Search Engine

Google
 

Thursday, February 8, 2007

BEST AND WORST OF DSP

FOUNDATIONS

Chapter 1 - The Breadth and Depth of DSP

The Roots of DSP
Telecommunications
Audio Processing
Echo Location
Image Processing

Chapter 2 - Statistics, Probability and Noise

Signal and Graph Terminology
Mean and Standard Deviation
Signal vs. Underlying Process
The Histogram, Pmf and Pdf
The Normal Distribution
Digital Noise Generation
Precision and Accuracy

Chapter 3 - ADC and DAC

Quantization
The Sampling Theorem
Digital-to-Analog Conversion
Analog Filters for Data Conversion
Selecting The Antialias Filter
Multirate Data Conversion
Single Bit Data Conversion

Chapter 4 - DSP Software

Computer Numbers
Fixed Point (Integers)
Floating Point (Real Numbers)
Number Precision
Execution Speed: Program Language
Execution Speed: Hardware
Execution Speed: Programming Tips

FUNDAMENTALS

Chapter 5 - Linear Systems

Signals and Systems
Requirements for Linearity
Static Linearity and Sinusoidal Fidelity
Examples of Linear and Nonlinear Systems
Special Properties of Linearity
Superposition: the Foundation of DSP
Common Decompositions
Alternatives to Linearity

Chapter 6 - Convolution

The Delta Function and Impulse Response
Convolution
The Input Side Algorithm
The Output Side Algorithm
The Sum of Weighted Inputs

Chapter 7 - Properties of Convolution

Common Impulse Responses
Mathematical Properties
Correlation
Speed

Chapter 8 - The Discrete Fourier Transform

The Family of Fourier Transform
Notation and Format of the Real DFT
The Frequency Domain's Independent Variable
DFT Basis Functions
Synthesis, Calculating the Inverse DFT
Analysis, Calculating the DFT
Duality
Polar Notation
Polar Nuisances

Chapter 9 - Applications of the DFT

Spectral Analysis of Signals
Frequency Response of Systems
Convolution via the Frequency Domain

Chapter 10 - Fourier Transform Properties

Linearity of the Fourier Transform
Characteristics of the Phase
Periodic Nature of the DFT
Compression and Expansion, Multirate methods
Multiplying Signals (Amplitude Modulation)
The Discrete Time Fourier Transform
Parseval's Relation

Chapter 11 - Fourier Transform Pairs

Delta Function Pairs
The Sinc Function
Other Transform Pairs
Gibbs Effect
Harmonics
Chirp Signals

Chapter 12 - The Fast Fourier Transform

Real DFT Using the Complex DFT
How the FFT works
FFT Programs
Speed and Precision Comparisons
Further Speed Increases

Chapter 13 - Continuous Signal Processing

The Delta Function
Convolution
The Fourier Transform
The Fourier Series

DIGITAL FILTERS

Chapter 14 - Introduction to Digital Filters

Filter Basics
How Information is Represented in Signals
Time Domain Parameters
Frequency Domain Parameters
High-Pass, Band-Pass and Band-Reject Filters
Filter Classification

Chapter 15 - Moving Average Filters

Implementation by Convolution
Noise Reduction vs. Step Response
Frequency Response
Relatives of the Moving Average Filter
Recursive Implementation

Chapter 16 - Windowed-Sinc Filters

Strategy of the Windowed-Sinc
Designing the Filter
Examples of Windowed-Sinc Filters
Pushing it to the Limit

Chapter 17 - Custom Filters

Arbitrary Frequency Response
Deconvolution
Optimal Filters

Chapter 18 - FFT Convolution

The Overlap-Add Method
FFT Convolution
Speed Improvements

Chapter 19 - Recursive Filters

The Recursive Method
Single Pole Recursive Filters
Narrow-band Filters
Phase Response
Using Integers

Chapter 20 - Chebyshev Filters

The Chebyshev and Butterworth Responses
Designing the Filter
Step Response Overshoot
Stability

Chapter 21 - Filter Comparison

Match #1: Analog vs. Digital Filters
Match #2: Windowed-Sinc vs. Chebyshev
Match #3: Moving Average vs. Single Pole

