Flylib.com
The Art of Assembly Language
The Art of Assembly Language
ISBN: 1593272073
EAN: 2147483647
Year: 2005
Pages: 246
Authors:
Randall Hyde
BUY ON AMAZON
Table of Contents
BackCover
The Art of Assembly Language
Chapter 1: Hello, World of Assembly Language
1.2 The Anatomy of an HLA Program
1.3 Running Your First HLA Program
1.4 Some Basic HLA Data Declarations
1.5 Boolean Values
1.6 Character Values
1.7 An Introduction to the Intel 80x86 CPU Family
1.8 Some Basic Machine Instructions
1.9 Some Basic HLA Control Structures
1.10 Introduction to the HLA Standard Library
1.11 Additional Details About TRY..ENDTRY
1.12 High Level Assembly Language vs. Low Level Assembly
1.13 For More Information
Chapter 2: Data Representation
2.2 Numbering Systems
2.3 The Hexadecimal Numbering System
2.4 Data Organization
2.5 Arithmetic Operations on Binary and Hexadecimal Numbers
2.6 A Note About Numbers vs. Representation
2.7 Logical Operations on Bits
2.8 Logical Operations on Binary Numbers and Bit Strings
2.9 Signed and Unsigned Numbers
2.10 Sign Extension, Zero Extension, Contraction, and Saturation
2.11 Shifts and Rotates
2.12 Bit Fields and Packed Data
2.13 An Introduction to Floating Point Arithmetic
2.14 Binary Coded Decimal (BCD) Representation
2.15 Characters
2.16 The Unicode Character Set
2.17 For More Information
Chapter 3: Memory Access and Organization
3.2 The 80x86 Addressing Modes
3.3 Run-Time Memory Organization
3.4 How HLA Allocates Memory for Variables
3.5 HLA Support for Data Alignment
3.6 Address Expressions
3.7 Type Coercion
3.8 Register Type Coercion
3.9 The Stack Segment and the PUSH and POP Instructions
3.10 Dynamic Memory Allocation and the Heap Segment
3.11 The INC and DEC Instructions
3.12 Obtaining the Address of a Memory Object
3.13 For More Information
Chapter 4: Constants, Variables, and Data Types
4.2 Some Additional Instructions: INTMUL, BOUND, INTO
4.3 The TBYTE Data Types
4.4 HLA Constant and Value Declarations
4.5 The HLA TYPE Section
4.6 ENUM and HLA Enumerated Data Types
4.7 Pointer Data Types
4.8 The HLA Standard Library CHARS.HHF Module
4.9 Composite Data Types
4.10 Character Strings
4.11 HLA Strings
4.12 Accessing the Characters Within a String
4.13 The HLA String Module and Other String-Related Routines
4.14 In-Memory Conversions
4.15 Character Sets
4.16 Character Set Implementation in HLA
4.17 HLA Character Set Constants and Character Set Expressions
4.18 The IN Operator in HLA HLL Boolean Expressions
4.19 Character Set Support in the HLA Standard Library
4.20 Using Character Sets in Your HLA Programs
4.21 Arrays
4.22 Declaring Arrays in Your HLA Programs
4.23 HLA Array Constants
4.24 Accessing Elements of a Single Dimension Array
4.25 Multidimensional Arrays
4.26 Allocating Storage for Multidimensional Arrays
4.27 Accessing Multidimensional Array Elements in Assembly Language
4.28 Large Arrays and MASM (Windows Programmers Only)
4.29 Records
4.30 Record Constants
4.31 Arrays of Records
4.32 ArraysRecords as Record Fields
4.33 Controlling Field Offsets Within a Record
4.34 Aligning Fields Within a Record
4.35 Pointers to Records
4.36 Unions
4.37 Anonymous Unions
4.38 Variant Types
4.39 Union Constants
4.40 Namespaces
4.41 Dynamic Arrays in Assembly Language
4.42 HLA Standard Library Array Support
4.43 For More Information
Chapter 5: Procedures and Units
5.2 Procedures
5.3 Saving the State of the Machine
5.4 Prematurely Returning from a Procedure
5.5 Local Variables
5.6 Other Local and Global Symbol Types
5.7 Parameters
5.8 Functions and Function Results
5.9 Recursion
5.10 Forward Procedures
5.11 Low Level Procedures and the CALL Instruction
5.12 Procedures and the Stack
5.13 Activation Records
5.14 The Standard Entry Sequence
5.15 The Standard Exit Sequence
5.16 Low Level Implementation of Automatic (Local) Variables
5.17 Low Level Parameter Implementation
5.18 Procedure Pointers
5.19 Procedure Parameters
5.20 Untyped Reference Parameters
5.21 Managing Large Programs
5.22 The INCLUDE Directive
5.23 Ignoring Duplicate INCLUDE Operations
5.24 UNITs and the EXTERNAL Directive
5.25 Namespace Pollution
5.26 For More Information
Chapter 6: Arithmetic
6.2 80x86 Integer Arithmetic Instructions
6.3 Arithmetic Expressions
6.4 Logical (Boolean) Expressions
6.5 Machine and Arithmetic Idioms
6.6 Floating Point Arithmetic
6.7 Converting Floating Point Expressions to Assembly Language
6.8 HLA Standard Library Support for Floating Point Arithmetic
6.9 Putting It All Together
Chapter 7: Low Level Control Structures
7.2 Low Level Control Structures
