SQL Server Hardware


Book Description

SQL Server Hardware will provide the fundamental knowledge and resources you need to make intelligent decisions about choice, and optimal installation and configuration, of SQL Server hardware, operating system and the SQL Server RDBMS.




The Hardware Hacker


Book Description

For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop Novena and his mentorship of various hardware startups and developers. In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective. Huang’s journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs. Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices between China and the United States, bunnie weaves engineering, law, and society into the tapestry of open hardware. With highly detailed passages on the ins and outs of manufacturing and a comprehensive take on the issues associated with open source hardware, The Hardware Hacker is an invaluable resource for aspiring hackers and makers.




Let's Go to the Hardware Store


Book Description

When the new house needs fixing up, it's off to the hardware store to find the tools and materials needed to get the job done—a hammer, a screwdriver, a shiny tape measure, and even a stepladder. This family outing explores a familiar errand that fascinates plenty of young children: the hardware store. Anne Rockwell's perfectly pitched story and Melissa Iwai's child-friendly illustrations make this book ideal for the preschool audience.




Code


Book Description

The classic guide to how computers work, updated with new chapters and interactive graphics "For me, Code was a revelation. It was the first book about programming that spoke to me. It started with a story, and it built up, layer by layer, analogy by analogy, until I understood not just the Code, but the System. Code is a book that is as much about Systems Thinking and abstractions as it is about code and programming. Code teaches us how many unseen layers there are between the computer systems that we as users look at every day and the magical silicon rocks that we infused with lightning and taught to think." - Scott Hanselman, Partner Program Director, Microsoft, and host of Hanselminutes Computers are everywhere, most obviously in our laptops and smartphones, but also our cars, televisions, microwave ovens, alarm clocks, robot vacuum cleaners, and other smart appliances. Have you ever wondered what goes on inside these devices to make our lives easier but occasionally more infuriating? For more than 20 years, readers have delighted in Charles Petzold's illuminating story of the secret inner life of computers, and now he has revised it for this new age of computing. Cleverly illustrated and easy to understand, this is the book that cracks the mystery. You'll discover what flashlights, black cats, seesaws, and the ride of Paul Revere can teach you about computing, and how human ingenuity and our compulsion to communicate have shaped every electronic device we use. This new expanded edition explores more deeply the bit-by-bit and gate-by-gate construction of the heart of every smart device, the central processing unit that combines the simplest of basic operations to perform the most complex of feats. Petzold's companion website, CodeHiddenLanguage.com, uses animated graphics of key circuits in the book to make computers even easier to comprehend. In addition to substantially revised and updated content, new chapters include: Chapter 18: Let's Build a Clock! Chapter 21: The Arithmetic Logic Unit Chapter 22: Registers and Busses Chapter 23: CPU Control Signals Chapter 24: Jumps, Loops, and Calls Chapter 28: The World Brain From the simple ticking of clocks to the worldwide hum of the internet, Code reveals the essence of the digital revolution.




The Hardware Startup


Book Description

Thanks to the decreasing cost of prototyping, it's more feasible for professional makers and first-time entrepreneurs to launch a hardware startup. But exactly how do you go about it? This book provides the roadmap and best practices you need for turning a product idea into a full-fledged business. Written by three experts from the field, The Hardware Startup takes you from idea validation to launch, complete with practical strategies for funding, market research, branding, prototyping, manufacturing, and distribution. Two dozen case studies of real-world startups illustrate possible successes and failures at every stage of the process. Validate your idea by learning the needs of potential users Develop branding, marketing, and sales strategies early on Form relationships with the right investment partners Prototype early and often to ensure you're on the right path Understand processes and pitfalls of manufacturing at scale Jumpstart your business with the help of an accelerator Learn strategies for pricing, marketing, and distribution Be aware of the legal issues your new company may face




The Hardware Hacking Handbook


Book Description

The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you’ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you’ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony’s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab – like a multimeter and an oscilloscope – with options for every type of budget. You’ll learn: How to model security threats, using attacker profiles, assets, objectives, and countermeasures Electrical basics that will help you understand communication interfaces, signaling, and measurement How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips How to use timing and power analysis attacks to extract passwords and cryptographic keys Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization Whether you’re an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource – one you’ll always want to have onhand.




