the power of google.. looking for something and came across this.

"Food for thought" from Sussex University Communications Research Group.

http://www.comms.engg.susx.ac.uk/fft/

here's most what you'll find there.

Computer Programming

Art of Assembly language [pdf,tgz]

Art of Assembly language (High Level Assembler) [pdf]

Thinking in C++, 2nd Edition, Volume 2 [online(frames,no frames)]

Thinking in C++, 2nd Edition, Volume 2, Example Codes [online,tgz]

C++ Programming style [txt]

Multithreaded Programming Guide (Sun Microsystems) [pdf]

POSIX.1c/D10 Summary (Sun Microsystems) [ps,pdf]

pthreads and Solaris threads: A comparison of two user level threads APIs (Sun Microsystems) [ps,pdf]

Thinking in Java, 2nd Edition [online(frames,no frames)]

Thinking in Java, 2nd Edition, Example Codes [online,tgz]

Intel Architecture optimizations [pdf]

Adaptive Communication Environment (ACE) library API [online]

Java comm API [online]

JDK 1.3 API [online]

JDK 1.4 API [online]

HTML 4.0 Reference [online]

Data Display Debugger (DDD) 3.3.1 Manual [online]

Writing Multithreaded Code in Solaris [pdf]

Intel Architecture Optimization Manual [pdf]

Intel Architecture Software Developer's Manual, Volume 1, Basic Architecture [pdf]

Intel Architecture Software Developer's Manual, Volume 2, Instruction Set Reference [pdf]

Intel Architecture Software Developer's Manual, Volume 3, System Programming [pdf]

Performance of Various Computers Using Standard Linear Equations Software [pdf]

The SPARC Architecture Manual, Version 8 [pdf]

The SPARC Architecture Manual, Version 9 [pdf]

UltraSPARC I-II User's Manual [pdf]

UltraSPARC IIi User's Manual [pdf]

microSPARC IIep User's Manual [pdf]

SuperSPARC II Addendum [pdf]

Alpha Architecture Handbook, Version 4 [pdf]

System V Application Binary Interface, Edition 4.1 [pdf]

System V Application Binary Interface, Intel386 Architecture Processor Supplement, Edition 4 [pdf]

MIPS R4000 Microprocessor User's Manual, 2nd Edition [pdf]

The 32-bit PA-RISC Run-time Architecture Document, HP-UX 10.20, Version 3 [pdf]

The 32-bit PA-RISC Run-time Architecture Document, HP-UX 11.00, Version 1 [pdf]

ANSI/ISO C++ Professional Programmer's Handbook [pdf]

VHDL

VHDL CookBook by Peter J. Ashenden [pdf]

Analog and Mixed-Signal Modeling using VHDL-AMS [pdf]

European Space Agency (ESA) VHDL Modelling Guidelines [pdf]

US Navy VHDL Modelling Guide [pdf(1,2,3,4,5,6,7)]

Operating systems

Introduction to OS [pdf]

Process scheduling [pdf]

Resource management and deadlocks [pdf]

I/O Management [pdf]

Filesystem [pdf]

Memory management [pdf]

Interprocess communication [pdf]

System security [pdf]

Cryptography

A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]

Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]

Cryptography - The myths [pdf]

A Cryptograpgic Compendium [link]

Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf]

Security protocols overview by RSA Laboratories [pdf]

Security Pitfalls in Cryptography [pdf]

Stream ciphers [pdf]

Understanding Public Key Infrastructure [pdf]

Trust Models and Management in Public-Key Infrastuctured [pdf]

Why Cryptography is Harder than it looks [pdf]

Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]

CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]

RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]

Smartcard security [pdf]

Digital Signatures, Certificates and Electronic Commerce [pdf]

Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf]

Implementation Experience with AES Candidate Algorithms [pdf]

Performance Analysis of AES candidates on the 6805 CPU core [pdf]

UK Government Organisations Involved in Communications and Information Systems Security [pdf]

The block cipher Square [pdf]

