Related to Hardware

Raspberry Pi User Guide
by Gareth Halfacree

Make the most out of the world’s first truly compact computer
It's the size of a credit card, it can be charged like a smartphone, it runs on open-source Linux, and it holds the promise of bringing programming and playing to millions at low cost. And now you can learn how to use this amazing computer from its co-creator, Eben Upton, in Raspberry Pi User Guide. Cowritten with Gareth Halfacree, this guide gets you up and running on Raspberry Pi, whether you're an educator, hacker, hobbyist, or kid. Learn how to connect your Pi to other hardware, install software, write basic programs, and set it up to run robots, multimedia centers, and more.

Gets you up and running on Raspberry Pi, a high-tech computer the size of a credit card
Helps educators teach students how to program
Covers connecting Raspberry Pi to other hardware, such as monitors and keyboards, how to install software, and how to configure Raspberry Pi
Shows you how to set up Raspberry Pi as a simple productivity computer, write basic programs in Python, connect to servos and sensors, and drive a robot or multimedia center

Adults, kids, and devoted hardware hackers, now that you've got a Raspberry Pi, get the very most out of it with Raspberry Pi User Guide.

Adventures In Raspberry Pi
by Carrie Anne Philbin

Coding for kids is cool with Raspberry Pi and this elementary guideEven if your kids don't have an ounce of computer geek in them, they can learn to code with Raspberry Pi and this wonderful book. Written for 11- to 15-year-olds and assuming no prior computing knowledge, this book uses the wildly successful, low-cost, credit-card-sized Raspberry Pi computer to explain fundamental computing concepts. Young people will enjoy going through the book's nine fun projects while they learn basic programming and system administration skills, starting with the very basics of how to plug in the board and turn it on.
Each project includes a lively and informative video to reinforce the lessons. It's perfect for young, eager self-learners—your kids can jump in, set up their Raspberry Pi, and go through the lessons on their own.

Written by Carrie Anne Philbin, a high school teacher of computing who advises the U.K. government on the revised ICT Curriculum
Teaches 11- to 15-year-olds programming and system administration skills using Raspberry Pi
Features 9 fun projects accompanied by lively and helpful videos
Raspberry Pi is a $35/£25 credit-card-sized computer created by the non-profit Raspberry Pi Foundation; over a million have been sold

Help your children have fun and learn computing skills at the same time with Adventures in Raspberry Pi.

CWNA Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide (PW0-104 & PW0-204)
by Tom Carpenter

Get complete coverage of all the material included on the CWNA and CWSP exams inside this comprehensive resource. Written by a wireless systems expert, this authoritative guide covers exams PW0-104 and PW0-204 in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass these challenging exams with ease, this definitive volume also serves as an essential on-the-job reference. Covers all exam topics, including:

Wireless standards, organizations, and applications
Radio frequency
Wireless network antennas
Spread spectrum technologies
IEEE 802.11
Hardware, software, and client devices
Wireless network design and site surveys
Installing and administering WLANs
Performance tuning and troubleshooting
Wireless network attacks and threat analysis
Security policies
802.1X authentication solutions
Fast and secure roaming
Wireless intrusion monitoring and prevention

CD-ROM features:

Practice exams for PW0-104 & PW0-204
Video training segment
E-book

Designing the Internet of Things
by Adrian McEwen

Take your idea from concept to production with this unique guide
Whether it's called physical computing, ubiquitous computing, or the Internet of Things, it's a hot topic in technology: how to channel your inner Steve Jobs and successfully combine hardware, embedded software, web services, electronics, and cool design to create cutting-edge devices that are fun, interactive, and practical. If you'd like to create the next must-have product, this unique book is the perfect place to start.
Both a creative and practical primer, it explores the platforms you can use to develop hardware or software, discusses design concepts that will make your products eye-catching and appealing, and shows you ways to scale up from a single prototype to mass production.

Helps software engineers, web designers, product designers, and electronics engineers start designing products using the Internet-of-Things approach
Explains how to combine sensors, servos, robotics, Arduino chips, and more with various networks or the Internet, to create interactive, cutting-edge devices
Provides an overview of the necessary steps to take your idea from concept through production

If you'd like to design for the future, Designing the Internet of Things is a great place to start.

The Mythical Man-Month: Essays on Software Engineering, Anniversary Edition (2nd Edition)
by Frederick P. Brooks Jr.

Few books on software project management have been as influential and timeless as The Mythical Man-Month. With a blend of software engineering facts and thought-provoking opinions, Fred Brooks offers insight for anyone managing complex projects. These essays draw from his experience as project manager for the IBM System/360 computer family and then for OS/360, its massive software system. Now, 20 years after the initial publication of his book, Brooks has revisited his original ideas and added new thoughts and advice, both for readers already familiar with his work and for readers discovering it for the first time.   The added chapters contain (1) a crisp condensation of all the propositions asserted in the original book, including Brooks' central argument in The Mythical Man-Month: that large programming projects suffer management problems different from small ones due to the division of labor; that the conceptual integrity of the product is therefore critical; and that it is difficult but possible to achieve this unity; (2) Brooks' view of these propositions a generation later; (3) a reprint of his classic 1986 paper "No Silver Bullet"; and (4) today's thoughts on the 1986 assertion, "There will be no silver bullet within ten years."

