Insecure coding in C (and C++)
Apache Docs
Easy Motorola 68k Reference
dynmod_1_4
Every Moment Counts
Introduction to Software Exploitation Corey K.. All materials is licensed under a Creative Commons Share Alike license.
Xeno Kovah – 2012 xkovah at gmail 1 B INARIES Part 3 See notes for citation.
Pradeep.ii
Don’t count, predict! A systematic comparison of context-counting vs. context-predicting semantic vectors
64 bits for developers
secure lazy binding, and the 64bit time_t development process by Philip Guenther
Top 20 quotes from Hubert H.Humphrey