Back to Library
Learning Assembly Language: What's Really Happening Inside the Machine
What's Really Happening Inside the Machine
299
Pages
64
Chapters
10
Parts
Free
Always
Start Reading
About This Book
Table of Contents
Front Matter
1.
Preface
2.
How to Use This Book
3.
Prerequisites
4.
Acknowledgments
Part I: The Machine Model
1.
Part I: The Machine Model
2.
Chapter 1: Why Assembly Language?
3.
Chapter 2: Numbers in the Machine
4.
Chapter 3: The x86-64 Architecture
5.
Chapter 4: Memory
6.
Chapter 5: Your Development Environment
7.
Chapter 6: The NASM Assembler
8.
Chapter 7: Your First Assembly Programs
Part II: x86-64 Instruction Set
1.
Part II: The x86-64 Instruction Set
2.
Chapter 8: Data Movement and Addressing Modes
3.
Chapter 9: Arithmetic and Logic
4.
Chapter 10: Control Flow
5.
Chapter 11: The Stack and Function Calls
6.
Chapter 12: Arrays, Strings, and Data Structures
7.
Chapter 13: Bit Manipulation
8.
Chapter 14: Floating Point
9.
Chapter 15: SIMD Programming
Part III: ARM64 Assembly
1.
Part III: ARM64 Assembly
2.
Chapter 16: ARM64 Architecture
3.
Chapter 17: ARM64 Instruction Set
4.
Chapter 18: ARM64 Programming
5.
Chapter 19: x86-64 vs. ARM64 Comparison
Part IV: Assembly–C Interface
1.
Part IV: The Assembly-C Interface
2.
Chapter 20: Calling C from Assembly and Assembly from C
3.
Chapter 21: Understanding Compiler Output
4.
Chapter 22: Inline Assembly
5.
Chapter 23: Linking, Loading, and ELF
6.
Chapter 24: Dynamic Linking in Depth
Part V: Systems Programming
1.
Part V: Systems Programming
2.
Chapter 25: System Calls
3.
Chapter 26: Interrupts, Exceptions, and Kernel Mode
4.
Chapter 27: Memory Management
5.
Chapter 28: Bare Metal Programming
6.
Chapter 29: Device I/O
7.
Chapter 30: Concurrency at the Hardware Level
Part VI: Performance and Microarchitecture
1.
Part VI: Performance and Microarchitecture
2.
Chapter 31: The Modern CPU Pipeline
3.
Chapter 32: The Memory Hierarchy
Part VII: Security and Reverse Engineering
1.
Part VII: Security and Reverse Engineering
2.
Chapter 34: Reverse Engineering
3.
Chapter 35: Buffer Overflows and Memory Corruption
4.
Chapter 36: Exploit Mitigations
5.
Chapter 37: Return-Oriented Programming and Modern Exploitation
Part VIII: Capstone and Beyond
1.
Part VIII: Capstone and Beyond
2.
Chapter 38: Capstone — A Minimal OS Kernel
3.
Chapter 39: Beyond Assembly
4.
Chapter 40: Your Assembly Future
Appendices
1.
Appendix A: Glossary
2.
Appendix B: Answers to Selected Exercises and Quiz Questions
3.
Appendix C: Bibliography
4.
Appendix D: x86-64 Instruction Quick Reference
5.
Appendix E: ARM64 (AArch64) Instruction Quick Reference
6.
Appendix F: Linux System Call Tables
7.
Appendix G: GDB Command Reference
8.
Appendix H: Calling Conventions Reference
9.
Appendix I: NASM Directives and Preprocessor Reference
10.
Appendix J: Security and Analysis Tools Reference
11.
Appendix K: ASCII, Encoding, and Number Reference
12.
Appendix L: Performance Counters and Measurement Reference
13.
Appendix M: Resources and Communities
Share This Book
Twitter
Reddit
LinkedIn
Copy Link
We use cookies to improve your experience and show relevant ads.
Privacy Policy
Essential Only
Accept All