h1

Microsoft SQL Server 2008 Programming and Cascading Style Sheets – Separating Content From Presentation…

February 13, 2016

professional_microsoft_sql_server_2008_programming

Microsoft SQL Server 2008 Programming.

This is book is mainly about the usage and programming using Microsoft SQL Server 2008 , how to do database setup , inserting , updating , deleting tables and so on…I borrowed it from the National Library (PNM). It teaches us the basic syntax of using Microsoft SQL Server 2008 programming language. Databases are made up of many things , but none is more central to the make-up of a database than tables are. A table can be thought of as equating to an accountant’s ledger or an Excel spreadsheet. It is made up of what is called domain data (columns) and entity data (rows). The actual data for the database is stored in the tables.

SQL Server is a large product and the various pieces of it utilize a host of services that run in the background on your server. A full installation will encompass nine different services , and seven of these can be managed from this part of the SQL Server Configuration Manager ( the other two are services that act as background support ).

SQL Server provides several of what are referred to as Net-Libraries (network libraries) , or NetLibs. These are dynamic-link libraries (DLLs) that SQL Server uses to communicate with certain network protocols. NetLibs serve as something of an insulator between your client application and the network protocol , which is essentially the language that one network card uses to talk to another , that is to be used. They serve the same function at the server end , too. The NetLibs supplied with SQL Server 2008 include Named Pipes , TCP/IP (the default) , Shared Memory and VIA ( a special virtual interface that your storage-hardware vendor may support ).

Every time you run a query , SQL Server parses your query into its component parts and then sends it to the query optimizer. The query optimizer is the part of SQL Server that figures out the best way to run your query to balance fast results with minimum impact to other users . When you use the Show Estimated Execution Plan option , you receive a graphical representation and additional information about how SQL Server plans to run your query. Similarly , you can tun on the Include Actual Execution Plan option. Most of the time , this will be the same as the estimated execution plan , but you will occasionally see differences here due to changes that the optimizer decides to make while running the query , as well as changes in the actual cost of running the query versus what the optimizer thinks is going to happen.

p/s:- Some of these articles are excerpt from the book –  Beginning Microsoft SQL Server 2008 Programming – written by Robert Vieira and publish by Wiley Publishing Inc.

cascading style sheets

Cascading Style Sheets – Separating Content From Presentation

This book i borrowed from the National Library (PNM). It tell us about how to use the Cascading Style Sheets , the origin of it , the foundation and concepts , the XHTML and CSS. CSS at its core is extremely simple and powerful. It allows you to attach style rules to HTML markup elements , such as the <p> or <a> element. These rules define the presentational aspects of the HTML elements to which they apply, such as color or typeface.

The <style> element appears in the <head> element of an XHTML document. Its type attribute declares that the style language is CSS , and it overrides the default stylesheet language used by the browser when rendering stylesheets. Actually, there are no other style languages in use by browsers today , except for Netscape Navigator 4.x’s proprietary JavaScript Stylesheets (JSSS) , which use the type attribute value “text/javascript” , now virtually obsolete as the browser fades from existence. However, as with many things in CSS , the type attribute looks forward to a time when browsers provide support for multiple style languages.

The popularity and power of a general-purpose SGML document type such as HTML wasn’t lost on XML’s designers , however , and as a transitional step toward the future , the HTML vocabulary wan reimplemented in XML as XHTML , the basis of most of our examples in this book. By making use of a well-known and proven generic document type , XML’s creators hope to leverage the knowledge of millions of web author while tightening down the screws with regard to syntax. As a result , a valid XHTML document may be viewd in any modern browser ( and even in most legacy browsers ) without much difficulty , and it may also be used by tools designed to interpret and manage XML documents , because it is itself an application of XML. Eventually , the Web’s architects expect that we’ll all be suing XHTML with our own , or with widely adopted , XML formats such as SVG , MathML , RDF , RSS , and others.

If you’re using XSLT or some other transformation language , you may need to document the naming convention several times or show the relationships between the storage format ( whether document repository , object database , relational database , or flat files ) , the transformation rules (whether XSLT or some other software package with XML support ) , the output format (whether another custom XML document , XHTML , legacy HTML , or another format ) , and the associated files , such as CSS stylesheets , Javascript files , and so forth.

p/s:-  Some of these articles are taken form the excerpt  from the book – Cascading Style Sheets – Separating Content From Presentation – written by Owen Briggs , Steven Champeon , Eric Costello and Matt Patterson – publish by Friendsof – an Apress Company.

 

 

 

h1

Professional WordPress – Design and Development Review….

January 15, 2016

Professional WordPress - Design and Development

 

 

 

 

 

 

Professional WordPress – Design and Development Review….

The WordPress source code features many different PHP , Javascript , and CSS code files. Each file serves a specific purpose in WordPress. The beauty of open source software is that all code is publicly available , which means you can easily explore the code to better understand how WordPress functions. The best resource for learning WordPress is the WordPress software itselft.

WordPress comes with three directories by default: wp-admin , wp-content , and wp-includes.Core files are all files in the wp-admin and wp-includes directories and the majority of the files in the root WordPress directory, The wp-content directory holds all of your custom files , including themes , plugins , and media. This directory contains the code that controls content manipulation and presentation in WordPress. WordPress HTML content , such as pages and posts , is stored in the MySQL database along with metadata such as tag and category structures, both of which are covered in detail in Chapter 6.

The most important file in any WordPress installation is the wp-config.php file. This file contains all database connection settings , including the database name , username , and password to access your MySQL database. This file also stores additional database and other advanced settings. The wp-config.php file was originally named wp-config-sample.php. Renaming the file to wp-config.php is one of the first steps to installing WordPress.

The wp-config file is typically stored in the root directory of WordPress. Alternatively , you can move the wp-config file out of the WordPress root directory and into the parent directory. So if your WordPress directory is located here,

/public_html/my_website/wp-config.php

you can safely move the file to here:

/public_html/wp-config.php

WordPress looks for the wp-config file in the root directory first , and if it can’t find that file it looks in the parent directory. This happens automatically so no settings need to be changed for this to work.

Initially , you set up WordPress in the document root of your local Apache.If you wanted more than one local website , you could set each website in its own folder. This works and you use it for many development sites. However ,  you can also set up each web server to respond to a local “fake” domain name. Sometimes , when moving to production , using this method makes the conversion from development to production easier.

p/s:- This is some of the excerpt of the article taken from the book – Professional WorPress – Design and Development – written by Brad Williams , David Damstra and Hal Stern – publish by John Wiley and Sons Inc ..

 

 

 

h1

Seven Deadliest USB Attacks Review …..

January 15, 2016

seven deadliest usb attacks

 

 

 

 

 

 

 

Seven Deadliest USB Attacks Review…..

The Universal Serial Bus (USB) Hacksaw was devised by a posse of self-proclaimed “IT-Ninjas” acting on behalf of the Hak.5 organization. The Hacksaw is one mutation of many USB-related hacks that have been released on this site.

The U3 smart drive was co-developed by SanDisk and M-Systems in 2005. U3 smart drives are USB flash drives with a unique hardware and software setup. The flash-drive hardware configuration causes Windows disk management to provide dual partitions. An emulated read-only CD drive partition contains the autorun.inf and LaunchPad software. The additional drive is a standard file allocation table (FAT) partition , which includes a hidden “SYSTEM” folder for installed application. This configuration allows a U3 flash drive to launch automatically when inserted into a computer.

The regulation of the U3 platform did not stop the hacking community from targeting it. Instead , they utilize a modified U3 LaunchPad called the Universal Customizer , which can overwrite the existing U3 software , enabling an open-source platform for global development with minimal governance. Many administrative and forensic-type applications are finding their way onto this and other open-source versions.

The USB Hacksaw tool is designed to work with Windows 2000 , XP . or 2003 systems only . although some success has been achieved on Vista. The program will manually install onto Windows 7 although Stunnel v4.11 is not compatible , resulting in a failure to establish a connection to the e-mail server. A Windows XP operating system was used to build the Hacksaw version outlined in the next section. In order to get the programs on the U3 drive , you must replace the launcher with the open-source code. The tool is designed to run automatically if autorun has not been disable by the user policy.

An antivirus (AV) kill script was initially released for the original verion of the USB Switchblade. It has since been taken down from the site due to mounting inconsistencies and failure caused by vendor updates and adaptations. Some AV vendors have already tagged the AV kill program released on the Hak.5 web site (csrss.exe) for the USB Switchblade as a virus , rendering it ineffective from the get-go. Since administrator access is required for Switchblade to run successfully , there are other techniques that can be used to disable AV before the payload execution.

p/s: – Some of the excerpt are taken from the book – Seven Deadliest USB Attacks – written by Brian Anderson and Barbara Anderson – publish by Syngress.

