X86

Results: 2025



#Item
751

Physical Privilege Escalation and Mitigation in the x86 World Oded Horovitz & Steve Weis PrivateCore Inc. About Us

Add to Reading List

Source URL: cansecwest.com

- Date: 2013-03-24 08:07:50
    752Computing / Xeon / Intel Core / Intel / X86-64 / Hyper-threading / Itanium / Intel Xeon chipsets / X86 architecture / Computer architecture / Computer hardware

    PRODUC T BRIEF Intel® Xeon® Processor D-1500 Product Family Extending Intelligence to the Edge As cloud, telecommunications service providers, and hosters seek to speed new service delivery and handle exponential growt

    Add to Reading List

    Source URL: www.intel.la

    Language: English - Date: 2015-03-12 15:28:14
    753Exec Shield / Linux / NX bit / Process / Address space layout randomization / PaX / Exec / X86 / Pointer / Computing / Computer architecture / System software

    Exec-shield 환경 내의 exploit 작성 방법

    Add to Reading List

    Source URL: powerofcommunity.net

    Language: English - Date: 2008-11-04 08:59:42
    754Remote desktop / University of Cambridge Computer Laboratory / Xen / Hypervisor / Hyper-V / Red Hat Enterprise Virtualization / Oracle VM / Virtual Iron / Citrix Systems / System software / Software / Virtual machines

    Magic Quadrant for x86 Server Virtualization Infrastructure Gartner RAS Core Research Note G00200526, Thomas J. Bittman, Philip Dawson, George J. Weiss, 26 May 2010, RA406042011 Server virtualization for x86 architecture

    Add to Reading List

    Source URL: www.getadvanced.net

    Language: English - Date: 2013-06-12 11:14:44
    755Virtual machines / EMC Corporation / VMware / Novus Entertainment / Backup / X86 virtualization / Virtualization / System software / Cloud computing / Computing

    CAS E STU DY Actifio One Delivers Speed and Availability as a Cloud Service for Novus Copy Data Virtualization Enables Easy, Scalable IT Management Across Central and Remote Datacenters for Business Resilency and Agilit

    Add to Reading List

    Source URL: www.actifioone.com

    Language: English - Date: 2015-01-09 15:19:07
    756Hardware virtualization / VMware / Hypervisor / Hyper-V / VM / X86 virtualization / Xen / Virtualization / Hardware-assisted virtualization / System software / Software / Virtual machines

    2009 International Conference on Computational Science and Engineering Security Implications of Virtualization: A Literature Study Andr´e van Cleeff, Wolter Pieters, Roel Wieringa Information Systems Group

    Add to Reading List

    Source URL: eprints.eemcs.utwente.nl

    Language: English - Date: 2009-10-15 04:28:48
    757Subroutines / Procedural programming languages / C++ / Programming language implementation / C / Pointer / Tail call / X86 assembly language / Stack / Software engineering / Computer programming / Computing

    Binary Code Extraction and Interface Identification for Security Applications Juan Caballero§† Noah M. Johnson† Stephen McCamant† Dawn Song† † UC Berkeley §Carnegie Mellon University

    Add to Reading List

    Source URL: bitblaze.cs.berkeley.edu

    Language: English - Date: 2013-03-28 20:19:28
    758Consciousness / X86 instructions / Pseudoscience / Society for Scientific Exploration / SSE2 / Integral psychology / Cognitive science / Mind / Philosophy of mind

    HAY.558.Dossey_cover_final.indd

    Add to Reading List

    Source URL: www.scientificexploration.org

    Language: English - Date: 2014-01-09 15:23:50
    759X86 instructions / SSE3 / ISO 216 / Metrication / Stationery

    SAT compilation for Termination Proofs via Semantic Labelling Alexander Bau1 , Jörg Endrullis2 , and Johannes Waldmann1 1 2

    Add to Reading List

    Source URL: www.imn.htwk-leipzig.de

    Language: English - Date: 2013-08-26 10:13:12
    760Microsoft Windows / Windows NT architecture / X86 architecture / Architecture of Windows NT / Operating system / Native API / Linux kernel / Kernel / Windows API / Computer architecture / Software / Computing

    eEye Digital Security White Paper Remote Windows Kernel Exploitation Step into the Ring O by Barnaby Jack, Senior Research Engineer For more information on eEye Digital Security, please visit: www.eeye.com

    Add to Reading List

    Source URL: cansecwest.com

    Language: English - Date: 2008-06-07 19:38:54
    UPDATE