How Computers Work

Processor and Main Memory

Author: Roger Young

Publisher: How Computers Work

ISBN: 1442113987

Category: Computers

Page: 152

View: 6815

DOWNLOAD NOW »
Computers are the most complex machines that have ever been created. This book will tell you how they work, and no technical knowledge is required. It explains in great detail the operation of a simple but functional computer. Although transistors are mentioned, relays are used in the example circuitry for simplicity. Did you ever wonder what a bit, a pixel, a latch, a word (of memory), a data bus, an address bus, a memory, a register, a processor, a timing diagram, a clock (of a processor), an instruction, or machine code is? Unlike most explanations of how computers work which are a lot of analogies or require a background in electrical engineering, this book will tell you precisely what each of them is and how each of them works without requiring any previous knowledge of computers, programming, or electronics. This book starts out very simple and gets more complex as it goes along, but everything is explained. The processor and memory are mainly covered.

Algorithmen und Datenstrukturen im VLSI-Design

OBDD — Grundlagen und Anwendungen

Author: Christoph Meinel,Thorsten Theobald

Publisher: Springer-Verlag

ISBN: 3642587739

Category: Computers

Page: 286

View: 870

DOWNLOAD NOW »
Eines der Hauptprobleme beim Chipentwurf besteht darin, daß die Anzahl der zu bewältigenden Kombinationen der einzelnen Chipbausteine ins Unermeßliche steigt. Hier hat sich eine sehr fruchtbare Verbindung zu einem Kerngebiet der Theoretischen Informatik, dem Gebiet des Entwurfs von Datenstrukturen und effizienten Algorithmen, herstellen lassen: das Konzept der geordneten binären Entscheidungsgraphen, das in zahlreichen CAD-Projekten zu einer beträchtlichen Leistungssteigerung geführt hat. Die Autoren stellen die Grundlagen dieses interdisziplinären Forschungsgebiets dar und behandeln wichtige Anwendungen aus dem rechnergestützten Schaltkreisentwurf.

SQLite Database System Design and Implementation (Second Edition, Version 2)

(See other editions at https://books.google.com/books/?id=zSbxCwAAQBAJ and decide one)

Author: Sibsankar Haldar

Publisher: Sibsankar Haldar

ISBN: N.A

Category: Computers

Page: 264

View: 8521

DOWNLOAD NOW »
A preliminary edition of this book was published from O'Reilly (ISBN 9780596550066). SQLite is a small, embeddable, SQL-based, relational database management system. It has been widely used in low- to medium-tier database applications, especially in embedded devices. This book provides a comprehensive description of SQLite database system. It describes design principles, engineering trade-offs, implementation issues, and operations of SQLite.

Intelligence and the Brain

Solving the Mystery of why People Differ in IQ and how a Child Can be a Genius

Author: Dennis Garlick

Publisher: AESOP Press

ISBN: 0615319211

Category: Psychology

Page: 246

View: 2033

DOWNLOAD NOW »
This book turns the corner and finally provides a convincing explanation of IQ and human intelligence. It begins by rejecting some of the most basic assumptions that psychologists make about intelligence, including that intelligence should be defined by behaviour. Instead, it argues that intelligence is about the ability to understand. It then uses recent scientific findings about the brain to show how changes in the brain lead to understanding. Readers will find that this book contains many revelations that will profoundly change their perception of how their own brain works. This book will also explore the startling implication of a "sensitive period" for developing intelligence, arguing that children can learn differently than adults. Anyone who is interested in how the brain works, why people differ in intelligence, and how a child can be a genius will want to read this book.

Clean Architecture

Das Praxishandbuch für gutes Softwaredesign. Regeln und Paradigmen für effiziente Softwarestrukturen

Author: Robert C. Martin

Publisher: MITP-Verlags GmbH & Co. KG

ISBN: 3958457266

Category: Computers

Page: 370

View: 8970

DOWNLOAD NOW »

