Symbols
32-bit ARM architecture 273-275
32-bit ARM assembly language 282-284
ARM addressing modes 277
ARM instruction categories 279
data types 274
distinct execution privilege levels 274
64-bit ARM architecture 284
64-bit ARM assembly language 286, 287
instruction set 285
limitations 285
256-bit Secure Hashing Algorithm (SHA-256) 130
6502 addressing modes 66
absolute addressing mode 67, 68
absolute indexed addressing mode 68-70
immediate addressing mode 66
indirect indexed addressing mode 70, 71
6502 architecture
instruction categories, implementing 71
6502 architecture, instruction categories
arithmetic instructions 73
branching instructions 74
interrupt-related instructions 75
logical instructions 74
memory load instructions 72
memory store instructions 72
NOP instruction 76
processor flag instructions 75
register-to-register data transfer instructions 72
subroutine call and return instructions 75
Arithmetic Logic Unit (ALU) 54, 58-63
functional units 54
interrupt handling 76
register set 54
6502 processor, interrupt input
BRK instruction processing 79, 80
NMI processing 78
8087 floating-point coprocessor 237, 238
80386 processor
A
A64 284
AArch64 284
abort exception 325
absolute addressing mode 67, 68
absolute indexed addressing mode 68-70
accelerometer 428
access violation exception 181
accumulator addressing mode 74
activation function 165
Ada programming language 47
Adaptive Cruise Control (ACC) 423
adders 41
addressing mode 22
address space layout randomization (ASLR) 176
adiabatic quantum computation 460, 461
Advanced Micro Devices (AMD) 250
Advanced RISC Machine (ARM) 126
Advanced Schottky Transistor-Transistor Logic (AS) TTL 44
Advanced Vector Extensions (AVX) 222
air-gapped computing 379
aliasing 204
Alienware Aurora Ryzen Edition R10 gaming desktop 347
Nvidia GeForce RTX 3090 GPU 348, 349
Ryzen 9 5950X branch prediction 348
altcoins 417
AMD64 268
AMD virtualization (AMD-V) 327
amperes (amps) 28
analog 152
analog-to-digital converter (ADC) 152-155
AND gate 33
Android Debug Bridge (adb) tool 284
Android Studio integrated development environment (IDE) 282
Android Studio Native Development Kit (NDK) 283
Antminer S19 Pro 414
AntPool
reference link 413
Apple Neural Engine 344
application binary interface (ABI) 296
application software
security, ensuring 390
application virtualization 322
architectural level
security, designing 386
architecture-independent device drivers 126
arithmetic instructions 73
Arithmetic Logic Unit (ALU) 54, 58-63
ARM addressing modes 277
double register indirect 279
double register indirect, with scaling 279
immediate 277
register direct 278
register indirect 278
register indirect, with offset 278
register indirect with offset, post-incremented 278
register indirect with offset, pre-incremented 278
ARM architectures 273
ARM instruction categories
arithmetic and logic 280
breakpoint 281
comparisons 280
conditional execution 281, 282
control flow 281
load/store 279
other instruction categories 282
register movement 280
stack manipulation 279
supervisor mode 281
ARM processor virtualization 334
ARMv8-A 275
Ars Technica
URL 465
artificial intelligence (AI) 165
artificial neural networks (ANNs) 165, 435
ASICs
used, for bitcoin mining 413-416
assembly language 22
associative memory 189
atomic 149
atomic memory operation (AMO) 307
automated computing devices
Charles Babbage's Analytical Engine 2, 3
Electronic Numerical Integrator and Computer (ENIAC) 4
evolution 2
IBM PC 5
autonomous driving stages
obstacle avoidance 425
road following 425
traffic rules, obeying 425
autonomous vehicle
components and processes 444
computing architecture 443, 444
state and surroundings, sensing 427
Avalanche 344
B
backing store 196
bandpass filter 159
bandstop filter 159
bare metal hypervisor 321
Base Pointer (BP) 6
B extension 309
bfloat16 format 365
bi-endianness 67
big data 164
binary coded decimal (BCD) 21, 238
binary semaphore 150
binary translation 327
BIOS boot 128