APPLICATIONS

Chapter 22 - Audio Processing

Human Hearing
Timbre
Sound Quality vs. Data Rate
High Fidelity Audio
Companding
Speech Synthesis and Recognition
Nonlinear Audio Processing

Chapter 23 - Image Formation & Display

Digital Image Structure
Cameras and Eyes
Television Video Signals
Other Image Acquisition and Display
Brightness and Contrast Adjustments
Grayscale Transforms
Warping

Chapter 24 - Linear Image Processing

Convolution
3x3 Edge Modification
Convolution by Separability
Example of a Large PSF: Illumination Flattening
Fourier Image Analysis
FFT Convolution
A Closer Look at Image Convolution

Chapter 25 - Special Imaging Techniques

Spatial Resolution
Sample Spacing and Sampling Aperture
Signal-to-Noise Ratio
Morphological Image Processing
Computed Tomography

Chapter 26 - Neural Networks (and more!)

Target Detection
Neural Network Architecture
Why Does it Work?
Training the Neural Network
Evaluating the Results
Recursive Filter Design

Chapter 27 - Data Compression

Data Compression Strategies
Run-Length Encoding
Huffman Encoding
Delta Encoding
LZW Compression
JPEG (Transform Compression)
MPEG

Chapter 28 - Digital Signal Processors

How DSPs are Different from Other Microprocessors
Circular Buffering
Architecture of the Digital Signal Processor
Fixed versus Floating Point
C versus Assembly
How Fast are DSPs?
The Digital Signal Processor Market

Chapter 29 - Getting Started with DSPs

The ADSP-2106x family
The SHARC EZ-KIT Lite
Design Example: An FIR Audio Filter
Analog Measurements on a DSP System
Another Look at Fixed versus Floating Point
Advanced Software Tools

COMPLEX TECHNIQUES

Chapter 30 - Complex Numbers

The Complex Number System
Polar Notation
Using Complex Numbers by Substitution
Complex Representation of Sinusoids
Complex Representation of Systems
Electrical Circuit Analysis

Chapter 31 - The Complex Fourier Transform

The Real DFT
Mathematical Equivalence
The Complex DFT
The Family of Fourier Transforms
Why the Complex Fourier Transform is Used

Chapter 32 - The Laplace Transform

The Nature of the s-Domain
Strategy of the Laplace Transform
Analysis of Electric Circuits
The Importance of Poles and Zeros
Filter Design in the s-Domain

Chapter 33 - The z-Transform

The Nature of the z-Domain
Analysis of Recursive Systems
Cascade and Parallel Stages
Spectral Inversion
Gain Changes
Chebyshev-Butterworth Filter Design

The Best and Worst of DSP

Chapter 1 - The Breadth and Depth of DSP

The Roots of DSP
Telecommunications
Audio Processing
Echo Location
Image Processing

Chapter 2 - Statistics, Probability and Noise

Signal and Graph Terminology
Mean and Standard Deviation
Signal vs. Underlying Process
The Histogram, Pmf and Pdf
The Normal Distribution
Digital Noise Generation
Precision and Accuracy

Chapter 3 - ADC and DAC

Quantization
The Sampling Theorem
Digital-to-Analog Conversion
Analog Filters for Data Conversion
Selecting The Antialias Filter
Multirate Data Conversion
Single Bit Data Conversion

Chapter 4 - DSP Software

Computer Numbers
Fixed Point (Integers)
Floating Point (Real Numbers)
Number Precision
Execution Speed: Program Language
Execution Speed: Hardware
Execution Speed: Programming Tips

FUNDAMENTALS

Chapter 5 - Linear Systems

Signals and Systems
Requirements for Linearity
Static Linearity and Sinusoidal Fidelity
Examples of Linear and Nonlinear Systems
Special Properties of Linearity
Superposition: the Foundation of DSP
Common Decompositions
Alternatives to Linearity

Chapter 6- Algorithm

The Delta Function and Impulse Response
Convolution
The Input Side Algorithm
The Output Side Algorithm
The Sum of Weighted Inputs

Chapter 7 - Properties of Convolution

Common Impulse Responses
Mathematical Properties
Correlation
Speed

Chapter 8 - The Discrete Fourier Transform

The Family of Fourier Transform
Notation and Format of the Real DFT
The Frequency Domain's Independent Variable
DFT Basis Functions
Synthesis, Calculating the Inverse DFT
Analysis, Calculating the DFT
Duality
Polar Notation
Polar Nuisances

