¿Ü±¹µµ¼
ÄÄÇ»ÅÍ
Çϵå¿þ¾î
2013³â 9¿ù 9ÀÏ ÀÌÈÄ ´©Àû¼öÄ¡ÀÔ´Ï´Ù.
Á¤°¡ |
59,000¿ø |
---|
59,000¿ø
1,770P (3%Àû¸³)
ÇÒÀÎÇýÅÃ | |
---|---|
Àû¸³ÇýÅà |
|
|
|
Ãß°¡ÇýÅÃ |
|
À̺¥Æ®/±âȹÀü
¿¬°üµµ¼
»óÇ°±Ç
¸ñÂ÷
Preface
Chapter 1: Introducing Computer Architecture
Technical requirements
The evolution of automated computing devices
Moore's law
Computer architecture
Summary Exercises
Chapter 2: Digital Logic
Technical requirements
Electrical circuits
The transistor
Logic gates
Latches
Flip-flops
Registers
Adders
Clocking
Sequential logic
Hardware description languages
Summary
Exercises
Chapter 3: Processor Elements
Technical requirements
A simple processor
The instructon set
Addressing modes
Instruction categories
Interrupt processing
Input/output operations
Summary
Exercises
Chapter 4: Computer System Components
Technical requirements
Memory Subsystem
Introducing the MOSFET
Constructing DRAM circuits with MOSFETs
I/O subsystem
Graphics displays
Network interface
Keyboard and mouse
Modern computer system specifications
Summary
Exercises
Chapter 5: Hardware-Software Interface
Technical requirements
Device drives
BIOS
The boot process
Operating systems
Processes and threads
Multiprocessing
Summary
Exercises
Chapter 6: Specialized Compiting Domains
Technical requirements
Real-time computing
Digital signal processing
GPU processing
Examples of specialzed architectures
Summary
Exrtcises
Chapter 7: Processor and Meomry Architectures
Technical requirements
The von Newmann, Harvard, and modified Havard architectures
Physical and virtual memory
Memory management unit
Summary
Exercises
Chapter 8: Performance-Enhancing Techniques
Technical requirements
Cache memory
Instruction pipelining
Sumultaneous multithreading
SIMD processing
Summary
Exercises
Chapter 9. Specialized Processor Extensions
Technical requirements
Privileged processor modes
Floating-point arithmetic
Power management
Systme securty management
Summart
Exercises
Chapter 10: Modern Processor Architectures and Instruction Sets
Technical requirements
x86 architecture and instruction set
x64 architecture and instruction set
32-bit ARM architecture and instruction set
64-bit ARM architecture and instruction set
Summary
Exercises
Chapter 11: The RISC-V Archtecture and Instruction Set
Technical requirements
The RISC-V archtecture and applications
The RISC-V base instruction set
RISC-V extensions