bipolar 89
bipolar junction transistor (BJT) 89
bit 15
full node 403
genesis block 399
miners 397
transaction fees 407
bitcoin block header fields
bitcoin version number 410
bits 410
Merkle root 410
nonce 410
previous block hash 410
time 410
Bitcoin cash 418
bitcoin core software 403
download link 403
bitcoin mining
economics 416
with CPU 408
bitcoin mining computer architectures 409, 410
bitcoin mining process 404, 405
bitcoin mining systems 397
bitcoin network
block, updating with new transactions 404
data, modifying in transaction header 405
timestamp, altering within block 404
bitline 94
Bitmain 413
reference link 413
Blizzard 344
boot configuration data (BCD) 129
boot loader 128
boot priority order
versus multi-booting 128
BIOS boot 128
embedded devices 131
trusted boot 130
bot-herder 372
botnet 372
branching instructions 74, 213
branch prediction 219
Break flag 21
BRK instruction processing 79, 80
brute force algorithm 401
brute force password attack 373
BTC.com
reference link 413
business desktop computer 168
bypass 216
byte 15
C
cache coherence problem 208
cache hit 196
cache lines 201
cache miss 196
capacitance 93
carbon nanotube field-effect transistor (CNTFET) 462, 463
advantages 463
barriers 463
Carry flag 21
Central Processing Unit (CPU) 54
used, for bitcoin mining 408
Charles Babbage's Analytical Engine 2, 3
chiplets 454
chipset 100
Chisel 315
classical physics 456
cleared
versus set 17
client node 403
clock multiplier 45
closed system 10
cloud application, WSC
cloud compute server 167
cloud computing
versus virtualization 338
virtualization, using 338
code segment (CS) 332
combinational logic 35
command-line interface 126
command shell 391
Common Weakness Enumeration (CWE)
reference link 393
comparator 153
compiler 22
complementary MOS (CMOS) 91
complex instruction set computer (CISC) 64, 215
computational instructions 298
computer architect
computer architecture 14
numbers, representing with voltage levels 14
conditional branching 218, 219
confidential computing 383-385
control and status registers (CSRs) 300
control flow instructions 299
convolution 157
Convolutional Neural Network (CNN) 431, 432
example implementation 433-435
using, in autonomous driving applications 435-440
cooperative multithreading 137
Coordinated Universal Time (UTC) 410
counter type ADC 154
counting semaphore 150
covert channel attacks 379
critical path 43
critical section 151
cross-site scripting attack 391
cryptographic hash function 130
current-generation motor vehicle operations
accelerator 422
brake 422
gear selection 422
steering 422
current program status register (CPSR) 276
cyberattack techniques
botnet 372
phishing 372
vulnerability exploitation 373
cybersecurity threat categories
criminal groups 371
hacktivists 371
industrial spies 371
insiders 372
national governments 370
terrorist organizations 371
white-hat hacking 371
cybersecurity threats 370
post-exploitation actions 376, 377
D
data at rest 383
data block
SHA-256 hash, computing 402
data caches 197
data compression 161
data execution prevention (DEP) 176
dataflow processing 218
data in transit 383
data in use 383
data parallelism 163
data processors
GPUs as 164
reference link 97
deadlock 150
Decimal mode flag 21
Denial-of-Service (DoS) attack 372, 375
depletion mode 89
DeskPro 9
Destination Index (DI) 6
PCIe device drivers 121
device memory protection 245
device specialization 454
digital hold input signal 153
digital signal processor (DSP) 152, 177
digital-to-analog converters (DACs) 152-155
Digital Visual Interface (DVI) 108
digital wallets 396
direct addressing mode 67
Direct Memory Access (DMA) 83, 84, 122
dirty bit 208
discrete cosine transform (DCT) 161
discrete Fourier transform (DFT) 159
disk drive caches 196
DisplayPort 109
Dogecoin 418
doping 30
dot product 155
double data rate (DDR) 96
drain terminal 89
DRAM circuits
capacitor 93
constructing, with MOSFET 92
Graphics DDR (GDDR) 99
prefetching 99
driving task fallback 423