Attacks on Cryptoprocessor Transaction Sets [pdf]

Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf]

Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]

Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf]

Compliance Defects in Public-Key Cryptography [pdf]

Architectural considerations for cryptanalytic hardware [pdf]

WEP Fix using RC4 Fast Packet Keying [pdf]

RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf]

Block Ciphers [pdf]

Stream Ciphers [pdf]

C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf]

Universal Hashing and Multiple Authentication [pdf]

Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]

The simple ideal cipher system [pdf]

An FPGA Implementation of the Linear Cruptanalysis [pdf]

The math behind the RSA cipher [txt]

RSA hardware implementation [pdf]

High-Speed RSA implementation [pdf]

Are 'Strong' Primes Needed for RSA? [pdf]

RSAES-OAEP Encryption scheme [pdf]

Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf]

Are 'Strong' Primed Needed for RSA? [pdf]

Why Textbook ElGamal and RSA Encryption are Insecure [pdf]

The DES algorithm [txt]

The RC5 encryption algorithm [pdf]

On The Security of the RC5 Encryption Algorithm [pdf]

The ESP RC5-CBC Transform [txt]

The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]

The RC6 block cipher [pdf]

RC6 as the AES [pdf]

The security of RC6 block cipher [pdf]

Statistical testing of RC6 block cipher [pdf]

Blowfish algorithm in plain English [txt]

Source code for Blowfish implementation [zip(C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)]

Twofish: A 128-bit Block Cipher [pdf]

Upper bounds on differential characteristics in Twofish [pdf]

Impossible differentials in Twofish [pdf]

A Twofish retreat: Related-Key attacks against Reduced-Round Twofish [pdf]

Further observations on the Key Schedule of Twofish [pdf]

Empirical verification of Twofish key uniqueness properties [pdf]

Key separation in Twofish [pdf]

Improved Twofish implementations [pdf]

Implementation of the Twofish Cipher using FPGA devices [pdf]

Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)]

The Rijndael Block Cipher [pdf]

A Specification of Rijndael, the AES Algorithm [pdf]

Efficient Implementation of the Rijndael S-box [pdf]

The Elliptic Curve Cryptosystem [pdf]

Elliptic Curce Cryptosystems [pdf]

Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf]

The Elliptic Curve Cryptosystem for Smart Cards [pdf]

The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]

Recommendation on Elliptic Curve Cryptosystems [pdf]

Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]

Security

Program Stack vulnerability [txt]

Non-executable Program Stack vulnerability [txt]

Strange Attractors and TCP/IP Sequence Number Analysis [link]

Rainbow book series [link]

Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf]

Attacks on and Countermeasures for USB Hardware Token Devices [pdf]

UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf]

Countermeasures against Buffer Overflow Attacks [pdf]

Integrating Flexible Support for Security Policies into the Linux Operating System [pdf]

Flaw in NTRU Signature Scheme (NSS) [pdf]

Meeting Critical Security Objectived with Security-Enhanced Linux [pdf]

Secure Programming with Linux and Unix [pdf]

Reverse Compilation Techniques [pdf]

What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf]

Stack Smashing Vulnerabilities in the UNIX Operation System [pdf]

Networking

Networking concepts [pdf]

Introduction to Internet Protocols [txt]

Network planning and design [pdf]

Queuing analysis [pdf]

Parallel FTP performance in a High-Bandwidth High-Latency WAN [pdf]

Compete WAP Security [pdf]

Cryptographic Authentication fo Real-Time Network Protocols [pdf]

Temporary Committee on the ECHELON Interception System Report (Working Document) [pdf]

IP Multicast Configuration [pdf]

Can Shortest-path Routing and TCP Maximize Utility [pdf]

A new TCP congestion control with empty queues and scalable stability [pdf]

FAST Kernel: Backgroung Theory and Experimental Results [pdf]

Robustness and the Internet: Design and evolution [pdf]

Robust congestion control for the Internet [pdf]

A Mathematical Framework for Designing a Low-Loss, Low-Delay Internet [pdf]