The Design of Everyday Things

Psychologie und Design der alltäglichen Dinge

Author: Norman Don

Publisher: Vahlen

ISBN: 3800648105

Category: Business & Economics

Page: 320

View: 6091

DOWNLOAD NOW »
Apple, Audi, Braun oder Samsung machen es vor: Gutes Design ist heute eine kritische Voraussetzung für erfolgreiche Produkte. Dieser Klassiker beschreibt die fundamentalen Prinzipien, um Dinge des täglichen Gebrauchs umzuwandeln in unterhaltsame und zufriedenstellende Produkte. Don Norman fordert ein Zusammenspiel von Mensch und Technologie mit dem Ziel, dass Designer und Produktentwickler die Bedürfnisse, Fähigkeiten und Handlungsweisen der Nutzer in den Vordergrund stellen und Designs an diesen angepasst werden. The Design of Everyday Things ist eine informative und spannende Einführung für Designer, Marketer, Produktentwickler und für alle an gutem Design interessierten Menschen. Zum Autor Don Norman ist emeritierter Professor für Kognitionswissenschaften. Er lehrte an der University of California in San Diego und der Northwest University in Illinois. Mitte der Neunzigerjahre leitete Don Norman die Advanced Technology Group bei Apple. Dort prägte er den Begriff der User Experience, um über die reine Benutzbarkeit hinaus eine ganzheitliche Erfahrung der Anwender im Umgang mit Technik in den Vordergrund zu stellen. Norman ist Mitbegründer der Beratungsfirma Nielsen Norman Group und hat unter anderem Autohersteller von BMW bis Toyota beraten. „Keiner kommt an Don Norman vorbei, wenn es um Fragen zu einem Design geht, das sich am Menschen orientiert.“ Brand Eins 7/2013 „Design ist einer der wichtigsten Wettbewerbsvorteile. Dieses Buch macht Spaß zu lesen und ist von größter Bedeutung.” Tom Peters, Co-Autor von „Auf der Suche nach Spitzenleistungen“

Computerarchitektur

Strukturen, Konzepte, Grundlagen

Author: Andrew S. Tanenbaum

Publisher: N.A

ISBN: 9783827371515

Category: Computer architecture

Page: 829

View: 8437

DOWNLOAD NOW »

The Cache Memory Book

Author: Jim Handy

Publisher: Morgan Kaufmann

ISBN: 9780123229809

Category: Computers

Page: 229

View: 2690

DOWNLOAD NOW »
The Second Edition of The Cache Memory Book introduces systems designers to the concepts behind cache design. The book teaches the basic cache concepts and more exotic techniques. It leads readers through someof the most intricate protocols used in complex multiprocessor caches. Written in an accessible, informal style, this text demystifies cache memory design by translating cache concepts and jargon into practical methodologies and real-life examples. It also provides adequate detail to serve as a reference book for ongoing work in cache memory design. The Second Edition includes an updated and expanded glossary of cache memory terms and buzzwords. The book provides new real world applications of cache memory design and a new chapter on cache"tricks". Illustrates detailed example designs of caches Provides numerous examples in the form of block diagrams, timing waveforms, state tables, and code traces Defines and discusses more than 240 cache specific buzzwords, comparing in detail the relative merits of different design methodologies Includes an extensive glossary, complete with clear definitions, synonyms, and references to the appropriate text discussions

The Tao of Computing, Second Edition

Author: Henry M. Walker

Publisher: CRC Press

ISBN: 1439892512

Category: Computers

Page: 555

View: 1744

DOWNLOAD NOW »
Describing both the practical details of interest to students and the high-level concepts and abstractions highlighted by faculty, The Tao of Computing, Second Edition presents a comprehensive introduction to computers and computer technology. This edition updates its popular predecessor with new research exercises and expanded discussion questions. It uses a question-and-answer format to provide thoughtful answers to the many practical questions that students have about computing. Among the questions answered, the book explains: What capabilities computers have in helping people solve problems and what limitations need to be considered Why machines act the way they do What is involved in getting computers to interact with networks The book offers a down-to-earth overview of fundamental computer fluency topics, from the basics of how a computer is organized and an overview of operating systems to a description of how the Internet works. The second edition describes new technological advances including social media applications and RSS feeds.