dual inline memory module (DIMM) 97
DVI variants
DVI-A 108
DVI-D 108
DVI-I 108
dynamic translation 328
dynamic voltage and frequency scaling (DVFS) 241, 242, 301
E
eager execution 219
easy 6502
reference link 24
edge detection 436
edge-sensitive device 38
electrically erasable programmable read-only memory (EEPROM) 178
electrical power consumption 339
electromagnetic emissions 380
Electron Device Engineering Council (JEDEC) 97
Electronic Numerical Integrator and Computer (ENIAC) 4
embedded devices 131
enclaves 384
encryption of data at rest 381
encryption of data in transit 381
Engadget
URL 465
enhancement mode 89
error correcting code (ECC) 97
Ether 418
Ethereum 418
exahash 406
exception
abort 325
fault 325
in programming languages 229
trap 325
exponent 235
extrapolation 426
F
fair scheduling 138
farad 93
Fast Fourier transform (FFT) 159-162
applications in signal processing 160, 161
fault exception 325
Federal Information Processing Standards (FIPS) 400
feedforward network 166
field-programmable gate arrays (FPGAs) 47
used, for bitcoin mining 411, 412
filter bank 161
Fin Field-Effect Transistor (FinFET) 445
finite state machines 39
first come, first served (FCFS) 137
fixed-priority preemptive scheduling 137
flag 20
flashing the BIOS 124
flattening 438
Flexible Intermediate Representation for RTL (FIRRTL) 315
floating-point arithmetic 234-237
floating-point instructions 213
floating-point unit (FPU) 213, 237
flushing the pipeline 219
frames 111
frequency bin 160
frequency selective filter 158
full adder 42
full-duplex 101
full virtualization 324
fully associative cache 206, 207
future-tolerant skill set
building 464
conferences and literature 467, 468
G
gate array 46
gated D latch 36
gate terminal 89
general-purpose I/O (GPIO) 314
generation low-power double data rate RAM (LP-DDR4x) 344
Gizmodo
URL 465
globally unique identifier (GUID) 127
global minimum 460
Global Positioning System (GPS) 428
Global System for Mobile communications (GSM) 10
Google Compute Engine
reference link 322
GRand Unified Bootloader (GRUB) 126
graphic equalizer 161
Graphics DDR (GDDR) 99
Digital Visual Interface (DVI) 108
DisplayPort 109
High-Definition Media Interface (HDMI) 109
Video Graphics Array (VGA) 108
graphics processing unit (GPU) 13, 107
as data processors 164
used, for bitcoin mining 409
guests 321
GUID partition table (GPT) 127
H
half adder 42
half-duplex 101
half-precision floating-point 252
hard fault 185
Hardware 3.0 (HW3) 444
hardware debugger 244
hardware description languages 46
hardware emulation 328
hardware, warehouse-scale computer (WSC)
fault management 358
Harvard architecture 156, 176, 177
hash algorithm 247
hash collision 401
hashrate 406
headless mode 354
hidden layers 166
high-bandwidth memory (HBM) 366
High-Definition Media Interface (HDMI) 109
high-end smartphone 168
highpass filter 158
High-Performance Computing (HPC) 310
high-performance gaming computer 168
High-Speed Input Output (HSIO) lanes 102
holes 89
host 321
hosted hypervisor 321
Hot plugging 121
hyperparameter 439
hypervisor 321
type-1 hypervisor 321
type-2 hypervisor 321
versus virtual machine monitor 321
hypervisor-extended supervisor mode (HS) 335
I
IBM PC 5
Intel 8088 microprocessor 6, 7
Intel 80286 microprocessor 8, 9
Intel 80386 microprocessor 8, 9
IBM Quantum
reference link 462
IEEE 754 floating-point standard 239
imaginary number 160
immediate addressing mode 22, 66
implied addressing mode 72
impulse response 158
indirect indexed addressing mode 70, 71
inertial sensors 428
infrastructure attacks 375
input layer 166
input/output operations
Direct Memory Access (DMA) 83, 84
programmed I/O 82
Institute of Electrical and Electronic Engineers (IEEE) 110, 239
instruction-level parallelism (ILP) 214
instruction pipelining 211-214
Instruction Pointer (IP) 6
instruction set architecture (ISA) 294
instructions per clock (IPC) 212, 347
integer instructions 213
integrated circuit
design approach 453
integrated graphics 107
