Atjaunināt sīkdatņu piekrišanu

E-grāmata: Hardware Hacker

4.28/5 (993 ratings by Goodreads)
  • Formāts: EPUB+DRM
  • Izdošanas datums: 27-Aug-2019
  • Izdevniecība: No Starch Press,US
  • Valoda: eng
  • ISBN-13: 9781593278137
  • Formāts - EPUB+DRM
  • Cena: 13,50 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Izdošanas datums: 27-Aug-2019
  • Izdevniecība: No Starch Press,US
  • Valoda: eng
  • ISBN-13: 9781593278137

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

"A career retrospective from Andrew "Bunnie" Huang, one of the world's most esteemed hackers"--

For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop Novena and his mentorship of various hardware startups and developers. In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective.

Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs.

Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices between China and the United States, bunnie weaves engineering, law, and society into the tapestry of open hardware.

With highly detailed passages on the ins and outs of manufacturing and a comprehensive take on the issues associated with open source hardware, The Hardware Hacker is an invaluable resource for aspiring hackers and makers.

Preface xvii
Part 1 Adventures in Manufacturing
1(114)
1 Made in China
7(36)
The Ultimate Electronic Component Flea Market
8(6)
The Next Technological Revolution
14(2)
Touring Factories with Chumby
16(26)
Scale in Shenzhen
17(1)
Feeding the Factory
18(2)
Dedication to Quality
20(3)
Building Technology Without Using It
23(1)
Skilled Workers
24(2)
The Need for Craftspeople
26(3)
Automation for Electronics Assembly
29(2)
Precision, Injection Molding, and Patience
31(3)
The Challenge of Quality
34(8)
Closing Thoughts
42(1)
2 Inside three very different factories
43(30)
Where Arduinos Are Born
44(13)
Starting with a Sheet of Copper
46(3)
Applying the PCB Pattern to the Copper
49(2)
Etching the PCBs
51(2)
Applying Soldermask and Silkscreen
53(1)
Testing and Finishing the Boards
54(3)
Where USB Memory Sticks Are Born
57(7)
The Beginning of a USB Stick
57(2)
Hand-Placing Chips on a PCB
59(2)
Bonding the Chips to the PCB
61(1)
A Close Look at the USB Stick Boards
61(3)
A Tale of Two Zippers
64(9)
A Fully Automated Process
67(1)
A Semiautomated Process
68(2)
The Irony of Scarcity and Demand
70(3)
3 The Factory floor
73(42)
How to Make a Bill of Materials
74(10)
A Simple BOM for a Bicycle Safety Light
74(2)
Approved Manufacturers
76(1)
Tolerance, Composition, and Voltage Specification
76(1)
Electronic Component Form Factor
77(1)
Extended Part Numbers
78(1)
The Bicycle Safety Light BOM Revisited
79(3)
Planning for and Coping with Change
82(2)
Process Optimization: Design for Manufacturing
84(16)
Why DFM?
85(1)
Tolerances to Consider
86(2)
Following DFM Helps Your Bottom Line
88(3)
The Product Behind Your Product
91(6)
Testing vs. Validation
97(3)
Finding Balance in Industrial Design
100(7)
The chumby One's Trim and Finish
101(3)
The Arduino Uno's Silkscreen Art
104(1)
My Design Process
105(2)
Picking (and Maintaining) a Partner
107(6)
Tips for Forming a Relationship with a Factory
107(1)
Tips on Quotations
108(3)
Miscellaneous Advice
111(2)
Closing Thoughts
113(2)
Part 2 Thinking Differently: Intellectual Property in China
115(60)
4 Gongkai Innovation
119(24)
I Broke My Phone's Screen, and It Was Awesome
120(1)
Shanzhai as Entrepreneurs
121(5)
Who Are the Shanzhai?
122(1)
More Than Copycats
123(1)
Community-Enforced IP Rules
124(2)
The $12 Phone
126(15)
Inside the $12 Phone
128(3)
Introducing Gongkai
131(3)
From Gongkai to Open Source
134(1)
Engineers Have Rights, Too
135(6)
Closing Thoughts
141(2)
5 Fake Goods
143(32)
Well-Executed Counterfeit Chips
143(6)
Counterfeit Chips in US Military Hardware
149(7)
Types of Counterfeit Parts
150(3)
Fakes and US Military Designs
153(1)
Anticounterfeit Measures
154(2)
Fake MicroSD Cards
156(12)
Visible Differences
157(1)
Investigating the Cards
158(1)
Were the MicroSD Cards Authentic?
159(1)
Further Forensic Investigation
160(2)
Gathering Data
162(4)
Summarizing My Findings
166(2)
Fake FPGAs
168(6)
The White Screen Issue
168(2)
Incorrect ID Codes