7.3 Statement Labels
7.4 Unconditional Transfer of Control (JMP)
7.5 The Conditional Jump Instructions
7.6 Medium Level Control Structures: JT and JF
7.7 Implementing Common Control Structures in Assembly Language
7.8 Introduction to Decisions
7.9 State Machines and Indirect Jumps
7.10 Spaghetti Code
7.11 Loops
7.12 Performance Improvements
7.13 Hybrid Control Structures in HLA
7.14 For More Information
Chapter 8: Files
8.2 File Organization
8.3 Sequential Files
8.4 Random Access Files
8.5 ISAM (Indexed Sequential Access Method) Files
8.6 Truncating a File
8.7 For More Information
Chapter 9: Advanced Arithmetic
9.2 Multiprecision Operations
9.3 Operating on Different-Sized Operands
9.4 Decimal Arithmetic
9.5 Tables
9.6 For More Information
Chapter 10: Macros and the HLA Compile Time Language
10.2 Introduction to the Compile Time Language (CTL)
10.3 The PRINT and ERROR Statements
10.4 Compile Time Constants and Variables
10.5 Compile Time Expressions and Operators
10.6 Compile Time Functions
10.7 Conditional Compilation (Compile Time Decisions)
10.8 Repetitive Compilation (Compile Time Loops)
10.9 Macros (Compile Time Procedures)
10.10 Writing Compile Time Programs
10.11 Using Macros in Different Source Files
10.12 For More Information
Chapter 11: BIT Manipulation
11.2 What Is Bit Data, Anyway?
11.3 Instructions That Manipulate Bits
11.4 The Carry Flag as a Bit Accumulator
11.5 Packing and Unpacking Bit Strings
11.6 Coalescing Bit Sets and Distributing Bit Strings
11.7 Packed Arrays of Bit Strings
11.8 Searching for a Bit
11.9 Counting Bits
11.10 Reversing a Bit String
11.11 Merging Bit Strings
11.12 Extracting Bit Strings
11.13 Searching for a Bit Pattern
11.14 The HLA Standard Library Bits Module
11.15 For More Information
Chapter 12: The String Instructions
12.2 The 80x86 String Instructions
12.3 Performance of the 80x86 String Instructions
12.4 For More Information
Chapter 13: The MMX Instruction Set
13.2 Determining Whether a CPU Supports the MMX Instruction Set
13.3 The MMX Programming Environment
13.4 The Purpose of the MMX Instruction Set
13.5 Saturation Arithmetic and Wrap-Around Mode
13.6 MMX Instruction Operands
13.7 MMX Technology Instructions
13.8 The MMX Programming Paradigm
13.9 For More Information
Chapter 14: Classes and Objects
14.2 General Principles
14.3 Classes in HLA
14.4 Objects
14.5 Inheritance
14.6 Overriding
14.7 Virtual Methods vs. Static Procedures
14.8 Writing Class Methods and Procedures
14.9 Object Implementation
14.10 Constructors and Object Initialization
14.11 Destructors
14.12 HLA s _initialize_ and _finalize_ Strings
14.13 Abstract Methods
14.14 Run-Time Type Information (RTTI)
14.15 Calling Base Class Methods
14.16 For More Information
Chapter 15: Mixed Language Programming
15.2 Mixing HLA and MASMGas Code in the Same Program
15.3 Programming in DelphiKylix and HLA
15.4 Programming in CC and HLA
15.5 For More Information
Appendix A: ASCII Character Set
Appendix B: The 80 86 Instruction Set
Index
Index_Numbers
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J-K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y
Index_Z
List of Figures
List of Tables
List of Listings
CD Content
The Art of Assembly Language
ISBN: 1593272073
EAN: 2147483647
Year: 2005
Pages: 246
Authors:
Randall Hyde
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
File System Information
Command-Line Values
Introduction
Encoding and Decoding Arbitrary Data Types
C.4. Some RPC Examples
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.2 Install SSH Windows Clients to Access Remote Machines Securely
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 3.3 Use WinSCP as a Graphical Replacement for FTP and RCP
Step 4.2 Passphrase Considerations
Step 5.2 Troubleshooting Common OpenSSH Errors/Problems
CISSP Exam Cram 2
SECURITY MODELS AND ARCHITECTURES
Policies, Procedures, Standards, Baselines, and Guidelines
Identification, Authentication, and Authorization
International Property Laws
Integrity and Authentication
High-Speed Signal Propagation[c] Advanced Black Magic
Slow-Wave Mode On-Chip
Going Nonlinear
Normalizing the Output of an FFT Routine
150-Ohm STP-A Cabling
Reducing Emissions
Image Processing with LabVIEW and IMAQ Vision
Charge-Coupled Devices
Line-Scan Cameras
Gray-Scale Operations
Shape Matching
Pattern Matching
SQL Hacks
Hack 3. Perform Conditional INSERTs
Hack 23. Second Tuesday of the Month
Organizing Data
Hack 61. Set Security Based on Rows
Hack 75. Minimize Bandwidth in One-to-Many Joins
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies