Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Raspberry Pi (Technology in Action)
Practical Raspberry Pi (Technology in Action)

Practical Raspberry Pi takes you quickly through the hardware and software basics of the Raspberry Pi. Author Brendan Horan then gets you started on a series of fun and practical projects, including a simple temperature sensor, a media center, a real-time clock, and even a security monitoring device, all of which require minimal...

The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine
The Annotated Turing: A Guided Tour Through Alan Turing's Historic Paper on Computability and the Turing Machine

Before digital computers ever existed, Alan Turing envisioned their power and versatility...but also proved what computers could never do.

In an extraordinary and ultimately tragic life that unfolded like a novel, Turing helped break the German Enigma code to turn the tide of World War II, later speculated on...

The Essentials of Computer Organization and Architecture
The Essentials of Computer Organization and Architecture

The Essentials of Computer Organization and Architecture provides a one-semester introduction to computer organization and architecture. Created in direct correlation to the ACM-IEEE Computing Curricula 2001 guidelines, this text exposes the inner working of a modern digital computer through an integrated presentation of fundamental...

MIPS Assembly Language Programming
MIPS Assembly Language Programming
First impressions are important.

To introduce your Assembly Language programming students to the fundamental concepts of contemporary computer architecture, start with a Reduced Instruction Set Computer (RISC).

When students first encounter computer architecture, they need to begin with the basics of modern...

Programming Language Pragmatics, Third Edition
Programming Language Pragmatics, Third Edition

A course in computer programming provides the typical student's first exposure to the field of computer science. Most students in such a course will have used computers all their lives, for email, games, web browsing, word processing, social networking, and a host of other tasks, but it is not until they write their first programs that...

Hacker's Delight
Hacker's Delight

This is a collection of small programming tricks that I have come across over many years. Most of them will work only on computers that represent integers in two's-complement form. Although a 32-bit machine is assumed when the register length is relevant, most of the tricks are easily adapted to machines with other register...

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys...

Computer Systems Architecture: a Networking Approach (2nd Edition)
Computer Systems Architecture: a Networking Approach (2nd Edition)

The new edition of Computer Systems Architecture has been brought up to date with extended descriptions of ARM and Itanium processors and an extended

introduction to the field of data communications.  Its established approach emphasizes that the vast majority of modern computers are not stand-alone devices, but cooperate...

Introduction to Assembly Language Programming: For Pentium and RISC Processors (Texts in Computer Science)
Introduction to Assembly Language Programming: For Pentium and RISC Processors (Texts in Computer Science)
Assembly language continues to hold a core position in the programming world because of its similar structure to machine language and its very close links to underlying computer-processor architecture and design. These features allow for high processing speed, low memory demands, and the capacity to act directly on the system's hardware. This...
ARM Architecture Reference Manual
ARM Architecture Reference Manual
The ARM architecture is the industry's leading 16/32-bit embedded RISC processor solution. ARM Powered microprocessors are being routinely designed into a wider range of products than any other 32-bit processor. This wide applicability is made possible by the ARM architecture, resulting in optimal system solutions at the crossroads of high...
miRNA Regulation of the Translational Machinery (Progress in Molecular and Subcellular Biology)
miRNA Regulation of the Translational Machinery (Progress in Molecular and Subcellular Biology)

The silencing of gene expression by small interfering RNAs has been recognized for only a relatively short time, but this has transformed our understanding of both transcriptional and post-transcriptional gene regulatory mechanisms. Multiple pathways culminate in formation of an RNA-induced silencing complex (RISC) containing a member of the...

Guide to RISC Processors: for Programmers and Engineers
Guide to RISC Processors: for Programmers and Engineers
Popular processor designs can be broadly divided into two categories: Complex Instruction
Set Computers (CISC) and Reduced Instruction Set Computers (RISC). The dominant
processor in the PC market, Pentium, belongs to the CISC category. However, the recent
trend is to use the RISC designs. Even Intel has moved from CISC to RISC
...
unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy