 |
|
|
|
|
 Programming Language Pragmatics, Second Edition"Michael Scott's book could have been entitled: Why Programming Languages Work. It takes a fresh look at programming languages by bringing together ideas and techniques usually covered in disparate language design, compiler, computer architecture, and operating system courses. Its comprehensive and integrated presentation of language... |  |  Jeff Duntemann's Drive-By Wi-Fi GuideEverything you need to know to design, build, protect, and extend a Wi-Fi wireless network!
You don’t have to knock holes in your walls to network your computers and share your family’s Internet connection. Wi-Fi connects computers, printers, video cameras and game consoles into a fast Ethernet network via microwaves. In this... |  |  Assembly Language Programming: ARM Cortex-M3
ARM designs the cores of microcontrollers which equip most "embedded systems" based on 32-bit processors. Cortex M3 is one of these designs, recently developed by ARM with microcontroller applications in mind. To conceive a particularly optimized piece of software (as is often the case in the world of embedded systems) it... |
|
 Geographic Information Systems in BusinessThis book contains state-of-the-art research studies on the concepts, theory, processes, and real world applications of geographical information systems (GIS) in business. Its chapters are authored by many of the leading experts in applying GIS and geospatial science to business. The book utilizes a wide variety of approaches and methodologies... |  |  Shellcoder's Programming UncoveredSome software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes... |  |  Hacking: The Art of Exploitation, 2nd EditionHacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits,... |
|
 The Essentials of Computer Organization and Architecture
The Essentials of Computer Organization and Architecture provides a one-semester introduction to computer organization and architecture. Created in direct correlation to the ACM-IEEE Computing Curricula 2001 guidelines, this text exposes the inner working of a modern digital computer through an integrated presentation of fundamental... |  |  MIPS Assembly Language ProgrammingFirst impressions are important.
To introduce your Assembly Language programming students to the fundamental concepts of contemporary computer architecture, start with a Reduced Instruction Set Computer (RISC).
When students first encounter computer architecture, they need to begin with the basics of modern... |  |  Modern X86 Assembly Language Programming: 32-bit, 64-bit, SSE, and AVX
Modern X86 Assembly Language Programming shows the fundamentals of x86 assembly language programming. It focuses on the aspects of the x86 instruction set that are most relevant to application software development. The book's structure and sample code are designed to help the reader quickly understand x86... |
|
|
Result Page: 27 26 25 24 23 22 21 20 19 18 |