  • Just finish interview with iContro Software Sdn Bhd – Position : Software Developer at Kota Damansara  this week….

 

 

h1

Effective Web Site Development – Tools and Techniques and Windows 8 – Absolute Beginners Guide…

October 22, 2015

effective website development

Effective Web Site Development – Tools and techniques.

This book I borrowed from the National Library (PNM) recently. It’s quite a good book that tells us about how to do a website project , design it and upload it into the server. Effective Website Development examines the entire Web Development project lifecycle and covers a range of Web development tools and techniques including XML , XHTML and Dreamweaver. The author – Keith Darlington takes a step-by-step approach , leading from one concept to the next , and provides the reader with the expertise to design , build and maintain dynamic websites.

Like many other projects , developing a website requires planning and analysis. The purpose of planning and analysis is to:-

1. Establish the feasibility of the project.

2. Determine the user’s requirements

3. Create a work plan.

The feasibility of the project.

A web project must begin with a list of criteria to determine whether or not the project is worthwhile. Given the diverse nature of websites , these criteria can vary considerably, Almost all organizations nowadays have some Web presence , but this can vary from sites containing a few pages describing what the organization does , to a site that contains several hundreds of pages of details. Clearly , the beneficiaries of the site will have a limited budget to allocate to the development of a site. Development and maintenance costs would clearly be an important factor , but so too would the anticipated requirements of the user.

Determine the user’s requirements.

The starting point of any website project is to establish precisely what the users want , but ideas for websites can originate from a variety of sources – management , customers , employees and all sorts of other people who may have an interest in a website project. Moreover , visitors to a website are not always a simple homogeneous group. The reasons for users visiting a website can differ greatly. They may require specific information from a site , want to purchase some product or just be casually browsing. This means that managers must be clear about who the users are and what they want from the site from the start.

  Prepare a work plan.

Having determined the user’s requirements , the next stage is to write a description of what your site will provide , along with the function of each part. This is a description of the functional requirements and , from it , a work plan setting out how they will be implemented can be formulated.

The work plan i a document that details the project tasks, resources and time allocated to the development of each of the tasks. Normally , a Gantt chart or some other project management chart along with project milestones and development schedules would be produced.

p/s:- A good book to read for a web developer starter or someone who wants to try develop a website for his/her company..Some of the article is an excerpt taken from the book – Effective Website Development – Tools and Techniques publish by Addison Wesley and written by Keith Darlington.

windows 8

Windows 8 – Absolute Beginners Guide.

A good book to read for users who want to install and use Windows 8 as their operating system. Borrowed from the National Library ( PNM ) recently.If another version of Windows were installed and running properly on your computer when Windows 8 was installed , whomever installed Windows 8 may have chosen to create a dual-boot setup. this setup enables you to choose the operating system to use when the computer is turned on – yes, this is possible.

With your computer running and Windows 8 Booted up , the next step is to sign in to Windows. Before starting down , there are a few new alternatives to the venerable password in Windows 8 to talk about.

You probably are accustomed to entering a password to access secured content on websites , as well as to sign in to computers, tablets , and some software programs. The passwords you use might be a randomly-generated string of numbers and letters or they might be the names of members of your family or perhaps the name of your favorite sports hero.

Windows 8 provides an alternative to the password for use when signing-in. When you create your new account in Windows 8 , you need to supply a password , but you can also specify use one of two new sign-in options , replacing the use of the password after you initially supply it. these two options are PIN and Picture Password. Besides saving you the repetitive stress of entering your password often , these two new options offer a lot of flexibility to determine how to access your user account. Plus , using them will certainly impress your friends and family.

The Microsoft engineers built Windows 8 to handle many problems , but there is always a chance that something can go wrong. Some software programs might interfere with others; hardware you add to your computer might interfere with Windows 8; and programs you download from the internet can cause issues. As a result , Windows 8 can freeze , become sluggish , or shut down unexpectedly , and sometimes you may need to force your computer to power down. If you have experience running Windows in one of the diagnostic modes , such as Safe Mode or Safe Mode with networking , you can use one of those options. If you are like most users , select Start Windows Normally and press Enter. Ideally everything should run just like normal at this point.

p/s:- Quite interesting book to read about Windows 8 – the new Microsoft Operating System. Some of the article is an excerpt taken from the book – Windows 8 – Absolute Beginner’s Guide publish from Pearson Education Inc and written by Paul Sanna.

h1

Building Interfaces with Microsoft Foundation Classes and Javascript….

September 21, 2015

Building Interfaces with Microsoft Foundation Classes

mfc classes

I borrowed this book from National Library this month….Quite interesting book that covers ways to coding in MFC (Microsoft Foundation Classes) using Visual C++.. The book covers chapter relating to Control and the User Interface , The Buttons , Edit Boxes , Listboxes and Checklist Boxes , Status Bars and so on….The user interface is one of the most critical aspects of the software development cycle. The most common perception for the use of a control is as a data entry device. Clicking a check box , pushing a button , or entering text into an edit box are all classic examples of ascertaining the user’s intentions.

Command buttons are rectilinear shapes that use either a text label or a graphical icon to represent the action the button performs. A toolbar is a common example of the use of a graphical icon. Text labels are the most common way to describe the function of a button , especially when that function or meaning cannot be easily conveyed by an icon of some sort. Graphical buttons are ideal for dialog boxes that have a lot of screen clutter , because they tend to be smaller in size than buttons with text labels.

There are times when you need to trap certain keystrokes in a dialog box. Generally , these are the Tab and Enter keys. But because dialog boxes have their own message queues , these keystrokes cannot be intercepted in Class Wizard by overriding the WM_CHAR or WM_KEYDOWN messages. There’s another way you can restrict the user’s input into an edit box without subclassing. This involves building a format string , and trapping certain messages in Class Wizard. Sometimes , simply assigning the Number property to an edit box is not enough – you need to allow the use of the plus and minus signs , and the decimal point. A Number-type edit box rejects these characters. One solution is to write a universal method that works much like the formatted input described previously.

Listbox is a control that displays a list of item , such as a list of names or files. List-boxes can have one or more columns , and allow single or multiple selection modes. Listboxes respond to both mouse clicks and keyboard entries. When a user clicks a string , or presses the spacebar while on an item in the listbox , the string is selected. This is indicated by highlighting the string in the listbox , and placing it in the edit box portion of the control.

Beginning with MFC version 4.0 , status bars are implemented using class CStatus-BarCtrl , which encapsulates a Windows95 status bar control. For backward compatibility , MFC retains the older status bar implementation in class COldStatusBar. The class includes a wide range of styles that you can apply in addition to class methods for manipulating it in a variety of ways.

In conclusion , this books covers areas such as common controls , including buttons , boxes , bars , spinners , TreeView and sliders , and there is a Microsoft’s New Common Controls. The book show you how to implement all commonly used controls and dialog boxes , how to add multimedia and so on…A good book to read if you planning coding MFC in Visual C++…

p/s:- Some of the article above is an excerpt from the book Building Better Interfaces with Microsoft Foundation Classes written by Keith Bugg and published by John Wiley and Sons , Inc.

JavaScript.

javascript

Borrowed this book from National Library (PNM) this month . A book that tells and taught us about how to coding in Javascript language using HTML and Javascript language…Some programming language must be compiled , or translated , into machine code before they can be executed. Javascript , on the other hand , is an interpreted language. The browser executes each line of script as it comes to it. Although many programming languages are complex , scripting languages are generally simple. Web scripting languages enable you to combine scripting with HTML to create interactive web pages.

When you create more complicated scripts , you’ll quickly find your HTML documents become large and confusing. To avoid this , you can use one or more external Javascript files. These are files with the .js extension that contain Javascript statements. A variety of dedicated HTML editors is also available and will work with Javascript. In fact , many include feature specifically for Javascript – for example , color-coding the various Javascript statements to indicate their purposes , or even creating simple scripts automatically.

So far , you’ve seen some Javascript statements that have a section in parentheses , like this:

document.write(“Testing.”);

This is an example of a function. Functions provide a simple way to handle a task , such as adding output to a web page. Javascript includes a wide variety of built-in functions , which you will learn about. A statement that uses a function , as in the preceding example , is referred to as a function call. Javascript  also supports objects. Like variables , objects can store data – but they can store two or more pieces of data at once. The item of data stored in an object are called the properties of the object. Javascript uses periods to separate object names and property names. Objects can also include methods. These are functions that work with the object’s data. Each event handler is associated with a particular browser object , and you can specify the event handler in the tag that defines the object. You specify the event handler as an attribute to the HTML tag and include the Javascript statements to handle the event within the quotation mark. This is an ideal use for functions because function names are short and to the point and can refer to a whole series of statements.

