X86

Results: 2025



#Item
741Computer hardware / TI-83 series / IBM Basic assembly language / Zilog Z80 / Pointer / MOV / Processor register / TI-990 / X86 assembly language / Assembly languages / Computing / Computer architecture

CN No Duh! Guide to TI-83/+ Programming -PRESS-

Add to Reading List

Source URL: www.ticalc.org

Language: English - Date: 2001-08-03 01:37:11
742System Management Mode / X86 architecture / Rootkit / Control register / Northbridge / X86-64 / Computer architecture / Computer hardware / Computing

Getting into the SMRAM: SMM Reloaded Loïc Duflot, Olivier Levillain, Benjamin Morin and Olivier Grumelard Central Directorate for Information Systems Security

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2009-03-25 18:45:02
743Intel APIC Architecture / X86 architecture / Emergency management / Infection control / Medicine / Health / Interrupts

APIC VOLUNTEER APPLICATION The Board of Directors, Committees, and Task Forces exist to carry out the Mission and Vision of APIC, which is supported through the voluntary efforts of our membership. The broader the base o

Add to Reading List

Source URL: apic.org

Language: English - Date: 2014-12-09 16:15:01
744Software / X86 assembly language / Pin / X86 / Assembly language / Interpreter / Pointer / Binary code / Portable Executable / Computing / Programming language implementation / Software engineering

BitBlaze: A New Approach to Computer Security via Binary Analysis Dawn Song1 , David Brumley2, Heng Yin1,2,3 , Juan Caballero1,2, Ivan Jager2 , Min Gyung Kang1,2 , Zhenkai Liang2 , James Newsome2 , Pongsin Poosankam1,2,

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2012-07-11 06:21:50
745Zero-day attack / Vulnerability / VM / Malware / Failure / X86 architecture / Assembly languages / Computer security / Cyberwarfare / Computer network security

Finding 0-days by Using VulnHunt Wei Wang(alert7) Code Audit Labs of Vulnhunt Co.,Ltd 翰海源 www.vulnhunt.com

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2010-12-06 08:30:09
746X86 architecture / Subroutines / X86-64 / Application binary interface / Central processing unit / 64-bit / X86 / Calling convention / Fortran / Computing / Computer architecture / Software engineering

System V Application Binary Interface AMD64 Architecture Processor Supplement Draft VersionEdited by Michael Matz , Jan Hubiˇcka2 , Andreas Jaeger3 , Mark Mitchell4 1

Add to Reading List

Source URL: www.x86-64.org

Language: English - Date: 2014-11-17 15:57:14
747Computer architecture / Subroutines / Compiler construction / X86 architecture / Central processing unit / CPUID / Low-level programming language / MOV / Function prologue / Software engineering / Computing / Programming language implementation

PEG-based transformer provides front-, middle and back-end stages in a simple compiler Ian Piumarta VPRI Technical Report TR

Add to Reading List

Source URL: www.vpri.org

Language: English - Date: 2015-01-21 19:12:50
748Virtual machines / Virtualization / Hypervisor / Virtual private server / Hyper-V / VMware / X86 virtualization / Dynamic infrastructure / Virtual firewall / System software / Software / Computing

Solution Brief HyTrust and Intel Provide a Foundation of Enterprise-class Security for Server Virtualization and Cloud Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst, and Wayne Pauley, Senior Analyst A

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2014-03-01 01:19:35
749System Management Mode / MOV / X86 architecture

CanSecWest 2015 Vancouver, Canada A New Class of Vulnerabilities in SMI Handlers Advanced Threat Research (www.intelsecurity.com/atr) Oleksandr Bazhaniuk, Yuriy Bulygin, Andrew Furtak, Mikhail Gorobets, John Loucaides,

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:22:04
750Computing / Trusted Execution Technology / x86 architecture / Trusted Platform Module / Intel Core / Intel / Xeon / X86 virtualization / Intel vPro / Computer security / Trusted computing / System software

Trusted Compute Pools with Intel® Trusted Execution Technology (Intel® TXT) HOST SENSITIVE WORKLOADS ON TRUSTED SERVERS IN MULTI-TENANT ENVIRONMENTS Intel® TXT with Trusted Boot (Tboot)

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2015-03-19 07:31:59
UPDATE