x86 architecture

Results: 1288



#Item
381Windows Server / Windows NT / X86 architecture / Microsoft SQL Server / Internet Information Services / Visual C++ / X86-64 / Comparison of Microsoft Windows versions / Windows Small Business Server / Software / Computing / Microsoft Windows

Trend Micro™ Control Manager™ 6.0 Service Pack 2 System Requirements Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installin

Add to Reading List

Source URL: docs.trendmicro.com

Language: English - Date: 2014-12-11 01:53:50
382Windows Server / Backup software / Windows NT / Backup Exec / X86 architecture / Hyper-V / Windows Small Business Server / Symantec / X86-64 / Software / System software / Microsoft Windows

Backup Exec 2014 Software Compatibility List (SCL) Updated on June 23, 2014 Copyright© 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Backup Exec are trademarks or registered trademarks

Add to Reading List

Source URL: www.symbuy.ru

Language: English - Date: 2015-03-29 11:28:01
383Computer hardware / TI-83 series / IBM Basic assembly language / Zilog Z80 / Pointer / MOV / Processor register / TI-990 / X86 assembly language / Assembly languages / Computing / Computer architecture

CN No Duh! Guide to TI-83/+ Programming -PRESS-

Add to Reading List

Source URL: www.ticalc.org

Language: English - Date: 2001-08-03 01:37:11
384System Management Mode / X86 architecture / Rootkit / Control register / Northbridge / X86-64 / Computer architecture / Computer hardware / Computing

Getting into the SMRAM: SMM Reloaded Loïc Duflot, Olivier Levillain, Benjamin Morin and Olivier Grumelard Central Directorate for Information Systems Security

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2009-03-25 18:45:02
385Intel APIC Architecture / X86 architecture / Emergency management / Infection control / Medicine / Health / Interrupts

APIC VOLUNTEER APPLICATION The Board of Directors, Committees, and Task Forces exist to carry out the Mission and Vision of APIC, which is supported through the voluntary efforts of our membership. The broader the base o

Add to Reading List

Source URL: apic.org

Language: English - Date: 2014-12-09 16:15:01
386Zero-day attack / Vulnerability / VM / Malware / Failure / X86 architecture / Assembly languages / Computer security / Cyberwarfare / Computer network security

Finding 0-days by Using VulnHunt Wei Wang(alert7) Code Audit Labs of Vulnhunt Co.,Ltd 翰海源 www.vulnhunt.com

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2010-12-06 08:30:09
387X86 architecture / Subroutines / X86-64 / Application binary interface / Central processing unit / 64-bit / X86 / Calling convention / Fortran / Computing / Computer architecture / Software engineering

System V Application Binary Interface AMD64 Architecture Processor Supplement Draft VersionEdited by Michael Matz , Jan Hubiˇcka2 , Andreas Jaeger3 , Mark Mitchell4 1

Add to Reading List

Source URL: www.x86-64.org

Language: English - Date: 2014-11-17 15:57:14
388Computer architecture / Subroutines / Compiler construction / X86 architecture / Central processing unit / CPUID / Low-level programming language / MOV / Function prologue / Software engineering / Computing / Programming language implementation

PEG-based transformer provides front-, middle and back-end stages in a simple compiler Ian Piumarta VPRI Technical Report TR

Add to Reading List

Source URL: www.vpri.org

Language: English - Date: 2015-01-21 19:12:50
389System Management Mode / MOV / X86 architecture

CanSecWest 2015 Vancouver, Canada A New Class of Vulnerabilities in SMI Handlers Advanced Threat Research (www.intelsecurity.com/atr) Oleksandr Bazhaniuk, Yuriy Bulygin, Andrew Furtak, Mikhail Gorobets, John Loucaides,

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:22:04
390Computing / Trusted Execution Technology / x86 architecture / Trusted Platform Module / Intel Core / Intel / Xeon / X86 virtualization / Intel vPro / Computer security / Trusted computing / System software

Trusted Compute Pools with Intel® Trusted Execution Technology (Intel® TXT) HOST SENSITIVE WORKLOADS ON TRUSTED SERVERS IN MULTI-TENANT ENVIRONMENTS Intel® TXT with Trusted Boot (Tboot)

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2015-03-19 07:31:59
UPDATE