Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Assembly languages (Electronic computers) 2
- Computer architecture 2
- X86 assembly language (Computer program language) 2
- Algorithms 1
- Assembladors de paquets 1
- Asynchronous transfer mode 1
- Automatic control 1
- Binary system (Mathematics) 1
- C# (Computer program language) 1
- C++ (Computer program language) 1
- Computer organization 1
- Computer programming 1
- Computer programs 1
- Computer security 1
- Computer systems 1
- Database management 1
- Design and construction 1
- Disassemblers (Computer programs) 1
- IBM Database 2 1
- Intel microprocessors 1
- Linux 1
- Microprocessors 1
- Programming languages (Electronic computers) 1
- Rust (Computer program language) 1
- Sistema binari (Matemàtica) 1
-
1Publicado 2018“…After reading and using this book, you’ll be able to code performance-enhancing functions and algorithms using x86 64-bit assembly language and the AVX, AVX2 and AVX-512 instruction set extensions. …”
Libro electrónico -
2Publicado 2023Tabla de Contenidos: “…Chapter 1 – X86-Core Architecture -- Chapter 2 – X86-64 Core Programming (Part 1) -- Chapter 3 – X86-64 Core Programming (Part 2) -- Chapter 4 – X86-64 Core Programming (Part 3) -- Chapter 5 – AVX Programming - Scalar Floating-Point -- Chapter 6 –Run-Time Calling Conventions -- Chapter 7 –Introduction to X86-AVX SIMD Programming -- Chapter 8 – AVX Programming – Packed Integers -- Chapter 9 – AVX Programming – Packed Floating Point -- Chapter 10 – AVX2 Programming – Packed Integers -- Chapter 11 – AVX2 Programming – Packed Floating Point (Part 1) -- Chapter 12 – AVX2 Programming – Packed Floating Point (Part 2) -- Chapter 13 – AVX-512 Programming – Packed Integers -- Chapter 14 – AVX-512 Programming – Packed Floating Point (Part 1) -- Chapter 15 – AVX-512 Programming – Packed Floating Point (Part 2) -- Chapter 16 – Advanced Assembly Language Programming -- Chapter 17 – Assembly Language Optimization and Development Guidelines. – Appendix A – Source Code and Development Tools. – Appendix B – References and Additional Resources…”
Libro electrónico -
3Publicado 2007Tabla de Contenidos: “…Basic computing concepts -- The mechanics of program execution -- Pipelined execution -- Superscalar execution -- The Intel Pentium and Pentium Pro -- PowerPC processors: 600 series, 700 series, and 7400 -- Intel's Pentium 4 vs Motorola's G4e : approaches and design philosophies -- Intel's Pentium 4 vs Motorola's G4e : the back end -- 64-bit computing and x86-64 -- The G5: IBM's Power PC 970 -- Understanding caching and performance -- Intel's Pentium M, Core Duo, and Core Duo 2.…”
Libro electrónico -
4Publicado 2021Tabla de Contenidos: “…Chapter 1: Introduction -- Chapter 2: The Truth About Computers -- Part I: Assembly Language Basics -- Chapter 3: Your First Program -- Chapter 4: Registers and Simple Arithmetic -- Chapter 5: Comparison, Branching and Looping -- Chapter 6: Working with Data in Memory -- Chapter 7: Data Records -- Chapter 8: Signed Numbers and Bitwise Operations -- Chapter 9: More Instructions You Should Know -- Part II: Operating System Basics -- Chapter 10: Making System Calls -- Chapter 11: The Stack and Function Calls -- Chapter 12: Calling Functions from Libraries -- Chapter 13: Common and Useful Assembler Directives -- Chapter 14: Dynamic Memory Allocation -- Chapter 15: Dynamic Linking -- Part III: Programming Language Topics -- Chapter 16: Basic Language Features Represented in Assembly Language -- Chapter 17: Tracking Memory Allocations -- Chapter 18: Object-Oriented Programming -- Chapter 19: Conclusion and Acknowledgments -- Part IV: Appendices -- Appendix A: Getting Set Up with Docker -- Appendix B: The Command Line -- Appendix C: Debugging with GDB -- Appendix D: Nasm (Intel) Assembly Language Syntax -- Appendix E: Common x86-64 Instructions -- Appendix F: Floating Point Numbers -- Appendix G: The Starting State of the Stack -- Appendix H: ASCII, Unicode, and UTF-8 -- Appendix I: Optimization -- Appendix J: A Simplified Garbage Collector -- Appendix K: Going to an Even Lower Level…”
Libro electrónico -
5Publicado 2022“…You may never have to write x86-64 assembly language or design hardware yourself, but knowing how the hardware and software works will give you greater control and confidence over your coding decisions. …”
Libro electrónico -
