دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: سازمان و پردازش داده ها ویرایش: 2 نویسندگان: Jim Ledin سری: ISBN (شابک) : 1803234512, 9781803234519 ناشر: Packt Publishing سال نشر: 2022 تعداد صفحات: 667 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 8 مگابایت
کلمات کلیدی مربوط به کتاب معماری و سازماندهی مدرن کامپیوتر: معماری های x86، ARM، و RISC-V و طراحی گوشی های هوشمند، رایانه های شخصی و سرورهای ابری را بیاموزید.: معماری کامپیوتر، سازمان کامپیوتر، X86، RISC-V
در صورت تبدیل فایل کتاب Modern Computer Architecture and Organization: Learn x86, ARM, and RISC-V architectures and the design of smartphones, PCs, and cloud servers به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب معماری و سازماندهی مدرن کامپیوتر: معماری های x86، ARM، و RISC-V و طراحی گوشی های هوشمند، رایانه های شخصی و سرورهای ابری را بیاموزید. نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
راهنمای عملی و بیمعنی برای معماریهای پردازندهها و رایانههای فعلی و آینده که شما را قادر میسازد سیستمهای رایانهای را طراحی کنید و برنامههای نرمافزاری بهتری را در دامنههای مختلف توسعه دهید
آیا شما یک توسعهدهنده نرمافزار، طراح سیستم یا دانشجوی معماری کامپیوتر هستید که بهدنبال مقدمهای روشمند برای معماری دستگاههای دیجیتال هستید، اما در پیچیدگی سیستمهای مدرن غرق شدهاید؟ این راهنمای گام به گام نحوه کار سیستم های کامپیوتری مدرن را با کمک مثال ها و تمرین های عملی به شما آموزش می دهد. شما در مورد رفتار داخلی پردازنده ها تا سطح مدار اطلاعاتی کسب خواهید کرد و خواهید فهمید که سخت افزار چگونه کدهای توسعه یافته در زبان های سطح بالا را اجرا می کند.
این کتاب به شما آموزش می دهد. اصول سیستم های کامپیوتری از جمله ترانزیستورها، گیت های منطقی، منطق ترتیبی و خطوط لوله دستورالعمل. جزئیات معماری پردازنده های مدرن و مجموعه دستورالعمل ها از جمله x86، x64، ARM و RISC-V را خواهید آموخت. خواهید دید که چگونه یک پردازنده RISC-V را در یک برد FPGA کم هزینه پیاده سازی کنید و یک برنامه محاسباتی کوانتومی بنویسید و آن را روی یک کامپیوتر کوانتومی واقعی اجرا کنید.
این نسخه دارای به روز شده است تا اصول معماری و طراحی زیربنای حوزه های مهم امنیت سایبری، استخراج بلاک چین و بیت کوین، و وسایل نقلیه خودران را پوشش دهد.
در پایان این کتاب، شما خواهید دید. درک کاملی از پردازندههای مدرن و معماری کامپیوتر و مسیرهایی که احتمالاً این فناوریها در آینده خواهند داشت، داشته باشید.
این کتاب برای توسعه دهندگان نرم افزار، دانشجویان مهندسی کامپیوتر، طراحان سیستم، مهندسان معکوس، و هر کسی که به دنبال درک اصول معماری و طراحی زیربنای سیستم های کامپیوتری مدرن است: از دستگاه های کوچک و جاسازی شده تا مزارع سرور ابری به اندازه انبار. درک کلی از پردازنده های کامپیوتر مفید است اما لازم نیست.
A no-nonsense, practical guide to current and future processor and computer architectures that enables you to design computer systems and develop better software applications across a variety of domains
Are you a software developer, systems designer, or computer architecture student looking for a methodical introduction to digital device architectures, but are overwhelmed by the complexity of modern systems? This step-by-step guide will teach you how modern computer systems work with the help of practical examples and exercises. You'll gain insights into the internal behavior of processors down to the circuit level and will understand how the hardware executes code developed in high-level languages.
This book will teach you the fundamentals of computer systems including transistors, logic gates, sequential logic, and instruction pipelines. You will learn details of modern processor architectures and instruction sets including x86, x64, ARM, and RISC-V. You will see how to implement a RISC-V processor in a low-cost FPGA board and write a quantum computing program and run it on an actual quantum computer.
This edition has been updated to cover the architecture and design principles underlying the important domains of cybersecurity, blockchain and bitcoin mining, and self-driving vehicles.
By the end of this book, you will have a thorough understanding of modern processors and computer architecture and the future directions these technologies are likely to take.
This book is for software developers, computer engineering students, system designers, reverse engineers, and anyone looking to understand the architecture and design principles underlying modern computer systems: ranging from tiny, embedded devices to warehouse-size cloud server farms. A general understanding of computer processors is helpful but not required.
Cover Copyright Contributors Table of Contents Preface Chapter 1: Introducing Computer Architecture Technical requirements The evolution of automated computing devices Charles Babbage’s Analytical Engine ENIAC IBM PC The Intel 8088 microprocessor The Intel 80286 and 80386 microprocessors The iPhone Moore’s law Computer architecture Representing numbers with voltage levels Binary and hexadecimal numbers The 6502 microprocessor The 6502 instruction set Summary Exercises Chapter 2: Digital Logic Technical requirements Electrical circuits The transistor Logic gates Latches Flip-flops Registers Adders Propagation delay Clocking Sequential logic Hardware description languages VHDL Summary Exercises Chapter 3: Processor Elements Technical requirements A simple processor Control unit Executing an instruction – a simple example Arithmetic logic unit Registers The instruction set Addressing modes Immediate addressing mode Absolute addressing mode Absolute indexed addressing mode Indirect indexed addressing mode Instruction categories Memory load and store instructions Register-to-register data transfer instructions Stack instructions Arithmetic instructions Logical instructions Branching instructions Subroutine call and return instructions Processor flag instructions Interrupt-related instructions No operation instruction Interrupt processing  processing  processing BRK instruction processing Input/output operations Programmed I/O Interrupt-driven I/O Direct memory access Summary Exercises Chapter 4: Computer System Components Technical requirements Memory subsystem Introducing the MOSFET Constructing DRAM circuits with MOSFETs The capacitor The DRAM bit cell DDR5 SDRAM Graphics DDR Prefetching I/O subsystem Parallel and serial data buses PCI Express SATA M.2 USB Thunderbolt Graphics displays VGA DVI HDMI DisplayPort Network interface Ethernet Wi-Fi Keyboard and mouse Keyboard Mouse Modern computer system specifications Summary Exercises Chapter 5: Hardware-Software Interface Technical requirements Device drivers The parallel port PCIe device drivers Device driver structure BIOS UEFI The boot process BIOS boot UEFI boot Trusted boot Embedded devices Operating systems Processes and threads Scheduling algorithms and process priority Multiprocessing Summary Exercises Chapter 6: Specialized Computing Domains Technical requirements Real-time computing Real-time operating systems Digital signal processing ADCs and DACs DSP hardware features Signal processing algorithms Convolution Digital filtering Fast Fourier transform (FFT) GPU processing GPUs as data processors Big data Deep learning Examples of specialized architectures Summary Exercises Chapter 7: Processor and Memory Architectures Technical requirements The von Neumann, Harvard, and modified Harvard architectures The von Neumann architecture The Harvard architecture The modified Harvard architecture Physical and virtual memory Paged virtual memory Page status bits Memory pools Memory management unit Summary Exercises Chapter 8: Performance-Enhancing Techniques Technical requirements Cache memory Multilevel processor caches Static RAM Level 1 cache Direct-mapped cache Set associative cache Processor cache write policies Level 2 and level 3 processor caches Superpipelining Pipeline hazards Micro-operations and register renaming Conditional branches Simultaneous multithreading SIMD processing Summary Exercises Chapter 9: Specialized Processor Extensions Technical requirements Privileged processor modes Handling interrupts and exceptions Protection rings Supervisor mode and user mode System calls Floating-point arithmetic The 8087 floating-point coprocessor The IEEE 754 floating-point standard Power management Dynamic voltage frequency scaling System security management Trusted Platform Module Thwarting cyberattackers Summary Exercises Chapter 10: Modern Processor Architectures and Instruction Sets Technical requirements x86 architecture and instruction set The x86 register set x86 addressing modes Implied addressing Register addressing Immediate addressing Direct memory addressing Register indirect addressing Indexed addressing Based indexed addressing Based indexed addressing with scaling x86 instruction categories Data movement Stack manipulation Arithmetic and logic Conversions Control flow String manipulation Flag manipulation Input/output Protected mode Miscellaneous instructions Other instruction categories Common instruction patterns x86 instruction formats x86 assembly language x64 architecture and instruction set The x64 register set x64 instruction categories and formats x64 assembly language 32-bit ARM architecture and instruction set The ARM register set ARM addressing modes Immediate Register direct Register indirect Register indirect with offset Register indirect with offset, pre-incremented Register indirect with offset, post-incremented Double register indirect Double register indirect with scaling ARM instruction categories Load/store Stack manipulation Register movement Arithmetic and logic Comparisons Control flow Supervisor mode Breakpoint Conditional execution Other instruction categories 32-bit ARM assembly language 64-bit ARM architecture and instruction set 64-bit ARM assembly language Summary Exercises Chapter 11: The RISC-V Architecture and Instruction Set Technical requirements The RISC-V architecture and applications The RISC-V base instruction set Computational instructions Control flow instructions Memory access instructions System instructions Pseudo-instructions Privilege levels RISC-V extensions The M extension The A extension The C extension The F and D extensions Other extensions RISC-V variants 64-bit RISC-V Standard RISC-V configurations RISC-V assembly language Implementing RISC-V in an FPGA Summary Exercises Chapter 12: Processor Virtualization Technical requirements Introducing virtualization Types of virtualization Operating system virtualization Application virtualization Network virtualization Storage virtualization Categories of processor virtualization Trap-and-emulate virtualization Paravirtualization Binary translation Hardware emulation Virtualization challenges Unsafe instructions Shadow page tables Security Virtualizing modern processors x86 processor virtualization x86 hardware virtualization ARM processor virtualization RISC-V processor virtualization Virtualization tools VirtualBox VMware Workstation VMware ESXi KVM Xen QEMU Virtualization and cloud computing Electrical power consumption Summary Exercises Chapter 13: Domain-Specific Computer Architectures Technical requirements Architecting computer systems to meet unique requirements Smartphone architecture iPhone 13 Pro Max Personal computer architecture Alienware Aurora Ryzen Edition R10 gaming desktop Ryzen 9 5950X branch prediction Nvidia GeForce RTX 3090 GPU Aurora subsystems Warehouse-scale computing architecture WSC hardware Rack-based servers Hardware fault management Electrical power consumption The WSC as a multilevel information cache Deploying a cloud application Neural networks and machine learning architectures Intel Nervana neural network processor Summary Exercises Chapter 14: Cybersecurity and Confidential Computing Architectures Technical requirements Cybersecurity threats Cybersecurity threat categories Cyberattack techniques Types of malware Post-exploitation actions Features of secure hardware Identify what needs to be protected Anticipate all types of attacks Features of secure