The ZX Spectrum on Your PC


Book Description

Thirty years on from its original release, the best selling Sinclair ZX Spectrum is now one of the most emulated computers in the world. Far from dead and forgotten, a thriving community of enthusiasts has kept the spirit of this little machine alive through an enormous range of emulators for just about every modern computer platform there is. For the PC in particular, the complexity of these emulators is simply amazing. Focusing primarily on the two most user-friendly Windows emulators, Spectaculator and ZX SPIN, The ZX Spectrum on Your PC explains all the main features of these applications. Illustrated walk-throughs will teach you everything from how cassettes are emulated to how to print from your virtual Spectrum. In no time at all, you'll find yourself enjoying all the old games and activities of your youth... on your PC! New revised Second Edition includes emulating the Spectrum on your mobile device.




The ZX Spectrum ULA


Book Description

This book takes the reader through the design and implementation of the Sinclair ZX Spectrum's custom chip, revealing for the first time the decisions behind its design and its hidden secrets. By using it as case study, the techniques required to design an 8-bit microcomputer are explained, along with comprehensive details of the Ferranti ULA manufacturing process. If you have ever wanted to design your own computer or wondered what was behind the most successful microcomputer of the 1980s, then this is the book for you. For the first time, the inner working of the Sinclair ZX Spectrum's custom chip and heart of the computer, the Ferranti ULA, is exposed in minute detail. Packed with over 140 illustrations and circuit diagrams, this book takes the reader through the cutting edge technology that was the Ferranti ULA and the design of the ZX Spectrum home computer, illustrating the principles and techniques involved in creating a cost effective computer that required nothing more than a television set and a cassette recorder. The ZX Spectrum ULA is an essential read for the electronics hobbyist, student or electronic engineer wishing to design their own retro-style microcomputer or anyone with an interest in historical micro-electronic and digital design. All topics are explained in simple yet precise terms, building on their careful introduction towards the full functionality presented by the Sinclair computer. Some of the topics covered are: The architecture of the standard microcomputer, Ferranti and their ULA, manufacturing process and structure, The functional layout of the ZX Spectrum ULA, Video display generation, Memory contention and timing, ZX Spectrum design bugs such as "The Snow Effect," Hidden features, ULA version differences.







The Car Hacker's Handbook


Book Description

Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven’t kept pace with today’s more hostile security environment, leaving millions vulnerable to attack. The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. Then, once you have an understanding of a vehicle’s communication network, you’ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker’s Handbook will show you how to: –Build an accurate threat model for your vehicle –Reverse engineer the CAN bus to fake engine signals –Exploit vulnerabilities in diagnostic and data-logging systems –Hack the ECU and other firmware and embedded systems –Feed exploits through infotainment and vehicle-to-vehicle communication systems –Override factory settings with performance-tuning techniques –Build physical and virtual test benches to try out exploits safely If you’re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker’s Handbook your first stop.




The Gun Digest Book of Firearms Assembly/disassembly


Book Description

This six-part series starts with field stripping basics, thoroughly explains all takedown components, and finishes with reassemble instructions for hundreds of popular firearms. Clear photos and easy to understand text, guides you every step along the way. Author J.B. Wood has revised and expanded the first five parts of the series so each includes hundred of variants. More than 3,500 pages of hands-on information you need to increase accuracy and speed.




The IDA Pro Book, 2nd Edition


Book Description

No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use. Hailed by the creator of IDA Pro as "profound, comprehensive, and accurate," the second edition of The IDA Pro Book covers everything from the very first steps to advanced automation techniques. You'll find complete coverage of IDA's new Qt-based user interface, as well as increased coverage of the IDA debugger, the Bochs debugger, and IDA scripting (especially using IDAPython). But because humans are still smarter than computers, you'll even learn how to use IDA's latest interactive and scriptable interfaces to your advantage. Save time and effort as you learn to: –Navigate, comment, and modify disassembly –Identify known library routines, so you can focus your analysis on other areas of the code –Use code graphing to quickly make sense of cross references and function calls –Extend IDA to support new processors and filetypes using the SDK –Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more –Use IDA's built-in debugger to tackle hostile and obfuscated code Whether you're analyzing malware, conducting vulnerability research, or reverse engineering software, a mastery of IDA is crucial to your success. Take your skills to the next level with this 2nd edition of The IDA Pro Book.




Out Of Control


Book Description

Out of Control chronicles the dawn of a new era in which the machines and systems that drive our economy are so complex and autonomous as to be indistinguishable from living things.




The ZX Spectrum Explored


Book Description




Area, Lattice Points, and Exponential Sums


Book Description

In analytic number theory a large number of problems can be "reduced" to problems involving the estimation of exponential sums in one or several variables. This book is a thorough treatment of the developments arising from the method developed by Bombieri and Iwaniec in 1986 for estimating the Riemann zeta function on the line *s = 1/2. Huxley and his coworkers (mostly Huxley) have taken this method and vastly extended and improved it. The powerful techniques presented here go considerably beyond older methods for estimating exponential sums such as van de Corput's method. The potential for the method is far from being exhausted, and there is considerable motivation for other researchers to try to master this subject. However, anyone currently trying to learn all of this material has the formidable task of wading through numerous papers in the literature. This book simplifies that task by presenting all of the relevant literature and a good part of the background in one package. The audience for the book will be mathematics graduate students and faculties with a research interest in analytic theory; more specifically, those with an interest in exponential sum methods. The book is self-contained; any graduate student with a one semester course in analytic number theory should have a more than sufficient background.