Atnaujinkite slapukų nuostatas

El. knyga: Joe Grand's Best of Hardware, Wireless, and Game Console Hacking

(co-director of the Strategic Technologies And Research (STAR) Center, San Diego State University, ), , , (President and CEO of Grand Idea Studio, CA, U.S.A.), (Owner, Blackthorn Systems, New Hampshire, USA), , , , (Austin Systems, Texas, U.S.A.),
  • Formatas: PDF+DRM
  • Išleidimo metai: 18-Aug-2006
  • Leidėjas: Syngress Media,U.S.
  • Kalba: eng
  • ISBN-13: 9780080509662
Kitos knygos pagal šią temą:
  • Formatas: PDF+DRM
  • Išleidimo metai: 18-Aug-2006
  • Leidėjas: Syngress Media,U.S.
  • Kalba: eng
  • ISBN-13: 9780080509662
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

The book introduces the principles of hardware design and describes the tools and techniques required to begin hacking. The DVD contains hack instructions for over 20 game consoles and hardware devices from Nintendo, Apple, Sony, Microsoft, Palm and more.

The presentation of these 20 projects on DVD media provides users with benefits and options not available on the printed page. All images are hi-res color that can be enlarged or printed, the text is easily searched, and the user can copy the contents to their hard disk and add comments directly into the PDF files. The DVD media also lends itself well to group projects (it includes a 10 user license). The 160-page book includes chapters on hacking tools and electrical engineering basics, along with chapters on the background, design and functionality of each hardware device.
Introduction 2.0 xiii
Introduction xiv
Tools of the Warranty-Voiding Trade
1(16)
Introduction
2(1)
The Essential Tools
3(3)
Basic Hardware Hacking
6(5)
Advanced Projects and Reverse Engineering
11(3)
Where to Obtain the Tools
14(3)
Electrical Engineering Basics
17(32)
Introduction
18(1)
Fundamentals
18(9)
Bits, Bytes, and Nibbles
18(4)
Reading Schematics
22(2)
Voltage, Current, and Resistance
24(1)
Direct Current and Resistance
25(1)
Resistance
26(1)
Ohm's Law
26(1)
Basic Device Theory
27(11)
Resistors
27(2)
Capacitors
29(3)
Diodes
32(2)
Transistors
34(2)
Integrated Circuits
36(2)
Microprocessors and Embedded Systems
38(1)
Soldering Techniques
39(6)
Hands--On Example: Soldering a Resistor to a Circuit Board
39(2)
Desoldering Tips
41(1)
Hands-On Example: SMD Removal Using ChipQuik
42(3)
Common Engineering Mistakes
45(1)
Web Links and Other Resources
46(3)
General Electrical Engineering Books
46(1)
Electrical Engineering Web Sites
47(1)
Data Sheets and Component Information
47(1)
Major Electronic Component and Parts Distributors
48(1)
Obsolete and Hard-to-Find Component Distributors
48(1)
Operating Systems Overview
49(20)
Introduction
50(1)
OS Basics
50(7)
Memory
51(1)
Physical Memory
51(1)
Virtual Memory
52(1)
File Systems
53(2)
Cache
55(1)
Input/Output
55(1)
Processes
55(1)
System Calls
56(1)
Shells, User Interfaces, and GUIs
56(1)
Device Drivers
57(4)
Block and Character Devices
59(2)
Properties of Embedded Operating Systems
61(1)
Linux/UNIX
62(3)
Open Source
62(1)
History
63(1)
Embedded Linux (uCLinux)
64(1)
Product Examples: Linux on Embedded Systems
64(1)
VxWorks
65(1)
Windows Embedded
65(3)
Concepts
66(1)
Product Examples: Windows CE on Embedded Systems
67(1)
Summary
68(1)
Additional Reading
68(1)
Coding 101
69
Introduction
70
Programming Concepts
70
Assignment
71
Control Structures
72
Looping
73
Conditional Branching
74
Unconditional Branching
75
Storage Structures
76
Structures
77
Arrays
78
Hash Tables
79
Linked Lists
80
Readability
82
Comments
82
Function and Variable Names
82
White Space
83
Introduction to C
84
History and Basics of C
84
Printing to the Screen
84
Data Types in C
87
Mathematical Functions
87
Control Structures
90
For Loops
90
While Loops
92
If/Else
93
Switch
94
Storage Structures
95
Arrays, Pointers, and Character Strings
95
Structures
100
Function Calls and Variable Passing
101
System Calls and Hardware Access
102
Summary
103
Debugging
103
Debugging Tools
103
The printf Method
104
Introduction to Assembly Language
106
Components of an Assembly Language Statement
107
Labels
107
Operations
109
Operands
109
Sample Program
110
Summary
112
Additional Reading
112


Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion. In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."