Main Memory

How Computers Work: Processor And Main Memory (Second Edition)  eBooks & eLearning

Posted by lengen at Jan. 24, 2017
How Computers Work: Processor And Main Memory (Second Edition)

How Computers Work: Processor And Main Memory (Second Edition) by Roger Young
English | Apr. 17, 2009 | ISBN: 1442113987 | 158 Pages | PDF | 1 MB

Computers are the most complex machines that have ever been created. This book will tell you how they work, and no technical knowledge is required. It explains in great detail the operation of a simple but functional computer. Although transistors are mentioned, relays are used in the example circuitry for simplicity.

How Computers Work: Processor and Main Memory  eBooks & eLearning

Posted by tot167 at May 27, 2008
How Computers Work: Processor and Main Memory

Roger Young “How Computers Work: Processor and Main Memory"
1st Books Library | 2002-08-01 | ISBN: 1403325820 | 152 pages | PDF | 1,1 Mb

In Memory Data Management and Analysis [Repost]  eBooks & eLearning

Posted by tanas.olesya at Dec. 14, 2017
In Memory Data Management and Analysis [Repost]

In Memory Data Management and Analysis (Lecture Notes in Computer Science) by Arun Jagatheesan
English | 23 Jan. 2015 | ISBN: 3319139592 | 160 Pages | PDF | 7 MB

A Primer on Compression in the Memory Hierarchy  eBooks & eLearning

Posted by readerXXI at Aug. 8, 2017
A Primer on Compression in the Memory Hierarchy

A Primer on Compression in the Memory Hierarchy
by Somayeh Sardashti and Angelos Arelakis
English | 2016 | ISBN: 1627054154 | 87 Pages | PDF | 1.5 MB

In Memory Data Management and Analysis  eBooks & eLearning

Posted by step778 at May 24, 2017
In Memory Data Management and Analysis

Arun Jagatheesan, Justin Levandoski, Thomas Neumann, "In Memory Data Management and Analysis"
2015 | pages: 157 | ISBN: 3319139592 | PDF | 7,9 mb

Detecting Peripheral-based Attacks on the Host Memory (repost)  eBooks & eLearning

Posted by libr at April 17, 2015
Detecting Peripheral-based Attacks on the Host Memory (repost)

Detecting Peripheral-based Attacks on the Host Memory (T-Labs Series in Telecommunication Services) by Patrick Stewin
English | 2014 | ISBN: 3319135147, 3319135163 | 108 pages | PDF | 7 MB

Detecting Peripheral-based Attacks on the Host Memory  eBooks & eLearning

Posted by interes at Feb. 19, 2015
Detecting Peripheral-based Attacks on the Host Memory

Detecting Peripheral-based Attacks on the Host Memory (T-Labs Series in Telecommunication Services) by Patrick Stewin
English | 2014 | ISBN: 3319135147, 3319135163 | 108 pages | PDF | 7 MB

iCare SD Memory Card Recovery 1.1.4 Portable  Software

Posted by melt_ at May 22, 2018
iCare SD Memory Card Recovery 1.1.4 Portable

iCare SD Memory Card Recovery 1.1.4 Portable | 4.7 Mb

You can easily lose files on a variety of storage devices, and it doesn’t have to be your fault entirely. Drives can become corrupt, or items may have been deleted by mistake. Regardless of the case, iCare SD Memory Card Recovery can help you bring them back from damaged USB flash drives and SD memory cards.

iCare SD Memory Card Recovery 1.1.4  Software

Posted by speedzodiac_ at May 22, 2018
iCare SD Memory Card Recovery 1.1.4

iCare SD Memory Card Recovery 1.1.4 | 4.2 Mb

You can easily lose files on a variety of storage devices, and it doesn’t have to be your fault entirely. Drives can become corrupt, or items may have been deleted by mistake. Regardless of the case, iCare SD Memory Card Recovery can help you bring them back from damaged USB flash drives and SD memory cards.

iCare SD Memory Card Recovery 1.1.3.0 Portable  Software

Posted by melt_ at April 26, 2018
iCare SD Memory Card Recovery 1.1.3.0 Portable

iCare SD Memory Card Recovery 1.1.3.0 Portable | 4.7 Mb

You can easily lose files on a variety of storage devices, and it doesn’t have to be your fault entirely. Drives can become corrupt, or items may have been deleted by mistake. Regardless of the case, iCare SD Memory Card Recovery can help you bring them back from damaged USB flash drives and SD memory cards.