BIOS Disassembly Ninjutsu Uncovered
by Darmawan Salihun
Publisher: A-List Publishing 2006
Number of pages: 579
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques -- including BIOS rootkits and computer defense -- and the exploitation of embedded x86 BIOS are also covered.
Download or read it online for free here:
by Bradley Kjell - Central Connecticut State University
This is a course in assembly language programming of the MIPS processor. It emphasizes the topics needed for study of computer architecture: bits, bit patterns, operations on bit patterns, and how bit patterns represent instructions and data.
by Paul A. Carter
The book discusses how to program the 80386 and later processors in protected mode. The tutorial has extensive coverage of interfacing assembly and C code and so might be of interest to C programmers who want to learn about how C works under the hood.
by Ed Jorgensen - University of Nevada, Las Vegas
This text provides a reference for University level assembly language and systems programming courses. Specifically, it addresses the x86-64 instruction set for the popular x86-64 class of processors using the Ubuntu 64-bit Operating System (OS).
by Steve Hoxey, at al. - Warthman Associates
This book describes the code patterns that perform well on PowerPC processors. The book will be particularly helpful to compiler developers and application-code specialists who are already familiar with optimizing compiler technology.