In Conclusion , this book teaches us to use Javascript to build dynamic interactive web pages , debug scripts , create scripts that work in all browsers , exploit the capabilities of Javascript , using CSS with simple Javascript , add AJAX effects to your web pages and many more…The book teaches about the fundamental of using Javascript programming…

p/s:- Some of the article is an excerpt from the book Javascript in 24 Hours , written by Michael Moncur and published by SAMS Publishing.

h1

Autonomic Computing and TCP/IP Sockets in Java….

August 20, 2015

Autonomic Computing.

autonomic computing

I borrowed this book before Hari Raya Aidilfitri this year from National Library (PNM). After reading it , I think this book mainly covers chapter about Autonomic Computing – the concepts , infrastructure and applications and the field , theory about Autonomic Computing.

The term autonomic computing was coined in 2001 by Paul Horn , senior vice president of research for IBM. According to Horn , the industry’s focus on creating smaller , less expensive , and more powerful systems was fueling the problem of complexity. Left unchecked , he said , this complexity would ultimately prevent companies from “moving to the next era of computing” and , therefore the next era of business. In response , he issued a “Grand Challenge” to the IT industry to focus on the development of autonomic systems that could manage themselves.

Current State of Autonomic Computing.

The most visible sign to IT staffs has been the incorporation of self-managing autonomic capabilities into individual products. Today , at every level of the infrastructure , vendors are embedding autonomic capabilities within their products. Chip can now sense change and alter the configuration of circuitry to enhance processor performance or avoid potential problems. Databases can automatically tune themselves as workload fluctuates and optimize performance as data organization changes. Networking components can intelligently route traffic. Blade servers can automatically populate new blades with the required software as they’re plugged in. The list goes on.

Autonomic computing is about creating systems that are self-aware and self-managing to help reduce management complexity , increase availability , and enhance flexibility. Great strides have already been made in this emerging field. Further chapters in this book provide in-depth discussion on autonomic computing architecture , implementation models , design, and application in both academia and industry to demonstrate what exists today and what will be possible in the future.

Although autonomic computing was proposed as a way of handling the growing complexity of some large computing systems , its associated properties are desirable in software of any size. Indeed , most software typically contains some aspects of selft-management , and that use is growing through inclusion of features such as automated updates over the internet.

A large autonomic computing system cannot be composed from autonomic components. The configuration of the components would not self-adapt , the composition could oscillate , and individual components might become bottlenecks. In order to have system-wide autonomy , a system-wide feedback loop is necessary.

p/s: – Some of the article above is an excerpt from the book Autonomic Computing – Concepts , Infrastructure and Applications edited by Manish Parashar and Salim Hariri – CRC Press.

TCP/IP Sockets in Java.

tcpip sockets in java

This book also I borrowed from National Library (PNM) before Hari Raya Aidilfitri this year…The books covers the TCP/IP programming sockets in Java language.How we can implement sockets in java language , the coding and so on….

A socket is an abstraction through which an application may send and receive data , in much the same way as an open file handle allows an application to read and write data to stable storage. A socket allows an application to plug in to the network and communicate with other applications that are plugged in to the same network. Information written to the socket by an application on one machine can be read by an application on different machine and vice versa.

TCP Sockets.

Java provides two classes for TCP:Socket and ServerSocket. An instance of socket represents one end of a TCP connection. A TCP connection is an abstract two-way channel whose end are each identified by an IP address and port number. Before being used for communication , a TCP connection must go through a setup phase , which starts with the client’s TCP sending a connection request to the server’s TCP. An instance of ServerSocket listen for TCP connection requests and creates a new Socket instance to handle each incoming connection. Thus , servers handle both ServerSocket and Socket instances , while clients use only Socket.

UDP Sockets.

UDP provides an end-to-end service different from that TCP. In fact , UDP performs only two functions: 1)it adds another layer of addressing (ports) to that IP , and 2) it detects some forms of data corruption that may occur in transit and discards any corrupted messages. Because of this simplicity , UDP sockets have some different characteristics from the TCP sockets we saw earlier.

