background preloader

Aho/Ullman Foundations of Computer Science

Aho/Ullman Foundations of Computer Science
This book has been taken out of print by W. H. Freeman. You are welcome to use it if you like. We believed in 1992 it was the way to introduce theory in Computer Science, and we believe that today. --- Al Aho and Jeff Ullman Index The Book | Materials | Gradiance | Errata PDF's of the Book PrefaceTable of ContentsChapter 1 Computer Science: The Mechanization of Abstraction Chapter 2 Iteration, Induction, and Recursion Chapter 3 The Running Time of Programs Chapter 4 Combinatorics and Probability Chapter 5 The Tree Data Model Chapter 6 The List Data Model Chapter 7 The Set Data Model Chapter 8 The Relational Data Model Chapter 9 The Graph Data Model Chapter 10 Patterns, Automata, and Regular Expressions Chapter 11 Recursive Description of Patterns Chapter 12 Propositional Logic Chapter 13 Using Logic to Design Computer Components Chapter 14 Predicate Logic Index Supplementary Materials Gradiance Package Available Errata Sheet We are going to try to maintain errata.

Handbook of Applied Cryptography Alfred J. Menezes, CRC Press ISBN: 0-8493-8523-7 October 1996, 816 pages Fifth Printing (August 2001) The Handbook was reprinted (5th printing) in August 2001. The publisher made all the various minor changes and updates we submitted. You can identify the 5th printing of the book by looking for "5 6 7 8 9 0" at the bottom of the page that includes the ISBN number.

Error Goblin How to Turn Your PlayStation 3 Into a Linux PC (Photograph by Jeffrey Westbrook/Studio D) The Cell processor inside Sony's PlayStation 3 is a powerhouse that lets the gaming console render highly detailed graphics at blistering speed. That same chip gives the PS3 all the processing muscle it needs to become a fully functional computer. Step 1: Back Up Sony hardly walks people through the conversion process—you've got to know where to look in the PS3's menus, and many of the steps can be a bit tricky. Step 2: Upgrade Your Drive PlayStation 3 ships with either a 40 or 80 GB drive. The drive is located behind a small removable panel on the side of the PS3 and can be replaced without too much muss and fuss. Step 3: Install Your New OS This is where things get somewhat complicated. To download an installation kit including both kboot and the Ubuntu OS, click right here. The first step in loading the new operating system is to create a drive partition. There is, however, a trick to getting back to the native PlayStation OS.

Programming Methodology - Download free content from Stanford eBouquin | Toute l'actualité sur le livre et la lecture numérique Design Ideas and Tech Concepts - Toxel.com Access Any Website Or Forum Without Registering Visit any forum or website to find something useful and they will ask you to register. Every time a forum asks me to register, I simply close the site. You would probably do the same. Before I begin, you should know how things work. First grab the add-on for Firefox called ‘user agent’ here and install it. Select User Agent from the left sidebar and click Add. crawl-66-249-66-1.googlebot.com and in user agent field type: Googlebot/2.1 (+ as shown in the screenshot below. Select Google Bot as your User Script by going to Tools > User Agent Switcher. Now browse any website or forum without registering. Advertisement

Computer Architecture This document is a collection of web pages on computer architecture. The first part is an introduction to digital circuits. We recommend you read the pages in this order: Gates. Here, we introduce the fundamental building blocks of digital computers. Comprendre et appliquer Sun Tzu Web.AppStorm | Web Applications Reviewed, Rounded Up & Explained Firesheep The extension was created as a demonstration of the security risk of session hijacking vulnerabilities to users of web sites that only encrypt the login process and not the cookie(s) created during the login process.[3] It has been warned that the use of the extension to capture login details without permission would violate wiretapping laws and/or computer security laws in some countries. Despite the security threat surrounding Firesheep, representatives for Mozilla Add-ons have stated that it would not use the browser's internal add-on blacklist to disable use of Firesheep, as the blacklist has only been used to disable spyware or add-ons which inadvertently create security vulnerabilities, as opposed to attack tools (which may legitimately be used to test the security of one's own systems).[4] Note that even if they did, it wouldn't actually prevent anyone from using Firesheep, as Firefox contains a hidden setting to disable this blacklist.[5] Countermeasures[edit] HTTPS[edit]

The 50 Best How-To Geek Windows Articles of 2010 Even though we cover plenty of other topics, Windows has always been a primary focus around here, and we’ve got one of the largest collections of Windows-related how-to articles anywhere. Here’s the fifty best Windows articles that we wrote in 2010. Want even more? You should make sure to check out our top 20 How-To Geek Explains topics of 2010, or the 50 Windows Registry hacks that make Windows better. How to Customize Your Windows 7 Taskbar Icons for Any App Would you like to change out the icons on your taskbar with a beautiful set of icons that all go together? How to Customize Your Windows 7 Taskbar Icons for Any App Change the Windows 7 Taskbar Color Sure, you can hack Windows and install a custom theme if you really wanted to, or pay for a software package to do it for you. Change the Windows 7 Taskbar Color With No Extra Software (Stupid Geek Tricks) Change Your Windows 7 Taskbar Color the Easy Way (and Rotate Between Colors) How to Crack Your Forgotten Windows Password

Know the Trade – Your IT Security Information Portal CISSP/CEH/CISA/Hacker and Penetration Testing Specialist Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user intitle:"Apache::Status" (inurl:server-status | inurl:status.html | inurl:apache.html) intitle:"Welcome to IIS 4.0!" These log files record info about the SSH client PUTTY.

Related: