Kick off your book project in 3 hours! Live workshop on Zoom. You’ll leave with a real book project, progress on your first chapter, and a clear plan to keep going. Saturday, May 16, 2026. Learn more…
With more than 1200 microcontrollers, STM32 is probably the most complete ARM Cortex-M platform on the market. This book aims to be the most complete guide around introducing the reader to this exciting MCU portfolio from ST Microelectronics and its official CubeHAL and STM32CubeIDE development environment.
Dive into 'Node-OPCUA' and explore the world of industrial protocols with the author's proven recipes. Learn how to build exceptional OPC UA clients and servers through hands-on examples, elevating your industrial programming expertise from basic to advanced levels. This guide is key to mastering Node-OPCUA in JavaScript and TypeScript.
Most code generation is about saving time.This book is about eliminating entire categories of errors.Instead of writing code first, you define the system—its data, its flow, and its structure—and generate the implementation deterministically. No hidden behavior. No runtime frameworks. No guesswork.If you care about building systems that remain understandable years later, this approach changes how you think about software.
Embedded security is an architecture problem, not a checklist.This book shows how to build a coherent security design for real devices: what embedded cybersecurity means, why it’s different in embedded systems (constraints, lifecycle, physical access, limited patching), and how to turn that into practical design decisions. You’ll learn threat modeling and trust boundaries, then the core mechanisms that must work together: secure boot and root of trust, key management, secure communication, and robust firmware updates. Early access: updated regularly as new chapters and examples are added. Purchasers receive updates.
Most programmers never touch the machine.They live inside frameworks. They trust kernels. They inherit latency, abstraction, and hidden behavior they do not control.And they call that “systems programming.”Bare Metal Computing With X64 — Low Level Coding of Native Instructions is for the engineer who wants authority, not convenience
If you’ve ever wondered why your GPU code hits a wall long before the hardware’s limits, this book tells you why—and how to break through it.Most programmers stop where the compiler starts. They trust nvcc to make the right decisions, to manage registers, to schedule instructions, and to use memory efficiently. But the compiler doesn’t know your problem. It guesses. And in GPU computing, guessing costs performance.
Learn C by proving your code correct before you write it. The same methodology behind certified aerospace and medical systems - now applied to learning C from the ground up.
The definitive guide to programming on the ESP32.
The definitive guide to programming on the ESP8266 and ESP32 processors.
Joncy Ber has these low-cost Raspberry Pi computers: can he hack a bank to get more money? He uses social engineering to exploit everyday people's online behavior and other hacking tips and tricks to break into secure systems. Can the authorities, or someone worse, catch up with him?
WARNING: The main goal of this book is to test Leanpub functionality, and all the information in this book can be found in my articles for the Interrupt by Memfault and PlatformIO blogs.So, there is no need to buy this book—you should only do so if you prefer reading information in book format or if you just want to buy me a coffee. :) This book is a collection of my articles originally published in the blogs Interrupt by Memfault and PlatformIO with some additional edits and enhancements. A unique feature of this book is the extensive use of GIF animations and videos to visually demonstrate key concepts and processes. However, since not all EPUB readers support GIF and video playback, each animation and video is accompanied by a link to an external resource. Readers can follow these links to view the corresponding content and enhance their understanding. Repo with all GIF animation: https://github.com/Zamuhrishka/diving-into-jtag-book-animations
Build BMS systems that don’t lie, don’t drift, and don’t catch fire. A practical guide for engineers who need real answers, not theory.
A 1986 text adventure game written inside the Cray I/O Subsystem turns out to be architecturally isomorphic to modern transformer design. This capstone volume uses the playable game and its assembly language source as a case study in constraint-based design, including the bare metal thinking we stopped teaching around 1995.
Device Mapper is the invisible engine behind LVM, LUKS, dm-verity, and thin provisioning — yet most engineers never look under the hood. This illustrated guide gives you the complete picture: from BIO remapping and mapping tables to real-world stacking patterns like LVM-on-LUKS and Android Verified Boot. 8 chapters, all visual, zero fluff.
If You’re Designing Edge Systems the Way Blog Posts Describe Them…You’re Already Behind.Most edge computing material sounds impressive—until you try to deploy it at scale.Then the failures show up: Latency explodes. State breaks. Control planes collapse. Security assumptions fail. Operations become unmanageable.That’s because edge computing is not a product category. It’s a large-scale distributed systems problem—with harsher constraints than the cloud.This book is written for people who actually have to make those systems work.