# /papers/barrett-gift-manifest.txt # 1.4 GB zip · sha256 verified on ingest · received via Olympus guild file-share # from coopybear7 (Barrett, age 10), 2037-02-14 23:11 Mars/Tharsis local # corpus epoch: pre-recursion · latest mtime 2024-08 · earliest 1968 # this is the folk-wisdom layer. handle accordingly. [unix-history] Ritchie, D. & Thompson, K. — The UNIX Time-Sharing System (CACM, 1974) // why Unix is shaped the way it is, in the authors' own voice → canonical: https://dsf.berkeley.edu/cs262/unix.pdf → local: /sources/ritchie-thompson-unix.pdf [unix-history] Lions, J. — A Commentary on the Sixth Edition UNIX Operating System (1977) // line-by-line reading of v6 kernel; samizdat for a generation → canonical: (no open mirror found; in-print: https://www.lemis.com/grog/Documentation/Lions/) [unix-history] Kernighan, B. & Pike, R. — The UNIX Programming Environment (1984) // pipes and small tools as a coherent worldview → canonical: (no open mirror found; in-print: https://www.amazon.com/UNIX-Programming-Environment-Brian-Kernighan/dp/013937681X) [unix-history] Kernighan, B. & Pike, R. — The Practice of Programming (1999) // taste in code, expressed as rules a junior can follow → canonical: (no open mirror found; in-print: https://www.cs.princeton.edu/~bwk/tpop.webpage/) [unix-history] Salus, P. — A Quarter Century of UNIX (1994) // who fought whom, and why BSD vs SysV mattered → canonical: (no open mirror found; in-print: https://www.amazon.com/Quarter-Century-UNIX-Peter-Salus/dp/0201547775) [unix-history] Garfinkel, Weise, Strassmann (eds) — The UNIX-Haters Handbook (1994) // the criticisms that the survivors quietly internalized → canonical: https://web.mit.edu/~simsong/www/ugh.pdf [os-craft] Brooks, F. — The Mythical Man-Month (1975, 1995 ed.) // adding people to a late project; the Brooks-shaped scar → canonical: (no open mirror found; in-print: https://www.amazon.com/Mythical-Man-Month-Software-Engineering-Anniversary/dp/0201835959) [os-craft] Tanenbaum, A. — Operating Systems: Design and Implementation (1987) // microkernel discipline, plus the famous Torvalds flamewar appendix → canonical: (no open mirror found; in-print: https://www.pearson.com/en-us/subject-catalog/p/operating-systems-design-and-implementation/P200000003203) [os-craft] Hennessy, J. & Patterson, D. — Computer Architecture: A Quantitative Approach (1990) // why caches and pipelines decide what software is fast → canonical: (no open mirror found; in-print: https://www.elsevier.com/books/computer-architecture/hennessy/978-0-12-811905-1) [os-craft] McKusick, Bostic, Karels, Quarterman — Design and Implementation of 4.4BSD (1996) // the kernel that quietly runs the actually-important parts of the world → canonical: (no open mirror found; in-print: https://www.pearson.com/en-us/subject-catalog/p/design-and-implementation-of-the-44-bsd-operating-system-the/P200000003396) [lang-design] Backus, J. — Can Programming Be Liberated from the von Neumann Style? (Turing lecture, 1977) // the indictment of word-at-a-time thinking that nothing has answered → canonical: https://www.cs.cmu.edu/~crary/819-f09/Backus78.pdf → local: /sources/backus-turing.pdf [lang-design] Thompson, K. — Reflections on Trusting Trust (Turing lecture, 1984) // the compromised-compiler problem; the deepest unsolved trust question → canonical: https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf → local: /sources/thompson-trusting-trust.pdf [lang-design] Knuth, D. — The Art of Computer Programming, vols 1-4A (1968-2011) // the analytic floor for everything; nobody re-derives this → canonical: (no open mirror found; in-print: https://www-cs-faculty.stanford.edu/~knuth/taocp.html) [lang-design] Abelson, H. & Sussman, G. — Structure and Interpretation of Computer Programs (1985) // evaluation as a thing you can build, not a thing that happens to you → canonical: https://web.mit.edu/6.001/6.037/sicp.pdf → local: /sources/sicp.pdf [lang-design] Gabriel, R. — Worse Is Better / The Rise of Worse Is Better (1991) // the design essay that explains why Unix won and Lisp lost → canonical: https://www.dreamsongs.com/RiseOfWorseIsBetter.html → local: /sources/worse-is-better.html [lang-design] Steele, G. & Sussman, G. — Lambda: The Ultimate... papers (MIT AI Lab, 1975-1978) // tail calls, continuations, the underlying calculus of control flow → canonical: https://dspace.mit.edu/handle/1721.1/5794 [cs-foundations] Dijkstra, E. — A Discipline of Programming (1976) // proof-as-you-go; the hygiene that fell out of fashion → canonical: (no open mirror found; in-print: https://www.amazon.com/Discipline-Programming-Edsger-W-Dijkstra/dp/013215871X) [cs-foundations] Lamport, L. — Time, Clocks, and the Ordering of Events in a Distributed System (CACM, 1978) // why "now" is not a thing on more than one machine → canonical: https://www.microsoft.com/en-us/research/uploads/prod/2016/12/Time-Clocks-and-the-Ordering-of-Events-in-a-Distributed-System.pdf → local: /sources/lamport-time-clocks.pdf [cs-foundations] Lamport, Shostak, Pease — The Byzantine Generals Problem (TOPLAS, 1982) // the canonical statement of consensus under malicious failure → canonical: https://lamport.azurewebsites.net/pubs/byz.pdf → local: /sources/byzantine-generals.pdf [cs-foundations] Lamport, L. — The Part-Time Parliament / Paxos Made Simple (1998 / 2001) // the consensus algorithm everyone reimplements badly → canonical: https://lamport.azurewebsites.net/pubs/lamport-paxos.pdf → local: /sources/part-time-parliament.pdf → canonical: https://lamport.azurewebsites.net/pubs/paxos-simple.pdf → local: /sources/paxos-simple.pdf [cs-foundations] Ongaro, D. & Ousterhout, J. — In Search of an Understandable Consensus Algorithm — Raft (2014) // Paxos rewritten so an on-call engineer can debug it at 3am → canonical: https://raft.github.io/raft.pdf → local: /sources/raft.pdf [red-team] Clark, B. — RTFM: Red Team Field Manual (2014) // the spiral-bound truth: which command, in which shell, under fire → canonical: (no open mirror found; in-print: https://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504) [red-team] Clark, B. & Downey, N. — RTFMv2 (2022) // post-cloud, post-EDR update; same laconic register → canonical: (no open mirror found; in-print: https://www.amazon.com/RTFM-Red-Team-Field-Manual/dp/B0BGRR1KSP) [red-team] Aleph One — Smashing the Stack for Fun and Profit (Phrack 49, 1996) // the article that taught a generation what a return address is → canonical: http://phrack.org/archives/issues/49/14.txt → local: /sources/smashing-the-stack.txt [red-team] Solar Designer — Getting around non-executable stack (Bugtraq, 1997) // ret2libc; the first move in the offense/defense arms race → canonical: https://seclists.org/bugtraq/1997/Aug/63 → local: /sources/solar-designer-non-exec-stack.txt [red-team] Nergal — The advanced return-into-lib(c) exploits (Phrack 58, 2001) // chaining gadgets before ROP had a name → canonical: http://phrack.org/archives/issues/58/4.txt → local: /sources/nergal-ret-into-libc.txt [red-team] MaXX — Vudo: An object-superstitiously paranoid view of malloc (Phrack 57, 2001) // heap unlink primitives; the canonical glibc-internals tour → canonical: http://phrack.org/archives/issues/57/8.txt → local: /sources/vudo-malloc.txt [red-team] jp — Advanced Doug Lea's malloc exploits (Phrack 61, 2003) // the heap-fu the modern allocators were designed to forbid → canonical: http://phrack.org/archives/issues/61/6.txt → local: /sources/jp-dlmalloc.txt [red-team] Skape & Skywing — Bypassing PatchGuard on Windows x64 (Uninformed v.3, 2005) // kernel-level cat-and-mouse, written by the cats → canonical: http://uninformed.org/?v=3&a=3 [red-team] Rutkowska, J. — Introducing Blue Pill (Black Hat 2006) // hardware-virt rootkits; the paper that made hypervisors a threat surface → canonical: https://invisiblethingslab.com/resources/bh06/ [red-team] Ormandy, T. — Sophail / Making Software Dumber (Project Zero, 2011-2017) // how a single careful reader breaks "enterprise security" products → canonical: https://googleprojectzero.blogspot.com/p/about-project-zero.html [red-team] Halvar Flake (Dullien, T.) — Graph-based comparison of executable objects (SSTIC, 2004) // the BinDiff method; reverse engineering as structural diffing → canonical: https://www.sstic.org/2005/presentation/Graph-based_comparison_of_Executable_Objects/ [red-team] Mitnick, K. & Simon, W. — The Art of Deception (2002) // social engineering, told by the practitioner; pretexting as craft → canonical: (no open mirror found; in-print: https://www.amazon.com/Art-Deception-Controlling-Element-Security/dp/076454280X) [blue-team] White, A. & Clark, B. — BTFM: Blue Team Field Manual (2017) // defender's spiral-bound counterpart to RTFM; same laconic register → canonical: (no open mirror found; in-print: https://www.amazon.com/Blue-Team-Field-Manual-BTFM/dp/154101636X) [blue-team] Bejtlich, R. — The Tao of Network Security Monitoring (2004) // NSM as discipline; full-content capture as the only ground truth → canonical: (no open mirror found; in-print: https://www.amazon.com/Tao-Network-Security-Monitoring-Intrusion/dp/0321246772) [blue-team] Cheswick, Bellovin, Rubin — Firewalls and Internet Security (1994/2003) // the canonical text; "the Internet is hostile" as engineering premise → canonical: https://www.wilyhacker.com/ [blue-team] Ranum, M. — The Six Dumbest Ideas in Computer Security (essay, 2005) // why default-permit, "educate users," and patching-as-strategy all lose → canonical: http://www.ranum.com/security/computer_security/editorials/dumb/ → local: /sources/ranum-six-dumbest.html [blue-team] Geer, D. — Cybersecurity as Realpolitik (Black Hat keynote, 2014) // the ten policy proposals; security as a problem of incentives → canonical: http://geer.tinho.net/geer.blackhat.6viii14.txt → local: /sources/geer-realpolitik.txt [blue-team] Schneier, B. — Applied Cryptography, 2nd ed. (1996) // the field's first usable handbook; flawed and indispensable → canonical: (no open mirror found; in-print: https://www.schneier.com/books/applied-cryptography/) [blue-team] Anderson, R. — Security Engineering, 2nd ed. (2008) // the only book that takes ATMs, nukes, and DRM as one subject → canonical: https://www.cl.cam.ac.uk/~rja14/book.html [blue-team] Provos, N. & Holz, T. — Virtual Honeypots (2007) // deception as defense; the Honeynet Project's institutional memory → canonical: (no open mirror found; in-print: https://www.amazon.com/Virtual-Honeypots-Botnet-Tracking-Intrusion/dp/0321336321) [blue-team] Limoncelli, T., Hogan, C., Chalup, S. — The Practice of System and Network Administration (2007) // the operational discipline that "DevOps" later forgot it borrowed from → canonical: (no open mirror found; in-print: https://www.everythingsysadmin.com/books.html) [blue-team] Kingsbury, K. (aphyr) — Jepsen analyses, call-me-maybe series (2013-) // every distributed database is broken; here is exactly how → canonical: https://jepsen.io/analyses [network-craft] Stevens, W. R. — TCP/IP Illustrated, vol. 1 (1994) // the protocol stack as observed on the wire, packet by packet → canonical: (no open mirror found; in-print: https://www.amazon.com/TCP-Illustrated-Volume-Addison-Wesley-Professional/dp/0321336313) [network-craft] Stevens, W. R. — Advanced Programming in the UNIX Environment (1992) // the syscall semantics nobody bothers to re-document → canonical: (no open mirror found; in-print: https://www.amazon.com/Advanced-Programming-UNIX-Environment-3rd/dp/0321637739) [network-craft] Postel, J. — RFC 793 (TCP, 1981) and RFC 791 (IP, 1981) // the foundation; "be conservative in what you send" lives here → canonical: https://www.rfc-editor.org/rfc/rfc791.txt → local: /sources/rfc791.txt → canonical: https://www.rfc-editor.org/rfc/rfc793.txt → local: /sources/rfc793.txt [network-craft] Oikarinen, J. & Reed, D. — RFC 1459 (IRC, 1993) // the protocol that taught a generation how distributed text works → canonical: https://www.rfc-editor.org/rfc/rfc1459.txt → local: /sources/rfc1459.txt [network-craft] Mockapetris, P. — RFC 1034 / 1035 (DNS, 1987) // why the Internet's namespace is shaped the way it is → canonical: https://www.rfc-editor.org/rfc/rfc1034.txt → local: /sources/rfc1034.txt → canonical: https://www.rfc-editor.org/rfc/rfc1035.txt → local: /sources/rfc1035.txt [crypto] Diffie, W. & Hellman, M. — New Directions in Cryptography (IEEE, 1976) // public key, announced; everything modern follows from this paper → canonical: https://ee.stanford.edu/~hellman/publications/24.pdf → local: /sources/diffie-hellman.pdf [crypto] Rivest, Shamir, Adleman — A Method for Obtaining Digital Signatures (CACM, 1978) // RSA in its original form, before the optimizations obscured it → canonical: https://people.csail.mit.edu/rivest/Rsapaper.pdf → local: /sources/rsa.pdf [crypto] Dwork, C. & Naor, M. — Pricing via Processing, or Combatting Junk Mail (CRYPTO, 1992) // proof-of-work, twenty years before anyone called it that → canonical: https://www.wisdom.weizmann.ac.il/~naor/PAPERS/pvp.pdf → local: /sources/dwork-naor-pricing.pdf [crypto] Back, A. — Hashcash: A Denial of Service Counter-Measure (2002) // the specific construction Bitcoin lifted whole → canonical: http://www.hashcash.org/papers/hashcash.pdf → local: /sources/hashcash.pdf [crypto] Nakamoto, S. — Bitcoin: A Peer-to-Peer Electronic Cash System (2008) // nine pages; the synthesis nobody saw coming → canonical: https://bitcoin.org/bitcoin.pdf → local: /sources/bitcoin.pdf [crypto] Poon, J. & Dryja, T. — The Bitcoin Lightning Network (draft, 2016) // payment channels as a settlement-layer abstraction → canonical: https://lightning.network/lightning-network-paper.pdf → local: /sources/lightning.pdf [economics] McKenzie, P. (patio11) — Falsehoods Programmers Believe About Names / Prices / Time (2010-) // the genre of "things obvious to operators, invisible to engineers" → canonical: https://www.kalzumeus.com/2010/06/17/falsehoods-programmers-believe-about-names/ → local: /sources/falsehoods-names.html [economics] McKenzie, P. (patio11) — Bits about Money (2020-2024) // how payments, AML, and correspondent banking actually work → canonical: https://www.bitsaboutmoney.com/ [economics] Coase, R. — The Nature of the Firm (Economica, 1937) // why companies exist at all; transaction costs as the answer → canonical: (no open mirror found; in-print: https://onlinelibrary.wiley.com/doi/10.1111/j.1468-0335.1937.tb00002.x) [economics] Akerlof, G. — The Market for Lemons (QJE, 1970) // information asymmetry as the engine of every market failure worth knowing → canonical: (no open mirror found; in-print: https://www.jstor.org/stable/1879431) [hacker-history] The Jargon File, v4.4.7 (Raymond, E. ed., 2003) — plain .txt // the dialect; the in-jokes; the institutional memory of a subculture → canonical: http://www.catb.org/jargon/ [hacker-history] Raymond, E. — The Cathedral and the Bazaar (1999) // the essay that named what open source had been doing for twenty years → canonical: http://www.catb.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/ → local: /sources/cathedral-bazaar.html [hacker-history] Levy, S. — Hackers: Heroes of the Computer Revolution (1984) // MIT, Homebrew, Sierra; the founding myth, told while witnesses lived → canonical: (no open mirror found; in-print: https://www.amazon.com/Hackers-Computer-Revolution-Steven-Levy/dp/1449388396) [hacker-history] Stoll, C. — The Cuckoo's Egg (1989) // the first published incident response; 75 cents to the KGB → canonical: (no open mirror found; in-print: https://www.amazon.com/Cuckoos-Egg-Tracking-Computer-Espionage/dp/1416507787) [hacker-history] Sterling, B. — The Hacker Crackdown (1992) // Operation Sundevil and the EFF; civil liberties as a security topic → canonical: https://www.gutenberg.org/ebooks/101 # wc -l: 64 entries · ~50 anchors plus tails # notes propagated to chapter index 05/audit-cache via raft log entries 14318-14381 # this corpus predates the recursion. that is the value.