Chapter 9 - Applications of the DFT

Spectral Analysis of Signals
Frequency Response of Systems
Convolution via the Frequency Domain

Chapter 10 - Fourier Transform Properties

Linearity of the Fourier Transform
Characteristics of the Phase
Periodic Nature of the DFT
Compression and Expansion, Multirate methods
Multiplying Signals (Amplitude Modulation)
The Discrete Time Fourier Transform
Parseval's Relation

Chapter 11 - Fourier Transform Pairs

Delta Function Pairs
The Sinc Function
Other Transform Pairs
Gibbs Effect
Harmonics
Chirp Signals

Chapter 12 - The Fast Fourier Transform

Real DFT Using the Complex DFT
How the FFT works
FFT Programs
Speed and Precision Comparisons
Further Speed Increases

Chapter 13 - Continuous Signal Processing

The Delta Function
Convolution
The Fourier Transform
The Fourier Series

DIGITAL FILTERS

Chapter 14 - Introduction to Digital Filters

Filter Basics
How Information is Represented in Signals
Time Domain Parameters
Frequency Domain Parameters
High-Pass, Band-Pass and Band-Reject Filters
Filter Classification

Chapter 15 - Moving Average Filters

Implementation by Convolution
Noise Reduction vs. Step Response
Frequency Response
Relatives of the Moving Average Filter
Recursive Implementation

Chapter 16 - Windowed-Sinc Filters

Strategy of the Windowed-Sinc
Designing the Filter
Examples of Windowed-Sinc Filters
Pushing it to the Limit

Chapter 17 - Custom Filters

Arbitrary Frequency Response
Deconvolution
Optimal Filters

Chapter 18 - FFT Convolution

The Overlap-Add Method
FFT Convolution
Speed Improvements

Chapter 19 - Recursive Filters

The Recursive Method
Single Pole Recursive Filters
Narrow-band Filters
Phase Response
Using Integers

Chapter 20 - Chebyshev Filters

The Chebyshev and Butterworth Responses
Designing the Filter
Step Response Overshoot
Stability

Chapter 21 - Filter Comparison

Match #1: Analog vs. Digital Filters
Match #2: Windowed-Sinc vs. Chebyshev
Match #3: Moving Average vs. Single Pole

APPLICATIONS

Chapter 22 - Audio Processing

Human Hearing
Timbre
Sound Quality vs. Data Rate
High Fidelity Audio
Companding
Speech Synthesis and Recognition
Nonlinear Audio Processing

Chapter 23 - Image Formation & Display

Digital Image Structure
Cameras and Eyes
Television Video Signals
Other Image Acquisition and Display
Brightness and Contrast Adjustments
Grayscale Transforms
Warping

Chapter 24 - Linear Image Processing

Convolution
3x3 Edge Modification
Convolution by Separability
Example of a Large PSF: Illumination Flattening
Fourier Image Analysis
FFT Convolution
A Closer Look at Image Convolution

Chapter 25 - Special Imaging Techniques

Spatial Resolution
Sample Spacing and Sampling Aperture
Signal-to-Noise Ratio
Morphological Image Processing
Computed Tomography

Chapter 26 - Neural Networks (and more!)

Target Detection
Neural Network Architecture
Why Does it Work?
Training the Neural Network
Evaluating the Results
Recursive Filter Design

Chapter 27 - Data Compression

Data Compression Strategies
Run-Length Encoding
Huffman Encoding
Delta Encoding
LZW Compression
JPEG (Transform Compression)
MPEG

Chapter 28 - Digital Signal Processors

How DSPs are Different from Other Microprocessors
Circular Buffering
Architecture of the Digital Signal Processor
Fixed versus Floating Point
C versus Assembly
How Fast are DSPs?
The Digital Signal Processor Market

Chapter 29 - Getting Started with DSPs

The ADSP-2106x family
The SHARC EZ-KIT Lite
Design Example: An FIR Audio Filter
Analog Measurements on a DSP System
Another Look at Fixed versus Floating Point
Advanced Software Tools