RISC-V varants
64-bit RISC-V
Standard RISC-V configurations
RISC_V assembly language
Implementing RISC-V in an FPGA
Summary
Exercises
Chapter 12: Processor Virtualization
Technical requirements
Introducing virtualization
Virtualization challenges
Virtualizing modern processors
Virtualization tools
Virtualization and cloud computing
Summary
Exercises
Chapter 13: Domain-Specific Computer Architectures
Technical requirements
Architecting computer systems to meet unique requirements
Smartphone archtecture
Personal computer architecture
Warehouse-scale computing architecture
neural networks and machine learning architectures
Summary
Exercises
Chapter 14: Cybersecurity and Confidential Computing Architectures
Technical requirements
Cybersecurity threats
Features of secure hardward
Confidential computing
Designing for security at the architectural level
Ensuring security in system and application software
Summary
Exercises
Chapter 15: Blockchain and Bitcoin Mining Architectures
Technical requirements
Introduction to blockchain and bitcoin
The bitcoin mining process
Bitcoin mining computer archtectures
Alternative types of cryptocurrency
Summary
Exercises
Chapter 16: Self-Driving Vehicle Architectures
Technical requirements
Overview of self-driving vehicles
Hardware and software requirements for self-driving vehicles
Autonomous vehicle computing architectue
Summary
Exercises
Chapter 17: Quantum Computing and Other Futere Directions in Computer Architectures
Technical requirements
The ongoing evolution of computer architectures
Extrapolating from current trends
Potentially disruptive technologies
Building af future-tolerant skill set
Summary
Exercises
Appendix
Answers to Exercises
Chapter 1: Introducing Computer Architecture
Chapter 2: Digital Logic
Chapter 3: Processor Elements
Chapter 4: Computer System Components
Chapter 5: Hardware-Software Interface
Chapter 6: Specialized Compiting Domains
Chapter 7: Processor and Meomry Architectures
Chapter 8: Performance-Enhancing Techniques
Chapter 9: Specialized Processor Extensions
Chapter 10: Modern Processor Architectures and Instruction Sets
Chapter 11: The RISC-V Archtecture and Instruction Set
Chapter 12: Processor Virtualization
Chapter 13: Domain-Specific Computer Architectures
Chapter 14: Cybersecurity and Confidential Computing Architectures
Chapter 15: Blockchain and Bitcoin Mining Architectures
