X86-64

Results: 742



#Item
21Computer architecture / Software / System software / Linux distributions / SUSE Linux distributions / CentOS / X86-64 / Red Hat Enterprise Linux / SUSE Linux Enterprise Server / Linux / Oracle Linux

Operating System / Platform PV-WAVEbit Windows / x86, AMD64, x86-64

Add to Reading List

Source URL: docs.roguewave.com

Language: English - Date: 2016-05-27 13:42:39
22Computing / System software / Software / System administration / Internet Standards / Internet protocols / Network management / Syslog / X86-64 / Filesystem Hierarchy Standard / Synchronization

PDF Document

Add to Reading List

Source URL: hm.hgesser.de

Language: English - Date: 2009-03-04 06:20:20
23Computing / System software / Software / System administration / Internet Standards / Internet protocols / Network management / Syslog / X86-64 / Filesystem Hierarchy Standard

PDF Document

Add to Reading List

Source URL: hm.hgesser.de

Language: English - Date: 2009-03-04 06:20:29
24Computing / Software engineering / Computer programming / Software bugs / X86 architecture / Buffer overflow / Computer memory / X86-64 / Return-to-libc attack / X86 / Return-oriented programming / NX bit

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
25Computing / Computer architecture / Fault-tolerant computer systems / Software / Concurrent computing / Parallel computing / Application checkpointing / Computer cluster / Linux kernel / Checkpoint / Thread / X86-64

An Overview of Berkeley Lab Checkpoint/Restart (BLCR) for Linux Clusters Paul Hargrove with Jason Duell and Eric Roman http://ftg.lbl.gov/checkpoint

Add to Reading List

Source URL: crd.lbl.gov

Language: English - Date: 2012-09-05 12:41:12
26Computer hardware / Computing / Motherboard / Computer buses / Side-channel attacks / DMA attack / Direct memory access / PC Card / IEEE / X86-64 / Field-programmable gate array

Subverting Windows 7 x64 Kernel with DMA attacks Damien Aumaitre Christophe Devine Physical attacks

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
27Computing / System software / Software / System administration / Internet Standards / Internet protocols / Network management / Syslog / X86-64 / Hybrid drive / Filesystem Hierarchy Standard

PDF Document

Add to Reading List

Source URL: hm.hgesser.de

Language: English - Date: 2009-03-04 06:20:24
28Computing / Cross-platform software / Computing platforms / Java platform / Java / X86-64 / MacOS / Linux / Microsoft Windows / Java version history / Comparison of agent-based modeling software

ASSIST  Installation  Guide   Step  1.  Unzip  file  (ASSIST3.zip)  you  downloaded  from   http://icewatch.gina.alaska.edu/assist  to  desired  location  on  your   com

Add to Reading List

Source URL: s3-us-west-2.amazonaws.com

Language: English - Date: 2016-08-01 18:22:08
29Computing / System software / Software / System administration / Internet Standards / Internet protocols / Network management / Syslog / X86-64 / PATH / Filesystem Hierarchy Standard

PDF Document

Add to Reading List

Source URL: hm.hgesser.de

Language: English - Date: 2009-03-04 06:20:18
30Computing / Software / Computer architecture / Programming language implementation / Compiler construction / Central processing unit / X86 architecture / GNU Compiler Collection / X86-64 / Data structure alignment / X86 / Optimizing compiler

Chapter 3 Machine-Level Representation of Programs Computers execute machine code, sequences of bytes encoding the low-level operations that manipulate data, manage memory, read and write data on storage devices, and co

Add to Reading List

Source URL: csapp.cs.cmu.edu

Language: English - Date: 2010-02-14 14:17:20
UPDATE