COMPLEX TECHNIQUES

Chapter 30 - Complex Numbers

The Complex Number System
Polar Notation
Using Complex Numbers by Substitution
Complex Representation of Sinusoids
Complex Representation of Systems
Electrical Circuit Analysis

Chapter 31 - The Complex Fourier Transform

The Real DFT
Mathematical Equivalence
The Complex DFT
The Family of Fourier Transforms
Why the Complex Fourier Transform is Used

Chapter 32 - The Laplace Transform

The Nature of the s-Domain
Strategy of the Laplace Transform
Analysis of Electric Circuits
The Importance of Poles and Zeros
Filter Design in the s-Domain

Chapter 33 - The z-Transform

The Nature of the z-Domain
Analysis of Recursive Systems
Cascade and Parallel Stages
Spectral Inversion
Gain Changes
Chebyshev-Butterworth Filter Design

COMPUTER PROGRAMMING SOLUTION

Computer Programming

Art of Assembly language [pdf,tgz]
Art of Assembly language (High Level Assembler) [pdf]
Thinking in C++, 2nd Edition, Volume 2 [online(frames,no frames)]
Thinking in C++, 2nd Edition, Volume 2, Example Codes [online,tgz]
C++ Programming style [txt]
Multithreaded Programming Guide (Sun Microsystems) [pdf]
POSIX.1c/D10 Summary (Sun Microsystems) [ps,pdf]
pthreads and Solaris threads: A comparison of two user level threads APIs (Sun Microsystems) ,[pdf]
Thinking in Java, 2nd Edition [online(frames,no frames)]
Thinking in Java, 2nd Edition, Example Codes [online,tgz]
Intel Architecture optimizations [pdf]
HTML 4.0 Reference [online]
Data Display Debugger (DDD) 3.3.1 Manual [online]
Writing Multithreaded Code in Solaris [pdf]
Intel Architecture Optimization Manual [pdf]
Intel Architecture Software Developer's Manual, Volume 1, Basic Architecture [pdf]
Intel Architecture Software Developer's Manual, Volume 2, Instruction Set Reference [pdf]
Intel Architecture Software Developer's Manual, Volume 3, System Programming [pdf]
Performance of Various Computers Using Standard Linear Equations Software [pdf]
The SPARC Architecture Manual, Version 8 [pdf]
The SPARC Architecture Manual, Version 9 [pdf]
UltraSPARC I-II User's Manual [pdf]
UltraSPARC IIi User's Manual [pdf]
microSPARC IIep User's Manual [pdf]
SuperSPARC II Addendum [pdf]
Alpha Architecture Handbook, Version 4 [pdf]
System V Application Binary Interface, Edition 4.1 [pdf]
System V Application Binary Interface, Intel386 Architecture Processor Supplement, Edition 4 [pdf]
MIPS R4000 Microprocessor User's Manual, 2nd Edition [pdf]
The 32-bit PA-RISC Run-time Architecture Document, HP-UX 10.20, Version 3 [pdf]
The 32-bit PA-RISC Run-time Architecture Document, HP-UX 11.00, Version 1 [pdf]
ANSI/ISO C++ Professional Programmer's Handbook [pdf] VHDL

VHDL

CookBook by Peter J. Ashenden [pdf]
Analog and Mixed-Signal Modeling using VHDL-AMS [pdf]
European Space Agency (ESA) VHDL Modelling Guidelines [pdf]
US Navy VHDL Modelling Guide [pdf(1,2,3,4,5,6,7)]

Operating systems

Introduction to OS [pdf]
Process scheduling [pdf]
Resource management and deadlocks [pdf]
I/O Management [pdf]
Filesystem [pdf]
Memory management [pdf]
Interprocess communication [pdf]
System security [pdf]