Hacking

Die Kunst des Exploits

Author: Jon Erickson

Publisher: N.A

ISBN: 9783898645362

Category: Computer networks

Page: 505

View: 5651

DOWNLOAD NOW »

Hacking: The Art of Exploitation, 2nd Edition

Author: Jon Erickson

Publisher: No Starch Press

ISBN: 159327338X

Category: Computers

Page: 488

View: 9081

DOWNLOAD NOW »
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: – Program computers using C, assembly language, and shell scripts – Corrupt system memory to run arbitrary code using buffer overflows and format strings – Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening – Outsmart common security measures like nonexecutable stacks and intrusion detection systems – Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence – Redirect network traffic, conceal open ports, and hijack TCP connections – Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

Mac OS X

missing manual ; [das fehlende Handbuch zu Ihrer Software ; alles über Tiger 10.4 ; mit Referenzkarte ; deutsche Ausgabe des internationalen Bestsellers]

Author: David Pogue,André Aulich,Rudolf Steffens

Publisher: Springer DE

ISBN: 9783897214125

Category:

Page: 953

View: 4181

DOWNLOAD NOW »

Verteilte Systeme

Prinzipien und Paradigmen

Author: Andrew S. Tanenbaum,Maarten van Steen

Publisher: N.A

ISBN: 9783827372932

Category: Distributed processing

Page: 761

View: 718

DOWNLOAD NOW »

Hacking Exposed Computer Forensics, Second Edition

Computer Forensics Secrets & Solutions

Author: Aaron Philipp,David Cowen,Chris Davis

Publisher: McGraw Hill Professional

ISBN: 0071626786

Category: Computers

Page: 656

View: 3385

DOWNLOAD NOW »
"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations." --Brian H. Karney, COO, AccessData Corporation The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. Effectively uncover, capture, and prepare evidence for investigation Store and process collected data in a highly secure digital forensic lab Restore deleted documents, partitions, user activities, and file systems Analyze evidence gathered from Windows, Linux, and Macintosh systems Use the latest Web and client-based e-mail tools to extract relevant artifacts Overcome the hacker's anti-forensic, encryption, and obscurity techniques Unlock clues stored in cell phones, PDAs, and Windows Mobile devices Prepare legal documents that will hold up to judicial and defense scrutiny

Advanced Memory Optimization Techniques for Low-Power Embedded Processors

Author: Manish Verma,Peter Marwedel

Publisher: Springer Science & Business Media

ISBN: 1402058977

Category: Technology & Engineering

Page: 188

View: 8971

DOWNLOAD NOW »
This book proposes novel memory hierarchies and software optimization techniques for the optimal utilization of memory hierarchies. It presents a wide range of optimizations, progressively increasing in the complexity of analysis and of memory hierarchies. The final chapter covers optimization techniques for applications consisting of multiple processes found in most modern embedded devices.

Wilhelm Schickard, 1592-1635

Astronom, Geograph, Orientalist, Erfinder d. Rechenmaschine

Author: Friedrich Seck

Publisher: Franz Steiner Verlag

ISBN: 9783169397723

Category: Astronomers

Page: 422

View: 6113

DOWNLOAD NOW »

PARALLEL COMPUTERS ARCHITECTURE AND PROGRAMMING

Author: V. Rajaraman, ,RAM MURTHY C. SIVA

Publisher: PHI Learning Pvt. Ltd.

ISBN: 8120352629

Category: Computers

Page: 492

View: 3692

DOWNLOAD NOW »
Today all computers, from tablet/desktop computers to super computers, work in parallel. A basic knowledge of the architecture of parallel computers and how to program them, is thus, essential for students of computer science and IT professionals. In its second edition, the book retains the lucidity of the first edition and has added new material to reflect the advances in parallel computers. It is designed as text for the final year undergraduate students of computer science and engineering and information technology. It describes the principles of designing parallel computers and how to program them. This second edition, while retaining the general structure of the earlier book, has added two new chapters, ‘Core Level Parallel Processing’ and ‘Grid and Cloud Computing’ based on the emergence of parallel computers on a single silicon chip popularly known as multicore processors and the rapid developments in Cloud Computing. All chapters have been revised and some chapters are re-written to reflect the emergence of multicore processors and the use of MapReduce in processing vast amounts of data. The new edition begins with an introduction to how to solve problems in parallel and describes how parallelism is used in improving the performance of computers. The topics discussed include instruction level parallel processing, architecture of parallel computers, multicore processors, grid and cloud computing, parallel algorithms, parallel programming, compiler transformations, operating systems for parallel computers, and performance evaluation of parallel computers.