Airborne Electronic Hardware Design Assurance


Book Description

Written by a Federal Aviation Administration (FAA) consultant designated engineering representative (DER) and an electronics hardware design engineer who together taught the DO-254 class at the Radio Technical Commission for Aeronautics, Inc. (RTCA) in Washington, District of Columbia, USA, Airborne Electronic Hardware Design Assurance: A Practitioner's Guide to RTCA/DO-254 is a testimony to the lessons learned and wisdom gained from many years of first-hand experience in the design, verification, and approval of airborne electronic hardware. This practical guide to the use of RTCA/DO-254 in the development of airborne electronic hardware for safety critical airborne applications: Describes how to optimize engineering processes and practices to harmonize with DO-254 Addresses the single most problematic aspect of engineering and compliance to DO-254—poorly written requirements Includes a tutorial on how to write requirements that will minimize the cost and effort of electronic design and verification Discusses the common pitfalls encountered by practitioners of DO-254, along with how those pitfalls occur and what can be done about them Settles the ongoing debate and misconceptions about the true definition of a derived requirement Promotes embracing DO-254 as the best means to achieve compliance to it, as well as the best path to high-quality electronic hardware Airborne Electronic Hardware Design Assurance: A Practitioner's Guide to RTCA/DO-254 offers real-world insight into RTCA/DO-254 and how its objectives can be satisfied. It provides engineers with valuable information that can be applied to any project to make compliance to DO-254 as easy and problem-free as possible.




Building Open Source Hardware


Book Description

This is the first hands-on guide to the entire process of designing and manufacturing open source hardware. Drawing on extensive personal experience with DIY, maker, and hardware hacking projects, industry-leading contributors share proven approaches to design, remixing, fabrication, manufacturing, troubleshooting, licensing, documentation, and running an open source hardware business. Part I covers the emergence and evolution of open source hardware, what open source hardware licenses mean, and the growing role of standards in making hardware more open. Part II offers contributors' expert advice on key tasks, ranging from creating derivatives to using source files. Part III turns to production, showing how to manufacture at multiple scales-from personal to commercial. Appendixes provide valuable checklists for design, manufacture, security, and documentation. And to foster even more hands-on learning and experimentation, the low-cost Blinky Buildings open source hardware kit is used as an example throughout. Learn how to Get involved in the open source hardware community-its history and values Develop designs you can successfully prototype and manufacture Walk step by step through making derivatives from existing projects Build open source 3D printers, and remix 3D printable objects Create open source wearables Work with diverse source files, from electronics to other physical materials Fabricate your own designs Move from prototype to commercial manufacturing, and troubleshoot problems Choose a business model and build a profitable open source hardware company Avoid pitfalls associated with trademarks, copyrights, patents, and licensing Write documentation other hardware hackers can use Use open source hardware in education, helping students learn without boundaries




Hardware (1993-1997) #2


Book Description

Reprise, the super-powered "collective" hit man, tries to take Hardware apart. And even Hardware can't exhaust the myriad armed thugs that Reprise can generate. Written by Dwayne McDuffie, with art and cover by Denys Cowan and Jimmy Palmiotti




The Art of Hardware Architecture


Book Description

This book highlights the complex issues, tasks and skills that must be mastered by an IP designer, in order to design an optimized and robust digital circuit to solve a problem. The techniques and methodologies described can serve as a bridge between specifications that are known to the designer and RTL code that is final outcome, reducing significantly the time it takes to convert initial ideas and concepts into right-first-time silicon. Coverage focuses on real problems rather than theoretical concepts, with an emphasis on design techniques across various aspects of chip-design.