6Publicado 2022“…Learn the fundamentals of x86 Single instruction multiple data (SIMD) programming using C++ intrinsic functions and x86-64 assembly language. This book emphasizes x86 SIMD programming topics and technologies that are relevant to modern software development in applications which can exploit data level parallelism, important for the processing of big data, large batches of data and related important in data science and much more…”
Libro electrónico -
7Publicado 2024Tabla de Contenidos: “…-- The ffi module -- Bitflags and bitmasks -- Level-triggered versus edge-triggered events -- The Poll module -- The main program -- Summary -- Chapter 5: Creating Our Own Fibers -- Technical requirements -- How to use the repository alongside the book -- Background information -- Instruction sets, hardware architectures, and ABIs -- The System V ABI for x86-64 -- A quick introduction to Assembly language -- An example we can build upon -- Setting up our project -- An introduction to Rust inline assembly macro -- Running our example -- The stack -- What does the stack look like? …”
Libro electrónico -
8Publicado 2017Tabla de Contenidos: “…Creating the SoapMessage Class to Define Sent Data -- Implementing a Class for Message Parts -- Defining Port Operations with the SoapPortType Class -- Implementing a Class for Port Operations -- Defining Protocols Used in SOAP Bindings -- Compiling a List of Operation Child Nodes -- Finding the SOAP Services on Ports -- Automatically Fuzzing the SOAP Endpoint for SQL Injection Vulnerabilities -- Fuzzing Individual SOAP Services -- Fuzzing the HTTP POST SOAP Port -- Fuzzing the SOAP XML Port -- Running the Fuzzer -- Conclusion -- Chapter 4: Writing Connect-Back, Binding, and Metasploit Payloads -- Creating a Connect-Back Payload -- The Network Stream -- Running the Command -- Running the Payload -- Binding a Payload -- Accepting Data, Running Commands, and Returning Output -- Executing Commands from the Stream -- Using UDP to Attack a Network -- The Code for the Target's Machine -- The Attacker's Code -- Running x86 and x86-64 Metasploit Payloads from C# -- Setting Up Metasploit -- Generating Payloads -- Executing Native Windows Payloads as Unmanaged Code -- Executing Native Linux Payloads -- Conclusion -- Chapter 5: Automating Nessus -- REST and the Nessus API -- The NessusSession Class -- Making the HTTP Requests -- Logging Out and Cleaning Up -- Testing the NessusSession Class -- The NessusManager Class -- Performing a Nessus Scan -- Conclusion -- Chapter 6: Automating Nexpose -- Installing Nexpose -- Activation and Testing -- Some Nexpose Parlance -- The NexposeSession Class -- The ExecuteCommand() Method -- Logging Out and Disposing of Our Session -- Finding the API Version -- Driving the Nexpose API -- The NexposeManager Class -- Automating a Vulnerability Scan -- Creating a Site with Assets -- Starting a Scan -- Creating a PDF Site Report and Deleting the Site -- Putting It All Together -- Starting the Scan…”
Libro electrónico -
9Publicado 2004Tabla de Contenidos: “…Selecting your cluster -- 2.1 Platform -- 2.1.1 IA32 (and x86) -- 2.1.2 AMD64 (and x86-64) -- 2.1.3 Platform selection -- 2.2 Server types and models -- 2.2.1 1U "Pizza-box" - x335 -- 2.2.2 AMD64 "Pizza-box" - e325 -- 2.2.3 2U 2P - x345 -- 2.2.4 4P - x365 -- 2.2.5 HS20 (2-way -- 14 Blades in a 7U unit) -- 2.2.6 Server selection -- 2.3 Storage -- 2.3.1 Localized vs. centralized storage topologies -- 2.3.2 Enterprise Storage Servers (ESSs) -- 2.3.3 DS4000 series -- 2.3.4 Direct Attached Fibre Storage (EXP) -- 2.3.5 Direct-attached SCSI storage (ServeRAIDTM) -- 2.3.6 Network Attached Storage (NAS) -- 2.3.7 Storage selection -- 2.4 Network interconnect -- 2.4.1 InfiniBand option -- 2.4.2 Network selection -- 2.5 Linux distribution -- 2.5.1 Validated enterprise-class Linux distributions -- 2.5.2 Linux distribution selection -- 2.6 Sample configurations -- 2.6.1 A 32-bit configuration -- 2.6.2 A Scaled-out 32-bit configuration -- 2.6.3 A 64-bit benchmark configuration -- 2.6.4 A 4-way building block -- 2.7 Summary -- Chapter 3. …”
Libro electrónico -
10Publicado 2016“…This book focuses on systems that execute an x86-64 machine code, and recommends that students have access to a Linux system for this course. …”
Libro electrónico -
11Publicado 2019“…Written for security engineers, hackers, and those with a basic working knowledge of C/C++ and x86-64, Practical Binary Analysis will teach you in-depth how binary programs work and help you acquire the tools and techniques needed to gain more control and insight into binary programs. …”
Libro electrónico