * Various ways of viewing the kernel—as an enhanced machine, a resource manager, and a library * How the kernel handles all time-related requirements, both with low and high resolution * The mechanisms required to ensure proper operation of the kernel on multiprocessor systems * How modules add new functionality to the kernel * How the kernel deals with memory management, page reclaim, and swapping * How the kernel deals with networks and implements TCP/IP Who this book is for This book is for system programmers, administrators, developers of Linux-based solutions, and overall Linux enthusiasts. A solid foundation of C programming is required. Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.

2010-06-23

2010-04-06

#### Reverse Engineering Code with IDA Pro

Refer to: http://www.amazon.com/Reverse-Engineering-Code-IDA-Pro/dp/159749237X/ref=sr_1_2?ie=UTF8&s=books&qid=1266992463&sr=8-2

2010-02-24

2010-02-24

2010-02-10

#### Professional Assembly Language

A linux assembly language guide for fresh man.

2010-02-02

2017-09-19

#### UNIX Internals: The New Frontiers (Paperback)

Amazon上五星的绝世好书！参考链接： http://www.amazon.com/UNIX-Internals-Frontiers-Uresh-Vahalia/dp/0131019082

2009-11-12

2009-10-27

2009-10-23

#### 麻省理工学院-算法导论(重传)

MIT算法导论课程的相关资料，打包发一下。前面发的一个，朋友们说没有资源，但是我上传的时候确实提示上传成功了。这次更新一下，如果仍然不能正常下载，我再想办法。

2008-04-07

2008-04-01

#### C/C++函数手册

C/C++函数手册，是www.cplusplus.com的站点镜像，个人感觉非常好用

2007-12-15