Intel 64 268
Intel Nervana neural network processor 363
Intel virtualization technology (VT-x) 327
internal encryption engine with key storage 244
internet of things (IoT) 310
interpolation 426
interrupt descriptor table register (IDTR) 332
Interrupt disable flag 21
interrupt-related instructions 75
Interrupt Request (IRQ) 73, 82
interrupts
interrupt service routine (ISR) 227
interrupt vector table (IVT) 227
inverse Fourier transform 159
I/O subsystem 100
M.2 105
Serial AT Attachment (SATA) 104
Thunderbolt 106
Universal Serial Bus (USB) 105, 106
iPhone 13 Pro Max 343
components 345
J
J extension 309
junk conferences 467
K
Kalman filter 429
kernel-based virtual machine (KVM) 337
kernel-mode drivers 118
keyboard 112
key logger 375
key page frame states
active page 188
bad page 188
free page 188
modified page 188
standby page 188
zeroed page 188
L
L1 D-cache 201
L1 I-cache 201
Lane-Keeping Assistance (LKA) 423
Last-In, First-Out (LIFO) data structure 21
least-recently used (LRU) 206
level 2 processor caches 209, 210
level 3 processor caches 209, 210
level-sensitive device 37
L extension 309
lidar-based driving systems
disadvantages 441
light detection and ranging (lidar) 430
sensors 440
Litecoin 418
little-endian processor 67
load/store architecture 274
load value injection (LVI) 385
local area network (LAN) 110
locality of reference 197
local minimum 460
lockings 4
logical instructions 74
long mode 268
lookup tables (LUTs) 313
lossless compression 161
lossy compression 161
lowpass filter 158
Low-Power DDR4 (LPDDR4) 445
Lunar Atmosphere Dust and Environment Explorer (LADEE) 459
M
M.2 105
malware (malicious software) 373
denial of service (DoS) attack 375
infrastructure attacks 375
key logger 375
man in the middle (MITM) attack 375
ransomware 374
spyware 374
SQL injection 375
viruses 374
worms 374
man in the middle (MITM) attack 375
mantissa 235
maskable interrupt 77
master boot record (MBR) 127
max pooling 437
memory access instructions 299
memory load and store instructions 72
memory management unit (MMU) 189, 190
memory protection extensions (MPX) 263
memory protection unit (MPU) 245
message 402
message queue 151
metal-oxide-semiconductor field-effect transistor (MOSFET) 89-92
used, for constructing DRAM circuits 92
mezzanine card 363
mill 4
modern computer motherboard
modern processors
virtualizing 331
modified Harvard architecture 156, 177
monitor 79
multi-booting
versus boot priority order 128
multi-core processors 141
multilevel feedback queue 138
multilevel processor caches 198, 199
multipath 111
multiple-input-multiple-output (MIMO) 111
multiple instruction, multiple data (MIMD) 141, 222
multiple-issue processing 214
multiplexer 34
multiply-accumulate (MAC) 155, 178, 222, 366
multiprocessing computer 141, 142
multiprogramming 179
multitasking 148
mutual exclusion (mutex) 149
mutual exclusion (mutex) issues
deadlock 150
priority inversion 149
thread preemption 149
N
natural boundary, of data type 252
natural language processing (NLP) 364
near-field communication (NFC) 169
Negative sign flag 20
Nervana neural network processor for inference (NNP-I) 366
form factors 367
Nervana neural network processor for training (NNP-T) 363, 366
NNP-T1000 363
NNP-T1300, versus NNP-T1400 366
NNP-T1400 363
nested interrupt 77
nested virtualization 322
network interface 110
Ethernet 110
network virtualization 323
neural networks and machine learning architectures 363
Intel Nervana neural network processor 363
neuron 165
N extension 309
NMI processing 78
nonce 398
Non-Maskable Interrupt (NMI) 73
non-paged pool 187
non-preemptive scheduling 135
non-real-time operating systems 132
versus real-time operating system (RTOS) 132
nonvolatile memory (NVM) 125
NOP instruction 76
NOT gate 32
NPM transistor 30
null pointer exception 191
numbers
representing, with voltage levels 14
Nvidia GeForce RTX 3090 GPU 348
features 349
O
object tracking 441
Ohm's law 28
OnlineU, online college reviews
reference link 467
opcode 55
Open Compute Project (OCP) accelerator module (OAM) 363
operands 58
operating system virtualization 321
operation code/opcode 22
OR gate 33
out-of-order instruction execution (OoO) 216
output layer 166
overclocking 114
Overflow flag 20
P
page 180
Page Directory Base Register (PDBR) 183
paged pool 188
page fault 184
page frame 182
page frame number (PFN) 188
page swapping 180
page table 182
page table directory 182
limitations 100
paravirtualization 327
passband 159
password-protected hardware debugger interface 244
path traversal vulnerability 392, 393
PC AT (Advanced Technology) 8
PCIe device drivers 121
perceptron 348
Peripheral Component Interconnect (PCI) 102, 119
personal computer architecture 347
Alienware Aurora Ryzen Edition R10 desktop PC 347
petabytes (PB) 164
P extension 309
Phase-locked loop (PLL) 45
phishing 372
piezoelectric effect 45
pipeline bubble 216
point cloud 431
pointer 191
polyvinyl chloride (PVC) 28
pooling 437
Portable Operating System Interface (POSIX) 322
positive edge-triggered D flip-flop 38
post-exploitation actions 376, 377
post-quantum cryptography 460
power consumption fluctuations 380
power management 240
techniques 240
Power-On Self-Test (POST) 124
predication 281
preemptive scheduling 135
prefetching 99
principle of least privilege 388
priority inheritance 150
priority inversion 149
private key 246
privileged processor modes 226
privilege escalation 376
process control block (PCB) 135
process identifier (PID) 135
processor cache write policies 207, 208
write-back 208
write-through 208
processor context 135
processor flag instructions 75
processor instruction caches 197
processor instruction set 65
processor virtualization methods
binary translation 327
hardware emulation 328
paravirtualization 327
trap-and-emulate virtualization 324-327
process states
blocked 134
initializing 134
running 134
waiting 134
Program Counter (PC) 55
programmed I/O 82
proof of stake 418
proof of work 404
public key 246
public-key cryptography 246
pulse's time of flight 430, 440
Q
Q extension 309
Qisket 462
URL 462
quantum code-breaking 459, 460
quantum conferences
reference link 467
quantum decoherence 461
quantum entanglement 459
quantum error correction 461
quantum superposition 458
quantum supremacy 461
queue 151
quick emulator (QEMU) 337
URL 329
R
R-2R ladder 152
rack-based servers, WSC 354-357
radio detection and ranging (radar) 430
radio frequency (RF) transmissions 152
random-access memory (RAM) 6, 55, 92, 178
ransomware 374
rate-monotonic scheduling (RMS) 137
raytracing 348
read-only memory (ROM) 6, 124, 178
real mode 251
real-time operating system (RTOS) 131, 148-151
versus non-real-time operating systems 132
Rectified Linear Unit (RELU) 437
recurrent network 166
reduced instruction set computer (RISC) 64, 215
register load and store instructions
offset 277
register 277
scaled register 277
register set 54
register-to-register data transfer instructions 72
register-transfer level (RTL) 315
relative addressing mode 75
remote computing 384
Resource Monitor tool 135
reverse engineering 386
RGB 432
ring counter 39
ripple carry adder 42
RISC-V
RISC-V 32-bit integer instruction set (RV321) 305
extensions 308
RISC-V assembly language 312
RISC-V base instruction set 298
computational instructions 298, 299
control flow instructions 299
memory access instructions 299
RISC-V configurations 311
RISC-V D extension 308
RISC-V F extension 308
RISC-V M extension 306
RISC-V processor virtualization 334, 335
round-robin scheduling 137
routers 110
RV32E architecture 308
Ryzen 9 5950X processor
branch prediction 348
features 347
S
safer mode extensions (SMX) 263
sample-and-hold circuit 153
sandbox 320
Scala 315
Scalable Link Interface (SLI) 115
scheduling algorithms 136, 138-141
sector 105
Secure Guard Extensions (SGX) 384
secure hardware, features
attacks, anticipating 378, 379
data, identifying to be protected against unauthorized disclosure 378
secure system design
comprehensive secure design 387
principle of least privilege 388
zero trust architecture 388-390
secure system design, features
cryptographically secure key generation 382
encryption, of data at rest 381
encryption, of data in transit 381
secure boot procedure 382
secure key storage 381
tamper-resistant hardware design 383
security
avoiding, through obscurity 386, 387
designing, at architectural level 386
ensuring in application software 390
ensuring in system software 390
security technologies
device memory protection 245
internal encryption engine with key storage 244
password-protected hardware debugger interface 244
self-driving vehicles
hardware and software requirements 426
overview 422
self-driving vehicles, autonomy levels
conditional driving automation 423
driver assistance 423
full driving automation 424
high driving automation 423
no driving automation 422
partial driving automation 423
self-modifying code 175
semaphore 150
semiconductor 29
sensor data
converting, into driving decisions 431
sensor data processing 442
lane-keeping task 442
objects, avoiding 443
road rules, complying with 442
vehicle path, planning 443
sensor types, used in autonomous vehicle designs
Global Positioning System (GPS) 428
inertial sensors 428
light detection and ranging (lidar) sensor 430
radio detection and ranging (radar) 430
sound navigation and ranging (sonar) 431
speedometer 428
video cameras 429
sequential logic 45
Serial AT Attachment (SATA) 104
Serial Peripheral Interface (SPI) 310
set
versus cleared 17
set associative cache 205, 206
Set-Reset (SR) 35
SHA-256 hash algorithm 400, 401
computing, of data block 402
shadow page tables 330
shellcode 391
shift register 39
Shor's algorithm 460
signal processing algorithm 157
convolution 157
Fast Fourier transform (FFT) 159-162
signal-to-noise ratio (SNR) 157
silicon n-channel transistors 453
simultaneous multithreading 220, 221
single data rate (SDR) 96
single instruction, multiple data (SIMD) 10, 141, 309
single processor instruction
execution, steps 211
small outline DIMM (SODIMM) 97
Smart contracts 418
smartphone architecture 343
iPhone 13 Pro Max 343
Society of Automotive Engineers (SAE) 422
SoC integration 454
soft fault 185
soft real-time system 146
software attestation procedure 384
software weaknesses 390
cross-site scripting 391
path traversal vulnerability 392, 393
solid-state drive (SSD) controller 345
solid-state drives (SSDs) 105
solo mining 408
sound navigation and ranging (sonar) 431
source code security scans 393
Source Index (SI) 6
source terminal 89
spatial locality 197
spectral analysis 160
spectrum analyzers 160
speedometer 428
spin quantum number 457
spin valve 457
split cache 201
spyware 374
square wave signal 44
static translation 328
Status Flags (FLAGS) 6
stopband 159
stopband suppression 158
storage virtualization 323
centralized management 323
data migration 324
replication 324
Streaming SIMD Extensions (SSE) 222
subroutine call and return instructions 75
successive approximation 154
superscalar processors 221
swap file 180
symmetric multiprocessing systems 141
synapses 165
synchronous circuit 40
synchronous DRAM (SDRAM) 96
synchronous logic 46
system security management 243, 244
system software
security, ensuring 390
T
T32 instruction set 273
tamper-resistant hardware design 383
TechCrunch
URL 465
temporal locality 197
tensor 365
TensorFlow 349
tensor processor clusters (TPCs) 366
terahash 406
terminate and stay resident (TSR) 179
test-and-set instruction 149
T extension 309
thermal fluctuations 380
thread control block (TCB) 135
thread identifier (TID) 135
thread preemption 149
Thunderbolt 106
thwarting cyberattackers 246, 247
tile-based deferred rendering (TBDR) 344
time-slicing 133
TNW
URL 465
Tom's Hardware
URL 465
Top 25 Most Dangerous Software Weaknesses
reference link 393
training set 364
transactional synchronization extensions (TSX) 263
Transistor-Transistor Logic (TTL) 119
translation lookaside buffer (TLB) 189, 196
