BIOS Disassembly Ninjutsu Uncovered
by Darmawan Salihun
Publisher: A-List Publishing 2006
ISBN/ASIN: 1931769605
ISBN-13: 9781931769600
Number of pages: 579
Description:
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques -- including BIOS rootkits and computer defense -- and the exploitation of embedded x86 BIOS are also covered.
Download or read it online for free here:
Download link
(12MB, PDF)
Similar books
![Book cover: x86 Assembly](images/1911.jpg)
- Wikibooks
This book covers assembly language programming for the x86 family of microprocessors. The objective is to teach how to program in x86 assembly, as well as the basic architecture of x86 processor family. The book for readers at the intermediate level.
(24821 views)
![Book cover: Introduction To MIPS Assembly Language Programming](images/11322.jpg)
by Charles W. Kann - Gettysburg College
This book introduces students to assembly language programming in MIPS. It covers basic operators and instructions, subprogram calling, loading and storing memory, program control and the conversion of the assembly language program into machine code.
(6384 views)
![Book cover: The Second Book of Machine Language](images/2220.jpg)
by Richard Mansfield - Compute! Publications
This book offers the reader both a detailed description of the LADS assembler and an efficient tool, a complete language with which to write other machine language programs. Every line in the program is described, all the subroutines are explained.
(21895 views)
![Book cover: MIPS Assembly Language Programming Using QtSpim](images/8504.jpg)
by Ed Jorgensen - University of Nevada, Las Vegas
The purpose of this text is to provide a simple and free reference for university level programming and architecture units that include a brief section covering MIPS assembly language. The text uses the QtSpim simulator.
(16177 views)