170(2)
The Solution
172(2)
Closing Thoughts
174(1)
Part 3 What Open Hardware Means to Me
175(100)
6 The Story of Chumby
181(34)
A Hacker-Friendly Platform
182(2)
Evolving chumby
184(5)
A More Hackable Device
186(1)
Hardware with No Secrets
187(2)
The End of Chumby, New Adventures
189(16)
Why the Best Days of Open Hardware Are Yet to Come
205(9)
Where We Came From: Open to Closed
206(2)
Where We Are: "Sit and Wait" vs. "Innovate"
208(2)
Where We're Going: Heirloom Laptops
210(1)
An Opportunity for Open Hardware
211(3)
Closing Thoughts
214(1)
7 Novena: Building my Own Laptop
215(36)
Not a Laptop for the Faint of Heart
217(2)
Designing the Early Novena
219(8)
Under the Hood
219(5)
The Enclosure
224(3)
The Heirloom Laptop's Custom Wood Composite
227(5)
Growing Novenas
228(1)
The Mechanical Engineering Details
229(3)
Changes to the Finished Product
232(15)
Case Construction and Injection-Molding Problems
233(4)
Changes to the Front Bezel
237(1)
DIY Speakers
238(1)
The PVT2 Mainboard
238(3)
A Breakout Board for Beginners
241(1)
The Desktop Novena's Power Pass-Through Board
242(1)
Custom Battery Pack Problems
243(1)
Choosing a Hard Drive
244(2)
Finalizing Firmware
246(1)
Building a Community
247(2)
Closing Thoughts
249(2)
8 Chibitronics: Creating Circuit Stickers
251(24)
Crafting with Circuits
257(7)
Developing a New Process
259(1)
Visiting the Factory
260(1)
Performing a Process Capability Test
261(3)
Delivering on a Promise
264(2)
Why On-Time Delivery Is Important
266(1)
Lessons Learned
266(8)
Not All Simple Requests Are Simple for Everyone
267(1)
Never Skip a Check Plot
268(1)
If a Component Can Be Placed Incorrectly, It Will Be
268(2)
Some Concepts Don't Translate into Chinese Well
270(1)
Eliminate Single Points of Failure
271(1)
Some Last-Minute Changes Are Worth It
271(1)
Chinese New Year Impacts the Supply Chain
272(1)
Shipping Is Expensive and Difficult
273(1)
You're Not Out of the Woods Until You Ship
274(1)
Closing Thoughts
274(1)
Part 4 A Hacker's Perspective
275(108)
9 Hardware Hacking
279(46)
Hacking the PIC18F1320
281(8)
Decapping the IC
282(1)
Taking a Closer Look
283(1)
Erasing the Flash Memory
284(1)
Erasing the Security Bits
285(2)
Protecting the Other Data
287(2)
Hacking SD Cards
289(9)
How SD Cards Work
290(3)
Reverse Engineering the Card's Microcontroller
293(5)
Potential Security Issues
298(1)
A Resource for Hobbyists
298(1)
Hacking HDCP-Secured Links to Allow Custom Overlays
298(8)
Background and Context
300(2)
How NeTV Worked
302(4)
Hacking a Shanzhai Phone
306(18)
The System Architecture
306(5)
Reverse Engineering the Boot Structure
311(4)
Building a Beachhead
315(2)
Attaching a Debugger
317(4)
Booting an OS
321(1)
Building a New Toolchain
321(2)
Fernvale Results
323(1)
Closing Thoughts
324(1)
10 Biology and Bioinformatics
325(32)
Comparing H1N1 to a Computer Virus
327(8)
DNA and RNA as Bits
328(2)
Organisms Have Unique Access Ports
330(1)
Hacking Swine Flu
331(2)
Adaptable Influenza
333(2)
A Silver Lining
335(1)
Reverse Engineering Superbugs
335(9)
The O104:H4 DNA Sequence
336(2)
Reversing Tools for Biology
338(2)
Answering Biological Questions with UNIX Shell Scripts
340(2)
More Questions Than Answers
342(2)
Mythbusting Personalized Genomics
344(2)
Myth: Having Your Genome Read Is Like Hex-Dumping the ROM of Your Computer
344(1)
Myth: We Know Which Mutations Predict Disease
345(1)
Myth: The Reference Genome Is an Accurate Reference
345(1)
Patching a Genome
346(8)
CRISPRs in Bacteria
347(3)
Determining Where to Cut a Gene
350(1)
Implications for Engineering Humans
351(1)
Hacking Evolution with Gene Drive
352(2)
Closing Thoughts
354(3)
11 Selected Interviews
357(26)
Andrew "bunnie" Huang: Hardware Hacker (CSDN)
357(15)
About Open Hardware and the Maker Movement
358(9)
About Hardware Hackers
367(5)
The Blueprint Talks to Andrew Huang
372(11)
Epilogue 383(1)
Index 384
Andrew "bunnie" Huang is a hacker, maker, and open hardware activist. He holds a Ph.D in Electrical Engineering from MIT, is the author of Hacking the Xbox (No Starch Press) and The Essential Guide to Electronics in Shenzhen, and has served as a technical advisor for various hardware startups and MAKE Magazine.