trap-and-emulate virtualization 324-327
trap exception 325
trillion operations per second (TOPS) 366
Trusted Platform Module (TPM) 130, 245
authentication services 246
cryptographic key generation 245
cryptographic key storage 246
random number generation 245
system health monitoring 246
system integrity verification 246
truth table 32
two-input multiplexer 34
U
Unified Extensible Firmware Interface (UEFI)
applications 126
UEFI features
architecture-independent device drivers 126
faster booting 127
secure boot 127
Unified Extensible Firmware Interface (UEFI) 126, 127
unipolar transistor 89
Universal Serial Bus (USB) 105, 106
unshielded twisted-pair (UTP) 110
U.S. News & World Report, online college
reference link 467
V
V bit 335
vector 155
velocity 427
Verilog 47
very high-speed integrated circuit (VHSIC) 47
V extension 309
VHSIC hardware description language (VHDL) 47-51
video cameras
challenges 429
using 429
Video Graphics Array (VGA) 108
Virtual Address Extension (VAX) 181
VirtualBox 335
virtualization 320
using, in cloud computing 338
versus cloud computing 338
virtualization challenges 329
security 331
shadow page tables 330
unsafe instructions 330
virtualization tools 335
kernel-based virtual machine (KVM) 337
QEMU 337
VirtualBox 335
VMware ESXi 336
VMware Workstation 336
Xen 337
virtualization types
application virtualization 322
network virtualization 323
operating system virtualization 321
storage virtualization 323
virtual local area networks (VLANs) 323
virtual machine 321
virtual machine extensions (VMX) 263
virtual machine monitor 321
versus hypervisor 321
virtual memory 182
usage 180
Virtual Memory System (VMS) 181
virtual supervisor (VS) mode 335
virtual user (VU) mode 335
viruses 374
VMware ESXi 336
VMware Workstation 336
voltage levels
used, for representing numbers 14
von Neumann architecture 5, 156, 174
security considerations 175
vulnerability exploitation 373
W
warehouse-scale computer (WSC) architecture 351
as multilevel information cache 358
cloud application, deploying 359-362
electrical power consumption 358
hardware fault management 357
water hammer arrestors function 93
web browser caches 197
web crawlers 357
white-hat hacking 371
wide area network (WAN) 110
Wi-Fi Protected Access 2 (WPA2) 112
Windows boot loader 129
Windows Boot Manager 129
Windows x64 application programming interface (API) 270
Wine
URL 322
Wired
URL 465
word length 19
wordline 94
working set 188
workloads 336
worms 374
X
x64 architecture 268
features 268
instruction set 268
x64 instruction categories 270
x64 instruction formats 270
x64 register set 269
x86-64 268
x86 addressing modes 255
based indexed addressing 257
based indexed addressing, with scaling 257, 258
direct memory addressing 256
immediate addressing 256
implied addressing 256
indexed addressing 257
register addressing 256
register indirect addressing 256
addressing modes 255
x86 instruction categories 258
x86 instruction formats 264
X86 current privilege level (CPL) 332
x86 hardware virtualization 333
x86 instruction categories 258
AES instructions 263
arithmetic and logic instructions 259, 260
common instruction patterns 263
control flow instructions 261
conversion instructions 261
data movement instructions 258
flag manipulation instructions 262
floating-point instructions 263
input/output instructions 262
miscellaneous instructions 262
MPX instructions 263
other instruction categories 263
protected mode instructions 262
SIMD instructions 263
SMX instructions 263
stack manipulation instructions 259
string manipulation instructions 261
TSX instructions 263
VMX instructions 263
x86 instruction formats
address displacement bytes 264
immediate value bytes 264
ModR/M byte 264
opcode bytes 264
prefix bytes 264
x86 processor virtualization 331-333
Xen 337
XOR gate 34
Z
zero-day vulnerability 373
Zero flag 21
zero-page addressing mode 71
zero trust architecture 388-390
Zicsr extension 309
Zifencei extension 309
34.239.150.167