计算机系统结构方面
Computer Architecture- A Quantitative Approach(705页)
Computer Organization and Design The Hardware Software Interface(684页)
作者John L. Hennessy和David A. Patterson,计算机体系结构方面的巅峰著作。想全面掌握计算机设计与运行原理的必读书籍。
Computer Organization and Architecture(826页)
作者 William Stallings,可以说是美国最杰出的计算机作家,他的这本书及其易懂,建议先读这本书。 计算机理论方面The Art of Computer Programming(共三卷 2300页)
作者Donald E. Knuth,是计算机理论方面最杰出的大师。他的这本书讲述的是计算机科学中用到的绝大部分算法。大家要非常重视算法,因为算法是计算机科学中的精髓(个人观点)。
Algorithms in C(672页)
作者Robert Sedgewick,Donald E. Knuth的学生。他的这本讲述算法的书清晰易懂,建议先读这本书。 操作系统方面
Modern Operating Systems
作者Andrew S. Tanenbaum,操作系统领域的权威,想全面掌握现代操作系统的设计方面的必读书籍
Operating Systems - Design and Implementation
作者也是Andrew S. Tanenbaum,配合Minix源码,是学习操作系统非常好的途径
The Design of the UNIX Operating System
作者Maurice J. Bach,非常清晰易懂地介绍了Unix操作系统的内部结构,由于当今所有操作系统都是基于Unix,所以这本书也是全面掌握计算机技术的必读书籍。
The design and implementation of the FreeBSD operating system
作者Marshall Kirk McKusick和George V. Neville-Neil,介绍当今最先进的类Unix操作系统(FreeBSD)原理的一本书,其重要性可想而知。
加密解密及软件破解方面
Cryptography And Network Security, 4th Edition (2005).chm
Cryptography For Developers (2006).pdf
Cryptography For Dummies (2004).chm
Encryption In A Windows Environment - EFS File, 802.1x Wireless, IPSec Transport, And S-MIME Exchange (2006).chm
Malicious.Cryptography.Exposing.Cryptovirology.pdf
Modern Cryptography Theory And Practice - Wenbo Mao.pdf
PGP & GPG - Email For The Practical Paranoid (2006).pdf
Software Piracy Exposed (2005).pdf 软件调试与逆向工程方面
A-list CD Cracking Uncovered - Protection Against Unsanctioned CD Copying.chm
A-LIST, Hacker Disassembling Uncovered 2003.chm
Advanced.Windows.Debugging.pdf
Buffer Overflow Attacks - Detect, Exploit, Prevent (2005).pdf
Computer Viruses And Malware (2006).pdf
Covert Java Techniques for Decompiling, Patching,and Reverse Engineering.pdf
Debugging_with_GDB_-_the_GNU_Source-Level_Debugger.pdf
Find The Bug - A Book Of Incorrect Programs (2004).chm
Hacker Debugging Uncovered.chm
Hacker Disassembling Uncovered (2003).chm
Hacking - The Art Of Exploitation (2003).chm
Introduction To Software Reverse Engineering 2003.pdf
Malware - Fighting Malicious Code (2003).chm
Reverse Engineering Code with IDA Pro.pdf
Reverse Engineering of Object Oriented Code.pdf
Reverse.Engineering.of.Object.Oriented.Code.pdf
Reversing - Secrets Of Reverse Engineering.pdf
Rootkits Subverting the Windows Kernel.chm
Rootkits Subverting the Windows Kernel.pdf
Static And Dynamic Reverse Engineering Techniques For Java Software Sysytems.pdf
The Art Of Computer Virus Research And Defense (2005).chm
The Art Of Exploitation 2003.chm
The Art Of Software Testing, 2nd Edition (2004).pdf
The Developer’s Guide to Debugging.pdf
Write Portable Code (2005).pdf
Writing Secure Code, 2nd Edition (2003).chm 编译原理方面
Compilers principles, techniques, and tools.pdf
Parsing Techniques.pdf Window 程序设计方面
Digital.Press.Leveraging.WMI.Scripting.Using.Windows.Management.Instrumentation.To.Solve.Windows.Management.Problems.eBook-LiB.chm
Network Programming For Microsoft Windows, 2nd Edition (2002).chm
Programming Applications For Microsoft Windows, 4th Edition (1999).chm
Programming The Windows Driver Model, 2nd Edition (2003).chm
Programming The Windows Driver Model.rar
theForger's Win32 API Tutorial.rar
Windows System Programming, 3rd Edition (2004).chm
编写安全的代码.rar
Programming Windows API
Programming Windows, 5th Edition 网络协议方面
Absolute Beginner's Guide to Wi-Fi Wireless Networking (2004).chm
broadband-network-architectures-designing-and-deploying-triple-play-services.pdf
Cisco IOS Cookbook, 2nd Edition (2006).chm
Communication Networks.pdf
Computer Networks--A Systems Approach.pdf
DNS And BIND.chm
DNS In Action (2006).pdf
Illustrated TCP-IP - A Graphic Guide To The Protocol Suite (1999).chm
Implementing.SSH.Strategies.For.Optimizing.The.Secure.Shell.pdf
IP Addressing And Subnetting - Including IPv6 (2000).chm
IP In Wireless Networks (2003).chm
IPsec Virtual Private Network Fundamentals (2006).chm
IPv6 Network Programming (2004).pdf
network-study-guide.pdf
Networking.pdf
OReilly.SSH,.The Secure Shell - The Definitive Guide Ebook .pdf
Running IPv6 (2006).pdf
SSL And TLS Essentials - Securing The Web (2000).pdf
TCP-IP Network Administration, 3rd Edition (2002).chm
TCP.IP Illustrated, Volume 2 The Implementation.chm
TCP.IP Tutorial.pdf
TCP.IP.Foundations.pdf
TCP.IP.Illustrated Volume 1.chm
The Beginner's Guide To Broadband And The Wireless Internet (2006).pdf
Understanding IPv6 (2003).chm
Understanding TCP-IP (2006).pdf
Wireshark & Ethereal Network Protocol Analyzer Toolkit.pdf