Another difference between UDP sockets and TCP sockets is the way that they deal with message boundaries: UDP socket preserve them. This makes receiving an application message simpler , in some ways , than it is with TCP sockets.

p/s:- Some of the article is an excerpt from the book TCP/IP Sockets in Java – Practical guide for programmers , written by Kenneth L. Calvert and Michael J.Donahoo publish by Morgan Kaufmann.

h1

Computer Organization & Architecture – Designing for Performance….

May 31, 2015

computer organization - designing for performance

For my first introduction , just borrowed a book from National Library (PNM) entitled Computer Organization & Architecture – Designing for Performance written by William Stallings. This book mainly tell us about the computer architecture , the CPU , memory , processor , I/O devices , the control unit  and parallel organization. It tells us about how computers are organized  and made of , the definitions of a computer system , the Pentium Family Processor and PowerPC and so on…The memory of the computer system – the cache memory , DDR SDRAM memory are also discussed in this book.

RAM technology is divided into two technologies: dynamic and static. A dynamic RAM (DRAM) is made with cells that store data as charge on capacitors. The presence or absence of charge in a capacitor is interpreted as a binary 1 or 0. Because capacitors have a naturaltendency to discharge , dynamic RAMs require periodic charge refreshing to maintain data storage. The term dynamic refers to this tendency of the stored charge to leak away , even with power continuously applied.

When only a small number of ROMs with a particular memory content is needed , a less expensive  alternative is the programmable ROM (PROM). Like the ROM , the PROM is nonvolatile and may be written into only once. For the PROM , the writing process is performed electrically and may be performed by a supplier or customer at a time later than the original chip fabrication. Special equipment is required for the writing or “programming” process. PROMs provide flexibility and convenience. The ROM remains attractive for high-volume production runs.

In a typical DRAM , the processor presents addresses and control levels to the memory , indicating that a set of data at a particular location in memory should be either read from or written into the DRAM. After a delay , the access time , the DRAM either writes or reads the data. During the access-time delay , the DRAM performs various internal functions , such as activating the high capacitance of the row and column lines , sensing the data , and routing the data out through the output buffers. The processor must simply wait through this delay , slowing performance.

With the synchronous access , the DRAM moves data in and out under control of the system clock. The processor or other master issues the instruction and address information , which is latched by the DRAM. The DRAM then responds after a set of number of clock cycles. Meanwhile , the master can safely do other tasks while the SDRAM is processing the request.

InfiniBand is a recent I/O specification aimed at the high-end server market. The first version of the specification was released in early 2001 and has attracted numerous vendors. The standard describes an architecture and specifications for data flow between processors and intelligent I/O devices. InfiniBand is intended to replace the PCI bus in servers , to provide greater capacity , increased expandability , and enhanced flexibility in server design. In essence , InfiniBand enables servers , remote storage, and other network devices to be attached in a central fabric or switches and links. The switch-based architecture can connect up to 64,000 servers , storage systems , and networking devices.

The Pentium Processor – Register Organization – The register organization includes the following type of registers:

1. General: There are eight 32 bit general purpose registers. These may be used for all types of Pentium instructions; they can also hold operands for address calculations. In addition , some of these registers also serve special purposes. For example , string instructions use the contents of the ECX , ESI , and EDI registers operands without having to reference these registers explicitly in the instruction. As a result , a number of instructions can be encoded more compactly.

2. Segment: The 16-bit segment registers contain segment selectors , which index into segment tables. The code segment (CS) register references the segment containing the instruction being executed, The stack segment (SS) register references the segment containing a user-visible stack. The remaining segment registers (DS,ES,FS,GS) enable the user to reference up to four separate data segments at a time.

* The rest you can find at page 442 Chapter 12 (Processor Structure and Function).

In conclusion , this book is a great book to read if you want to know about the computer architecture and organization , starting from the 80386 to Pentium 4  processor. For parallel organization or parallel processing , you can check it out at page 637 and 638 of the book. Stallings provides a clear, comprehensive presentation of the organization and architecture of modern-day computers, emphasizing both fundamental principles and the critical role of performance in driving computer design. The text conveys concepts through a wealth of concrete examples highlighting modern CISC and RISC systems.

p/s:- Some of the excerpt are taken from this book – Computer Organization & Architecture – Designing for Performance – 7th Edition –  written by William Stallings , published by Pearson Prentice Hall.

Follow

Get every new post delivered to your Inbox.