system design Secure key storage Encryption of data at rest Encryption of data in transit Cryptographically secure key generation Secure boot procedure Tamper-resistant hardware design Confidential computing Designing for security at the architectural level Avoid security through obscurity Comprehensive secure design The principle of least privilege Zero trust architecture Ensuring security in system and application software Common software weaknesses Buffer overflow Cross-site scripting SQL injection Path traversal Source code security scans Summary Exercises Chapter 15: Blockchain and Bitcoin Mining Architectures Technical requirements Introduction to blockchain and bitcoin The SHA-256 hash algorithm Computing SHA-256 Bitcoin core software The bitcoin mining process Bitcoin mining pools Mining with a CPU Mining with a GPU Bitcoin mining computer architectures Mining with FPGAs Mining with ASICs Bitcoin mining economics Alternative types of cryptocurrency Summary Exercises Chapter 16: Self-Driving Vehicle Architectures Technical requirements Overview of self-driving vehicles Driving autonomy levels Safety concerns of self-driving vehicles Hardware and software requirements for self-driving vehicles Sensing vehicle state and the surroundings GPS, speedometer, and inertial sensors Video cameras Radar Lidar Sonar Perceiving the environment Convolutional neural networks Example CNN implementation CNNs in autonomous driving applications Lidar localization Object tracking Decision processing Lane keeping Complying with the rules of the road Avoiding objects Planning the vehicle path Autonomous vehicle computing architecture Tesla HW3 Autopilot Summary Exercises Chapter 17: Quantum Computing and Other Future Directions in Computer Architectures Technical requirements The ongoing evolution of computer architectures Extrapolating from current trends Moore’s law revisited The third dimension Increased device specialization Potentially disruptive technologies Quantum physics Spintronics Quantum computing Quantum code-breaking Adiabatic quantum computation The future of quantum computing Carbon nanotubes Building a future-tolerant skill set Continuous learning College education Conferences and literature Summary Exercises Appendix Answers to Exercises Chapter 1: Introducing Computer Architecture Exercise 1 Answer Exercise 2 Answer Exercise 3 Answer Exercise 4 Answer Exercise 5 Answer Exercise 6 Answer Chapter 2: Digital Logic Exercise 1 Answer Exercise 2 Answer Exercise 3 Answer Exercise 4 Answer Exercise 5 Answer Exercise 6 Answer Chapter 3: Processor Elements Exercise 1 Answer Exercise 2 Answer Exercise 3 Answer Exercise 4 Answer Exercise 5 Answer Exercise 6 Answer Chapter 4: Computer System Components Exercise 1 Answer Exercise 2 Answer Chapter 5: Hardware-Software Interface Exercise 1 Answer Exercise 2 Answer Chapter 6: Specialized Computing Domains Exercise 1 Answer Exercise 2 Answer Exercise 3 Answer Chapter 7: Processor and Memory Architectures Exercise 1 Answer Exercise 2 Answer Exercise 3 Answer Chapter 8: Performance-Enhancing Techniques Exercise 1 Answer Exercise 2 Answer Exercise 3 Answer Chapter 9: Specialized Processor Extensions Exercise 1 Answer Exercise 2 Answer Exercise 3 Answer Exercise 4 Answer Exercise 5 Answer Exercise 6 Answer Exercise 7 Answer Exercise 8 Answer Chapter 10: Modern Processor Architectures and Instruction Sets Exercise 1 Answer Exercise 2 Answer Exercise 3 Answer Exercise 4 Answer Exercise 5 Answer Exercise 6 Answer Exercise 7 Answer Exercise 8 Answer Chapter 11: The RISC-V Architecture and Instruction Set Exercise 1 Answer Exercise 2 Answer Exercise 3 Answer Chapter 12: Processor Virtualization Exercise 1 Answer Exercise 2 Answer Exercise 3 Answer Chapter 13: Domain-Specific Computer Architectures Exercise 1 Answer Exercise 2 Answer Chapter 14: Cybersecurity and Confidential Computing Architectures Exercise 1 Answer Exercise 2 Answer Exercise 3 Answer Chapter 15: Blockchain and Bitcoin Mining Architectures Exercise 1 Answer Exercise 2 Answer Chapter 16: Self-Driving Vehicle Architectures Exercise 1 Answer Exercise 2 Answer Exercise 3 Answer Exercise 4 Answer Chapter 17: Future Directions in Computer Architectures Exercise 1 Answer Exercise 2 Answer Exercise 3 Answer Exercise 4 Answer PacktPage Index