Kick off your book project in 3 hours! Live workshop on Zoom. You’ll leave with a real book project, progress on your first chapter, and a clear plan to keep going. Saturday, May 16, 2026. Learn more…

Leanpub Header

Skip to main content

Filters

Category: "Embedded Systems"

Books

  1. Mastering STM32 - Second Edition
    A step-by-step guide to the most complete ARM Cortex-M platform, using the official STM32Cube development environment
    Carmine Noviello

    With more than 1200 microcontrollers, STM32 is probably the most complete ARM Cortex-M platform on the market. This book aims to be the most complete guide around introducing the reader to this exciting MCU portfolio from ST Microelectronics and its official CubeHAL and STM32CubeIDE development environment.

  2. Node-OPCUA by example Edition 2024
    Node-OPCUA From Basics to Expertise - Crafting Effective Client and Server Applications in Industrial Communication with JavaScript and TypeScript
    Etienne Rossignon

    Dive into 'Node-OPCUA' and explore the world of industrial protocols with the author's proven recipes. Learn how to build exceptional OPC UA clients and servers through hands-on examples, elevating your industrial programming expertise from basic to advanced levels. This guide is key to mastering Node-OPCUA in JavaScript and TypeScript.

  3. Raising the Level of Abstraction
    Deterministic Code Generation for C++
    Mark E. Wilson

    Most code generation is about saving time.This book is about eliminating entire categories of errors.Instead of writing code first, you define the system—its data, its flow, and its structure—and generate the implementation deterministically. No hidden behavior. No runtime frameworks. No guesswork.If you care about building systems that remain understandable years later, this approach changes how you think about software.

  4. Security Architecture for Modern Embedded Systems
    A Design-First Approach to Embedded Cybersecurity
    Matteo Trovo

    Embedded security is an architecture problem, not a checklist.This book shows how to build a coherent security design for real devices: what embedded cybersecurity means, why it’s different in embedded systems (constraints, lifecycle, physical access, limited patching), and how to turn that into practical design decisions. You’ll learn threat modeling and trust boundaries, then the core mechanisms that must work together: secure boot and root of trust, key management, secure communication, and robust firmware updates. Early access: updated regularly as new chapters and examples are added. Purchasers receive updates.

  5. Bare Metal Computing X64 Edition
    Low Level Coding of Native Instructions
    gareth thomas

    Most programmers never touch the machine.They live inside frameworks. They trust kernels. They inherit latency, abstraction, and hidden behavior they do not control.And they call that “systems programming.”Bare Metal Computing With X64 — Low Level Coding of Native Instructions is for the engineer who wants authority, not convenience

  6. Mastering PTX and SASS
    Volume I — The PTX Language and Architecture Foundations
    gareth thomas

    If you’ve ever wondered why your GPU code hits a wall long before the hardware’s limits, this book tells you why—and how to break through it.Most programmers stop where the compiler starts. They trust nvcc to make the right decisions, to manage registers, to schedule instructions, and to use memory efficiently. But the compiler doesn’t know your problem. It guesses. And in GPU computing, guessing costs performance.

  7. C From Scratch
    Prove it works before you write it.
    William Murray

    Learn C by proving your code correct before you write it. The same methodology behind certified aerospace and medical systems - now applied to learning C from the ground up.

  8. The definitive guide to programming on the ESP32.

  9. The definitive guide to programming on the ESP8266 and ESP32 processors.

  10. Hacking Master Plan
    Learn hacking tips and tricks
    Crt Mori

    Joncy Ber has these low-cost Raspberry Pi computers: can he hack a bank to get more money? He uses social engineering to exploit everyday people's online behavior and other hacking tips and tricks to break into secure systems. Can the authorities, or someone worse, catch up with him?

  11. Diving into JTAG
    A Comprehensive Guide to Debugging, Testing, and Securing Embedded Systems with JTAG Protocol
    Aliaksandr Kavalchuk

    WARNING: The main goal of this book is to test Leanpub functionality, and all the information in this book can be found in my articles for the Interrupt by Memfault and PlatformIO blogs.So, there is no need to buy this book—you should only do so if you prefer reading information in book format or if you just want to buy me a coffee. :) This book is a collection of my articles originally published in the blogs Interrupt by Memfault and PlatformIO with some additional edits and enhancements.   A unique feature of this book is the extensive use of GIF animations and videos to visually demonstrate key concepts and processes. However, since not all EPUB readers support GIF and video playback, each animation and video is accompanied by a link to an external resource. Readers can follow these links to view the corresponding content and enhance their understanding. Repo with all GIF animation: https://github.com/Zamuhrishka/diving-into-jtag-book-animations

  12. Battery Management Systems Made Easy
    A Practical Engineer's Guide to Designing, Building, and Validating Lithium-Ion Battery Management Systems
    Alex Morgan

    Build BMS systems that don’t lie, don’t drift, and don’t catch fire. A practical guide for engineers who need real answers, not theory.

  13. Constraint-Based Design: A Gateway to AI
    The HPC Tradecraft Master Practitioner, Volume 3
    Edward W. Barnard

    A 1986 text adventure game written inside the Cray I/O Subsystem turns out to be architecturally isomorphic to modern transformer design. This capstone volume uses the playable game and its assembly language source as a case study in constraint-based design, including the bare metal thinking we stopped teaching around 1995.

  14. Device Mapper is the invisible engine behind LVM, LUKS, dm-verity, and thin provisioning — yet most engineers never look under the hood. This illustrated guide gives you the complete picture: from BIO remapping and mapping tables to real-world stacking patterns like LVM-on-LUKS and Android Verified Boot. 8 chapters, all visual, zero fluff.

  15. Large Scale Edge Computing Systems Engineering
    Design Optimization, and Operation of Edge Systems at Scale
    gareth thomas

    If You’re Designing Edge Systems the Way Blog Posts Describe Them…You’re Already Behind.Most edge computing material sounds impressive—until you try to deploy it at scale.Then the failures show up: Latency explodes. State breaks. Control planes collapse. Security assumptions fail. Operations become unmanageable.That’s because edge computing is not a product category. It’s a large-scale distributed systems problem—with harsher constraints than the cloud.This book is written for people who actually have to make those systems work.