On the stability of networks operating TCP-like congestion control [pdf]

Ultrascale Network Protocols for Computing and Science in the 21st Century [pdf]

Computer Clusters

High Performance Computing and Beowulf Clusters [pdf]

Web Search for a Planet: The Google Cluster Architecture [pdf]

Bluetooth

Specification of the Bluetooth System v1.1 22-02-2001 (Core) [pdf]

Specification of the Bluetooth System v1.1 22-02-2001 (Profiles) [pdf]

SyncML Over Bluetooth [pdf]

Bluetooth Network Encapsulation Protocol (BNEP) Specification [pdf]

Bluetooth Extended Service Deiscovery Profile (ESDP) for Universal Plug and Play (UPnP) [pdf]

Personal Area Networking (PAN) Profile [pdf]

Bluetooth Security White Paper [pdf]

Security Comparison: Bluetooth vs 802.11 [pdf]

Mathematics

SOS Mathematics [link]

Mathematics archives [link]

Dave's math tables [link]

On-line Encyclopedia of Integer Sequences [link]

Notes on Fermat's Last Theorem by A. J. Van Der Poorten [pdf(1,2,3,4,5,6,7,8)]

p-adic Chaos and Random Number Generation [pdf]

Introduction to Probability Theory [pdf]

Calculus - One-Variable Calculus, with an Introduction to Linear Algebra [pdf]

Introduction to Methods of Applied Mathematics or Advances Mathematical Methods for Scientists and Engineers [pdf]

Tables of Integrals and other Mathematical data [pdf]

Random Generators and Normal Numbers [pdf]

Ramanujan's Notebooks [pdf(pdf,pdf)]

Prime Percolation [pdf]

Prime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary Representation [pdf]

Perturbation Theory of Dynamical Systems [pdf]

On Fourier and Zeta(s) [pdf]

Newton's Formula and the Continued Fraction Expansion of sqrt(d) [pdf]

Linear Algebra [pdf]

Linear Algebra - Answers [pdf]

New Representations for the Madelung Constant [pdf]

Sums of Squares, Cubes, and Higher Powers [pdf]

Computing A Glimpse of Randomness [pdf]

Computing the Generating Function of a Series Given its First Few Terms [pdf]

Asymptotic Behavior of Excitable Cellular Automata [pdf]

An Efficient Algorithm for Computing the Ith Letter of phi^n(a).pdf [pdf]

Algebraic Topology [pdf]

A Proof of a Conjecture of Knuth [pdf]

A Practical Version of the Generalized Lagrange Algorithm [pdf]

Engineering

Theoretical Computer Science cheat sheet [pdf]

A mathematical theory of Communication [pdf]

A Primer on Asynchronous Modem Communication [pdf]

Dictionary of Algorithms, Data Structured, and Problems [link]

Computing dictionary [link]

Acronym lookup engine [link]

StudyWeb search engine [link]

UNIX

Unix is a Four Letter Word, and Vi is a Two Letter Abbreviation [pdf]

Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX [pdf]

UNIX [pdf]

Intermediate Unix Training [pdf]

VI lovers [link]

Unix Programming Tools [pdf]

Unix history timeline (1969-2000) [pdf]

Executable and Linkable Format (ELF) [txt]

A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux [online]

Guide to Unix IPC [link]

The Linux Kernel API [pdf]

Unreliable guide to Linux kernel locking [pdf]

Unreliable guide to hacking the Linux kernel [pdf]

Linux 2.4 NAT Howto [pdf]

Linux advanced routing Howto [pdf]

Linux Netfilter hacking Howto [pdf]

Samba 2.2 [online]

Samba TNG [online]

USENIX

Token-Mediated Certification and Electronic Commerce [pdf]

The Linux BIOS [pdf]

LOBOS: (Linux OS Boots OS) Booting a kernel in 32-bit mode [pdf]

I wish I had broadband and a DVD writer.. is there a santa in the house ?