Cisco ISE for BYOD and Secure Unified Access
by Jamey Heary

Plan and deploy identity-based secure access for BYOD and borderless networks   Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting.   Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you’ll walk through identifying users, devices, and security posture; gain a deep understanding of Cisco’s Secure Unified Access solution; and master powerful techniques for securing borderless networks, from device isolation to protocol-independent network segmentation.   You’ll find in-depth coverage of all relevant technologies and techniques, including 802.1X, profiling, device onboarding, guest lifecycle management, network admission control, RADIUS, and Security Group Access. Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors present detailed sample configurations to help you plan your own integrated identity solution. Whether you’re a technical professional or an IT manager, this guide will help you provide reliable secure access for BYOD, CYOD (Choose Your Own Device), or any IT model you choose.  
Review the new security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT Understand the building blocks of an Identity Services Engine (ISE) solution Design an ISE-Enabled network, plan/distribute ISE functions, and prepare for rollout Build context-aware security policies Configure device profiling, endpoint posture assessments, and guest services Implement secure guest lifecycle management, from WebAuth to sponsored guest access Configure ISE, network access devices, and supplicants, step-by-step Walk through a phased deployment that ensures zero downtime Apply best practices to avoid the pitfalls of BYOD secure access Simplify administration with self-service onboarding and registration Deploy Security Group Access, Cisco’s tagging enforcement solution Add Layer 2 encryption to secure traffic flows Use Network Edge Access Topology to extend secure access beyond the wiring closet Monitor, maintain, and troubleshoot ISE and your entire Secure Unified Access system
 

CCNA Routing and Switching Portable Command Guide (3rd Edition)
by Scott Empson

Here are all the CCNA-level Routing and Switching commands you need in one condensed, portable resource. The CCNA Routing and Switching Portable Command Guide, Third Edition, is filled with valuable, easy-to-access information and is portable enough for use whether you’re in the server room or the equipment closet.   The guide summarizes all CCNA certification-level Cisco IOS® Software commands, keywords, command arguments, and associated prompts, providing you with tips and examples of how to apply the commands to real-world scenarios. Configuration examples throughout the book provide you with a better understanding of how these commands are used in simple network designs.   This book has been completely updated to cover topics in the ICND1 100-101, ICND2 200-101, and CCNA 200-120 exams. Use this quick reference resource to help you memorize commands and concepts as you work to pass the CCNA Routing and Switching certification exam.   The book is organized into these parts: • Part I TCP/IP v4 • Part II Introduction to Cisco Devices • Part III Configuring a Router • Part IV Routing • Part V Switching • Part VI Layer 3 Redundancy • Part VII IPv6 • Part VIII Network Administration and Troubleshooting • Part IX Managing IP Services • Part X WANs • Part XI Network Security  
Quick, offline access to all CCNA Routing and Switching commands for research and solutions Logical how-to topic groupings for a one-stop resource Great for review before CCNA Routing and Switching certification exams Compact size makes it easy to carry with you, wherever you go “Create Your Own Journal” section with blank, lined pages allows you to personalize the book for your needs “What Do You Want to Do?” chart inside back cover helps you to quickly reference specific tasks
   

CUDA Handbook: A Comprehensive Guide to GPU Programming, The
by Nicholas Wilt

  The CUDA Handbook begins where CUDA by Example (Addison-Wesley, 2011) leaves off, discussing CUDA hardware and software in greater detail and covering both CUDA 5.0 and Kepler. Every CUDA developer, from the casual to the most sophisticated, will find something here of interest and immediate usefulness. Newer CUDA developers will see how the hardware processes commands and how the driver checks progress; more experienced CUDA developers will appreciate the expert coverage of topics such as the driver API and context migration, as well as the guidance on how best to structure CPU/GPU data interchange and synchronization.   The accompanying open source code–more than 25,000 lines of it, freely available at www.cudahandbook.com–is specifically intended to be reused and repurposed by developers.   Designed to be both a comprehensive reference and a practical cookbook, the text is divided into the following three parts: Part I, Overview, gives high-level descriptions of the hardware and software that make CUDA possible.
Part II, Details, provides thorough descriptions of every aspect of CUDA, including

 Memory Streams and events  Models of execution, including the dynamic parallelism feature, new with CUDA 5.0 and SM 3.5 The streaming multiprocessors, including descriptions of all features through SM 3.5 Programming multiple GPUs Texturing
The source code accompanying Part II is presented as reusable microbenchmarks and microdemos, designed to expose specific hardware characteristics or highlight specific use cases.

Part III, Select Applications, details specific families of CUDA applications and key parallel algorithms, including
 Streaming workloads

Reduction Parallel prefix sum (Scan)

N-body Image Processing These algorithms cover the full range of potential CUDA applications.  

Raspberry Pi Projects
by Mike Cook

Learn to build software and hardware projects featuring the Raspberry Pi!
Raspberry Pi represents a new generation of computers that encourages the user to play and to learn and this unique book is aimed at the beginner Raspberry Pi user who is eager to get started creating real-world projects. Taking you on a journey of creating 15 practical projects, this fun and informative resource introduces you to the skills you need to have in order to make the most of the Pi. The book begins with a quick look at how to get the Pi up and running and then encourages you to dive into the array of exciting software and hardware projects.

Features projects that use Python, which is Raspberry Pi's programming language of choice
Includes projects for creating an information center for e-mail, Twitter, Facebook, weather, train times, and more
Shows you how to recreate Pong and Pacman or write Tic Tac Toe
Teaches you how to use Raspberry Pi's general purpose input/output port in order to speak to external hardware devices
Walks you through setting up computer-controlled slot car racing, a swipe card door lock, disco lights, and more

Raspberry Pi Projects is an excellent way to dig deeper into the capabilities of the Pi and to have great fun while doing it.