BIOS Disassembly Ninjutsu Uncovered (Darmawan Salihun)

0.0 (0)
BIOS Disassembly Ninjutsu Uncovered (Darmawan Salihun)

This reference to BIOS exploitation discusses the Reverse Engineering techniques used to extract information from BIOS and expansion ROMs, explaining security weaknesses, potential exploitation scenarios, and protection in a methodical manner.

Techniques for exploiting SMBIOS/DMI, such as BIOS rootkits, computer defense, and embedded x86 BIOS, are also explored.

The primary target audience for this book is system programmers and experts in computer security. Additionally, this book might be very helpful to electronic engineers, computer technicians, and computer hobbyists. Additionally, computer science students may find it helpful owing to the extensive description of applied computer architecture (x86 architecture) and compression techniques. Nothing, however, precludes anyone who is interested in BIOS technology from reading this book and benefiting from it.

Ebook Details

About the Authors
In the CodeBreakers Journal, Darmawan Salihun has published works on BIOS hacking, Plug and Play BIOS, PCI protocol exploitation, and BIOS reverse engineering.
Published Date / Year
(October 28, 2006)
450 pages
eBook Format
PDF (579 pages), ePub, Kindle, etc.

Similar Programming & Computer Books

リバースエンジニアリング入門 - Reverse Engineering for Beginners (Dennis Yurichev)
This free programming book gives readers practical, in-depth methods for reverse engineering software, starting with a fundamental primer on the subject that covers computer internals, operating systems, and assembly...
Rétro-ingénierie pour Débutants - Reverse Engineering for Beginners (Dennis Yurichev, et al)
In 2014–2018, the title of the book was "Reverse Engineering for Beginners," but I've always had the sneaking suspicion that that made his audience too limited. ...
A History of the Personal Computer: the People and the Technology (Roy A. Allan)
The history of the personal computer revolution in this free programming book is fascinating. We go into detail on early personal computing, the "first" personal computer, Intel's invention of...
A Technical History of Apple's Operating Systems (Amit Singh)
These documents cover a variety of operating systems that Apple has attempted to create as well as those that it has previously developed.
Retrograde - The Ultimate Guide to Pre-millennial PC Hardware (Ben Hardwidge)
With our free guide to retro PC hardware, you can go back in time to the Neolithic era of the 286, CGA graphics, and the earliest sound cards. ...
Learn Ethical Hacking from Scratch (Zaid Sabih)
The fundamentals of ethical hacking, how to hack safely and legally, how to install Kali Linux and use the Linux terminal are covered at the beginning of this book....
Computer Arithmetic of Geometrical Figures: Algorithms and Hardware Design (S. I. Khmelnik)
This free programming book describes many iterations of processors made for affine transformations of planar and spatial many-dimensional figures. This processor is designed to perform affine transformations on geometrical...
Watermarking - Volume 2 (Mithun Das Gupta)
The books in this collection contain some of the most recent advancements in the watermarking industry. To make this work a significant contribution to science, authors with various backgrounds...
Watermarking - Volume 1 (Mithun Das Gupta)
Some of the most recent advancements in the watermarking discipline are presented in this collection of books. To make this book a significant contribution to scientific study, authors from...
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphing Attacks (Christian Rathgeb, et al)
The first thorough compilation of research on the popular subject of digital face alteration, including DeepFakes, Face Morphing, and Reenactment, is offered in this open access book. ...

User reviews

There are no user reviews for this listing.
Rate this Book