Chapter 16: Self-Driving Vehicle Architectures
Chapter 17: Quantum Computing and Other Futere Directions in Computer Architectures
Other Books You May Enjoy
Index
ÀúÀÚ¼Ò°³
»ý³â¿ùÀÏ | - |
---|
·¹µò ¿£Áö´Ï¾î¸µ»çÀÇ CEO·Î, ÀÓº£µðµå ¼ÒÇÁÆ®¿þ¾î/Çϵå¿þ¾î ¼³°è ¹× °³¹ß, Å×½ºÆ® Àü¹®°¡´Ù. ÀÓº£µðµå ½Ã½ºÅÛ »çÀ̹ö º¸¾È Æò°¡ ¹× ¸ðÀÇ ÇØÅ·¿¡ Âü¿©Çß´Ù. ¾ÆÀÌ¿À¿ÍÁÖ¸³´ëÇб³¿¡¼ Ç×°ø °øÇÐÀ» Àü°øÇß°í, Á¶Áö¾Æ°ø°ú´ëÇп¡¼ Àü±â ¹× ÄÄÇ»ÅÍ °øÇÐÀ¸·Î ¼®»ç¸¦ ¹Þ¾Ò´Ù. Ķ¸®Æ÷´Ï¾ÆÁÖ °øÀÎ Àü¹® Àü±â±â»çÀ̸ç, CISSP(Certified Information System Security Professional), CEH(Certified Ethical Hacker), CPT(Certified Penetration Tester)ÀÌ´Ù.
ÀúÀÚÀÇ ´Ù¸¥Ã¥
Àüüº¸±âÁÖ°£·©Å·
´õº¸±â»óÇ°Á¤º¸Á¦°ø°í½Ã
À̺¥Æ® ±âȹÀü
ÄÄÇ»ÅÍ ºÐ¾ß¿¡¼ ¸¹Àº ȸ¿øÀÌ ±¸¸ÅÇÑ Ã¥
ÆǸÅÀÚÁ¤º¸
»óÈ£ |
(ÁÖ)±³º¸¹®°í |
---|---|
´ëÇ¥ÀÚ¸í |
¾Èº´Çö |
»ç¾÷ÀÚµî·Ï¹øÈ£ |
102-81-11670 |
¿¬¶ôó |
1544-1900 |
ÀüÀÚ¿ìÆíÁÖ¼Ò |
callcenter@kyobobook.co.kr |
Åë½ÅÆǸž÷½Å°í¹øÈ£ |
01-0653 |
¿µ¾÷¼ÒÀçÁö |
¼¿ïƯº°½Ã Á¾·Î±¸ Á¾·Î 1(Á¾·Î1°¡,±³º¸ºôµù) |
±³È¯/ȯºÒ
¹ÝÇ°/±³È¯ ¹æ¹ý |
¡®¸¶ÀÌÆäÀÌÁö > Ãë¼Ò/¹ÝÇ°/±³È¯/ȯºÒ¡¯ ¿¡¼ ½Åû ¶Ç´Â 1:1 ¹®ÀÇ °Ô½ÃÆÇ ¹× °í°´¼¾ÅÍ(1577-2555)¿¡¼ ½Åû °¡´É |
---|---|
¹ÝÇ°/±³È¯°¡´É ±â°£ |
º¯½É ¹ÝÇ°ÀÇ °æ¿ì Ãâ°í¿Ï·á ÈÄ 6ÀÏ(¿µ¾÷ÀÏ ±âÁØ) À̳»±îÁö¸¸ °¡´É |
¹ÝÇ°/±³È¯ ºñ¿ë |
º¯½É ȤÀº ±¸¸ÅÂø¿À·Î ÀÎÇÑ ¹ÝÇ°/±³È¯Àº ¹Ý¼Û·á °í°´ ºÎ´ã |
¹ÝÇ°/±³È¯ ºÒ°¡ »çÀ¯ |
·¼ÒºñÀÚÀÇ Ã¥ÀÓ ÀÖ´Â »çÀ¯·Î »óÇ° µîÀÌ ¼Õ½Ç ¶Ç´Â ÈÑ¼ÕµÈ °æ¿ì ·¼ÒºñÀÚÀÇ »ç¿ë, Æ÷Àå °³ºÀ¿¡ ÀÇÇØ »óÇ° µîÀÇ °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì ·º¹Á¦°¡ °¡´ÉÇÑ »óÇ° µîÀÇ Æ÷ÀåÀ» ÈѼÕÇÑ °æ¿ì ·½Ã°£ÀÇ °æ°ú¿¡ ÀÇÇØ ÀçÆǸŰ¡ °ï¶õÇÑ Á¤µµ·Î °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì ·ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·üÀÌ Á¤ÇÏ´Â ¼ÒºñÀÚ Ã»¾àöȸ Á¦ÇÑ ³»¿ë¿¡ ÇØ´çµÇ´Â °æ¿ì |
»óÇ° Ç°Àý |
°ø±Þ»ç(ÃâÆÇ»ç) Àç°í »çÁ¤¿¡ ÀÇÇØ Ç°Àý/Áö¿¬µÉ ¼ö ÀÖÀ½ |
¼ÒºñÀÚ ÇÇÇغ¸»ó |
·»óÇ°ÀÇ ºÒ·®¿¡ ÀÇÇÑ ±³È¯, A/S, ȯºÒ, Ç°Áúº¸Áõ ¹× ÇÇÇغ¸»ó µî¿¡ °üÇÑ »çÇ×Àº¼ÒºñÀÚºÐÀïÇØ°á ±âÁØ (°øÁ¤°Å·¡À§¿øȸ °í½Ã)¿¡ ÁØÇÏ¿© ó¸®µÊ ·´ë±Ý ȯºÒ ¹× ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó±Ý Áö±Þ Á¶°Ç, ÀýÂ÷ µîÀº ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀǼҺñÀÚ º¸È£¿¡ °üÇÑ ¹ý·ü¿¡ µû¶ó ó¸®ÇÔ |
¹è¼Û¾È³»
±³º¸¹®°í »óÇ°Àº Åùè·Î ¹è¼ÛµÇ¸ç, Ãâ°í¿Ï·á 1~2Àϳ» »óÇ°À» ¹Þ¾Æ º¸½Ç ¼ö ÀÖ½À´Ï´Ù.
Ãâ°í°¡´É ½Ã°£ÀÌ ¼·Î ´Ù¸¥ »óÇ°À» ÇÔ²² ÁÖ¹®ÇÒ °æ¿ì Ãâ°í°¡´É ½Ã°£ÀÌ °¡Àå ±ä »óÇ°À» ±âÁØÀ¸·Î ¹è¼ÛµË´Ï´Ù.
±ººÎ´ë, ±³µµ¼Ò µî ƯÁ¤±â°üÀº ¿ìü±¹ Åù踸 ¹è¼Û°¡´ÉÇÕ´Ï´Ù.
¹è¼Ûºñ´Â ¾÷ü ¹è¼Ûºñ Á¤Ã¥¿¡ µû¸¨´Ï´Ù.