Cryptography

A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]
Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]
Cryptography - The myths [pdf]
A Cryptograpgic Compendium [link]
Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf]
Security protocols overview by RSA Laboratories [pdf]
Security Pitfalls in Cryptography [pdf]
Stream ciphers [pdf]
Understanding Public Key Infrastructure [pdf]
Trust Models and Management in Public-Key Infrastuctured [pdf]
Why Cryptography is Harder than it looks [pdf]
Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]
CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]
RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]
Smartcard security [pdf]
Digital Signatures, Certificates and Electronic Commerce [pdf]
Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf]
Implementation Experience with AES Candidate Algorithms [pdf]
Performance Analysis of AES candidates on the 6805 CPU core [pdf]
UK Government Organisations Involved in Communications and Information Systems Security [pdf]
The block cipher Square [pdf]
Attacks on Cryptoprocessor Transaction Sets [pdf]
Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf]
Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]
Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf]
Compliance Defects in Public-Key Cryptography [pdf]
Architectural considerations for cryptanalytic hardware [pdf]
WEP Fix using RC4 Fast Packet Keying [pdf]
RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf]
Block Ciphers [pdf]
Stream Ciphers [pdf]
C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf]
Universal Hashing and Multiple Authentication [pdf]
Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]
The simple ideal cipher system [pdf]
An FPGA Implementation of the Linear Cruptanalysis [pdf]
The math behind the RSA cipher [txt]
RSA hardware implementation [pdf]
High-Speed RSA implementation [pdf]
Are 'Strong' Primes Needed for RSA? [pdf]
RSAES-OAEP Encryption scheme [pdf]
Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf]
Are 'Strong' Primed Needed for RSA? [pdf]
Why Textbook ElGamal and RSA Encryption are Insecure [pdf]
The DES algorithm [txt]
The RC5 encryption algorithm [pdf]
On The Security of the RC5 Encryption Algorithm [pdf]
The ESP RC5-CBC Transform [txt]
The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]
The RC6 block cipher [pdf]
RC6 as the AES [pdf]
The security of RC6 block cipher [pdf]
Statistical testing of RC6 block cipher [pdf]
Blowfish algorithm in plain English [txt]
Source code for Blowfish implementation [zip(C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)]
Twofish: A 128-bit Block Cipher [pdf]
Upper bounds on differential characteristics in Twofish [pdf]
Impossible differentials in Twofish [pdf]
A Twofish retreat: Related-Key attacks against Reduced-Round Twofish [pdf]
Further observations on the Key Schedule of Twofish [pdf]
Empirical verification of Twofish key uniqueness properties [pdf]
Key separation in Twofish [pdf]
Improved Twofish implementations [pdf]
Implementation of the Twofish Cipher using FPGA devices [pdf]
Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)]
The Rijndael Block Cipher [pdf]
A Specification of Rijndael, the AES Algorithm [pdf]
Efficient Implementation of the Rijndael S-box [pdf]
The Elliptic Curve Cryptosystem [pdf]
Elliptic Curce Cryptosystems [pdf]
Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf]
The Elliptic Curve Cryptosystem for Smart Cards [pdf]
The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]
Recommendation on Elliptic Curve Cryptosystems [pdf]
Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]

Security

Program Stack vulnerability [txt]
Non-executable Program Stack vulnerability [txt]
Strange Attractors and TCP/IP Sequence Number Analysis [link]
Rainbow book series [link]
Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf]
Attacks on and Countermeasures for USB Hardware Token Devices [pdf]
UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf]
Countermeasures against Buffer Overflow Attacks [pdf]
Integrating Flexible Support for Security Policies into the Linux Operating System [pdf]
Flaw in NTRU Signature Scheme (NSS) [pdf]
Meeting Critical Security Objectived with Security-Enhanced Linux [pdf]
Secure Programming with Linux and Unix [pdf]
Reverse Compilation Techniques [pdf]
What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf]
Stack Smashing Vulnerabilities in the UNIX Operation System [pdf]

Networking

Networking concepts [pdf]
Introduction to Internet Protocols [txt]
Network planning and design [pdf]
Queuing analysis [pdf]
Parallel FTP performance in a High-Bandwidth High-Latency WAN [pdf]
Compete WAP Security [pdf]
Cryptographic Authentication fo Real-Time Network Protocols [pdf]
Temporary Committee on the ECHELON Interception System Report (Working Document) [pdf]
IP Multicast Configuration [pdf]
Can Shortest-path Routing and TCP Maximize Utility [pdf]
A new TCP congestion control with empty queues and scalable stability [pdf]
FAST Kernel: Backgroung Theory and Experimental Results [pdf]
Robustness and the Internet: Design and evolution [pdf]
Robust congestion control for the Internet [pdf]
A Mathematical Framework for Designing a Low-Loss, Low-Delay Internet [pdf]
On the stability of networks operating TCP-like congestion control [pdf]
Ultrascale Network Protocols for Computing and Science in the 21st Century [pdf]

Computer Clusters

High Performance Computing and Beowulf Clusters [pdf]
Web Search for a Planet: The Google Cluster Architecture [pdf]

Bluetooth

Specification of the Bluetooth System v1.1 22-02-2001 (Core) [pdf]
Specification of the Bluetooth System v1.1 22-02-2001 (Profiles) [pdf]
SyncML Over Bluetooth [pdf]
Bluetooth Network Encapsulation Protocol (BNEP) Specification [pdf]
Bluetooth Extended Service Deiscovery Profile (ESDP) for Universal Plug and Play (UPnP) [pdf]
Personal Area Networking (PAN) Profile [pdf]
Bluetooth Security White Paper [pdf]
Security Comparison: Bluetooth vs 802.11 [pdf]

Mathematics

SOS Mathematics [link]
Mathematics archives [link]
Dave's math tables [link]
On-line Encyclopedia of Integer Sequences [link]
Notes on Fermat's Last Theorem by A. J. Van Der Poorten [pdf(1,2,3,4,5,6,7,8)]
p-adic Chaos and Random Number Generation [pdf]
Introduction to Probability Theory [pdf]
Calculus - One-Variable Calculus, with an Introduction to Linear Algebra [pdf]
Introduction to Methods of Applied Mathematics or Advances Mathematical Methods for Scientists and Engineers [pdf]
Tables of Integrals and other Mathematical data [pdf]
Random Generators and Normal Numbers [pdf]
Ramanujan's Notebooks [pdf(pdf,pdf)]
Prime Percolation [pdf]
Prime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary Representation [pdf]
Perturbation Theory of Dynamical Systems [pdf]
On Fourier and Zeta(s) [pdf]
Newton's Formula and the Continued Fraction Expansion of sqrt(d) [pdf]
Linear Algebra [pdf]
Linear Algebra - Answers [pdf]
New Representations for the Madelung Constant [pdf]
Sums of Squares, Cubes, and Higher Powers [pdf]
Computing A Glimpse of Randomness [pdf]
Computing the Generating Function of a Series Given its First Few Terms [pdf]
Asymptotic Behavior of Excitable Cellular Automata [pdf]
An Efficient Algorithm for Computing the Ith Letter of phi^n(a).pdf [pdf]
Algebraic Topology [pdf]
A Proof of a Conjecture of Knuth [pdf]
A Practical Version of the Generalized Lagrange Algorithm [pdf]

Engineering

Theoretical Computer Science cheat sheet [pdf]
A mathematical theory of Communication [pdf]
A Primer on Asynchronous Modem Communication [pdf]
Dictionary of Algorithms, Data Structured, and Problems [link]
Computing dictionary [link]
Acronym lookup engine [link]
StudyWeb search engine [link]

UNIX

Unix is a Four Letter Word, and Vi is a Two Letter Abbreviation [pdf]
Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX [pdf]
UNIX [pdf]
Intermediate Unix Training [pdf]
VI lovers [link]
Unix Programming Tools [pdf]
Unix history timeline (1969-2000) [pdf]
Executable and Linkable Format (ELF) [txt]
A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux [online]
Guide to Unix IPC [link]
The Linux Kernel API [pdf]
Unreliable guide to Linux kernel locking [pdf]
Unreliable guide to hacking the Linux kernel [pdf]
Linux 2.4 NAT Howto [pdf]
Linux advanced routing Howto [pdf]
Linux Netfilter hacking Howto [pdf]
Samba 2.2 [online]
Samba TNG [online]

USENIX

Token-Mediated Certification and Electronic Commerce [pdf]
The Linux BIOS [pdf]
LOBOS: (Linux OS Boots OS) Booting a kernel in 32-bit mode [pdf]

Miscelaneous

CVS Manual [online]
The Ultimate Memory Guide [pdf]
The RAM Guy's Tech Notes [link]
Sun-Tzu The Art of Warfare [online]
Ko Ko Ko [avi]

ISO Images

Slackware
Splackware
FreeBSD
Solaris