目前无货。
欢迎选购其他类似产品。
前翻 后翻
正在播放... 已暂停   您正在聆听的 Audible 音频版本的样品。
了解更多信息
查看全部 2 张图片

Embedded Software for the IoT 平装 – 2018年12月3日

| 天天低价·正品质优
|
分享
广告

显示所有 格式和版本 隐藏其他格式和版本
亚马逊价格
全新品最低价 非全新品最低价
平装, 2018年12月3日
 

click to open popover

无需Kindle设备,下载免费Kindle阅读软件,即可在您的手机、电脑及平板电脑上畅享阅读。

  • 点击此处下载Kindle iOS阅读软件
    iPhone/iPad/Mac
  • 点击此处下载Kindle Android阅读软件
    Android手机或平板电脑

请输入您的手机号码,获取Kindle阅读软件的下载链接。

kcpAppSendButton


基本信息

  • 出版社: De Gruyter; 3 (2018年12月3日)
  • 平装: 294页
  • 语种: 英语
  • ISBN: 1547417153
  • 条形码: 9781547417155
  • 商品尺寸: 17 x 1.7 x 24 cm
  • 商品重量: 567 g
  • ASIN: 1547417153
  • 用户评分: 分享我的评价
  • 您想告诉我们您发现了更低的价格?

商品描述

作者简介

Klaus Elk graduated as Master of Science (Electronics) in 1984, with a thesis on "Time-Delay Spectrometry"-a Digital Signal Project. Two years later he graduated with a Bachelor of Economics (Marketing). He has since then worked mainly with telecommunications, medical electronics and sound and vibration in private industry. In parallel with this work, he taught courses at the Danish Technical University including courses in object oriented programming and the internet protocol stack. Recently he earned a "Mini MBA," and in the following year took a "Board-Member Masterclass." Today Elk works at Bruel & Kjaer Sound & Vibration as R&D Manager of Instrumentation.

目录

Introduction 1.1 The Tale of the Internet1.2 The Cloud1.3 Internet of Things1.4 IoT related terms I The Basic System 2 How to select an OS? 2.1 No OS and strictly polling2.2 Co-routines2.3 Interrupts2.4 A small real-time kernel2.5 A non-preemptive Operating System2.6 Full OS2.7 Open Source, GNU licensing and Linux2.8 OS constructs2.9 Further Reading 3 Which CPU to use? 3.1 Overview3.2 CPU Core3.3 CPU Architecture3.4 Word-Size3.5 MMU - Memory Managed Unit3.6 RAM3.7 Cache3.8 EEPROM and Flash3.9 FPU - Floating Point Unit3.10 DSP3.11 Crypto-Engine3.12 Upgrade Path3.13 Second Sources3.14 Price3.15 Export Control3.16 RoHS-Compliance3.17 Evaluation Boards3.18 Tool-chain3.19 Benchmarking3.20 Power-Consumption3.21 JTAG Debugger3.22 Peripherals3.23 Make or Buy3.24 Further Reading 4 Software Architecture 4.1 Design for Performance4.2 The fear of the white paper4.3 Layers4.4 Not just API's - more files4.5 Object Model (Containment Hierarchy)4.6 Case: CANOpen4.7 Message Passing4.8 Middleware4.9 Case: Architectural Reuse in LAN-XI4.10 Understanding C4.11 Further Reading 5 Debug Tools 5.1 Simulator5.2 ICE - In-Circuit-Emulator5.3 Background or JTAG debugger5.4 Target Stand-In5.5 Debugger5.6 strace5.7 Debugging without special tools5.8 Monitoring Messages5.9 Test Traffic 6 Code Maintenance 6.1 Poor Man's Backup6.2 Version Control - and git6.3 Build and Virtualization6.4 Static Code Analysis6.5 Inspections6.6 Tracking Defects & Features6.7 Whiteboard6.8 Documentation6.9 Yocto6.10 OpenWRT6.11 Further Reading III IoT Technologies 7 Networks 7.1 Introduction7.2 Cerf & Kahn - internet as net of nets7.3 Life of a packet7.4 Life before the packet7.5 Getting an IP address7.6 DHCP7.7 Network Masks, CIDR and Special Ranges7.8 Reserved IP-Ranges7.9 DNS7.10 Introducing HTTP7.11 REST7.12 TCP sockets on IPv4 under Windows7.13 IP Fragmentation7.14 Introducing IPv6 addresses7.15 TCP sockets on IPv6 under Linux7.16 Data Transmission 7.17 UDP Sockets7.18 A case of UDP on IPv67.19 Application Layer Protocols7.20 Alternatives to the socket API7.21 Ethernet Cabling7.22 Physical Layer Problems7.23 Further Reading 8 Network Tools 8.1 The Switch as a Tool8.1.1 Mirroring8.1.2 Statistics8.1.3 Simulating lost frames8.1.4 Pause frames8.2 Tap8.3 DHCP Server8.4 IP scanner8.5 SNMP8.6 Wireshark8.7 Network Commands8.8 Further Reading 9 Wireless Networks 9.1 Introduction9.2 Wi-Fi Basics9.3 The Access Point as a Repeater9.4 How is speed calculated?9.5 Case: Wi-Fi Data-transmission9.6 Case: Beacons9.7 Why so hesitant?9.8 Aggregated Frames9.9 Channel Assessment9.10 Bluetooth Low Energy9.11 Certification9.12 Further Reading 10 Security 10.1 Introduction10.2 The goals of a Hacker10.3 Network Security Concepts10.4 Hash-function10.5 Symmetric Key Encryption10.6 Case Story: Enigma10.7 Asymmetric Key Encryption10.8 Digital Signature10.9 Certificates10.10 Message Authentication Code10.11 Nonce10.12 Secure Socket Communication10.13 Case Story: Heartbleed10.14 Case Story: WiFi Security10.15 Software Crypto Libraries10.16 Trusted Platform Module10.17 Embedded Systems10.18 Vulnerabilities in Embedded Systems10.19 Export Control10.20 Further Reading 11 Digital Filters 11.1 Why Digital?11.2 Why Filters?11.3 Basic Signal Analysis11.3.1 About the Sample Frequency11.3.2 Time and Frequency Domains and their Duality11.3.3 Analog and Digital11.3.4 More Duality11.3.5 A Well-behaving System11.4 IIR filter Basics11.5 Implementing IIR11.6 FIR Filter basics11.7 Implementing FIR11.8 Integers11.9 Fixed Point Arithmetic11.10 Q-Notation and Multiplication11.11 Division11.12 BCD11.13 Further Reading 12 Statistical Process Control 12.1 Introduction12.2 Important terms12.3 Control Charts12.4 Finding the Control Limits12.5 Subgroups12.6 Case: Insulation Plates12.7 EWMA Control Charts12.8 Process Capability Index12.9 Further Reading Epilogue


无顾客评论

5 星 (0%) 0%
4 星 (0%) 0%
3 星 (0%) 0%
2 星 (0%) 0%
1 星 (0%) 0%

评论该商品

与其他买家分享您的想法