September 2017
Beginner to intermediate
290 pages
6h 58m
English
The idea behind this example is widely used and well known-a simple, not to say primitive, virtual machine. Imagine a situation where we have to implement a virtual machine that performs trivial string encryption with an XOR operation using a single byte key.
Read now
Unlock full access