Search Books
Challenges, Opportunities, … Java Virtual Machine (Java …

Harnessing the Uefi Shell: Moving The Platform Beyond Dos, Second Edition

Author Michael Rothman
Publisher De|G Press
Category COMPUTERS
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
68.85 84.99 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $65.35

✓ Usually ships in 24 hours

Share:
Book Details
PublisherDe|G Press
ISBN / ASIN1501514806
ISBN-139781501514807
AvailabilityUsually ships in 24 hours
Sales Rank2,263,946
CategoryCOMPUTERS
MarketplaceUnited States 🇺🇸

Description

Focusing on the use of the Uefi Shell and its recently released formal specification, this book unlocks a wide range of usage models which can help people best utilize the shell solutions. This text also expands on the obvious intended utilization of the shell and explains how it can be used in various areas such as security, networking, configuration, and other anticipated uses such as manufacturing, diagnostics, etc. Among other topics, Harnessing the Uefi Shell demonstrates how to write Shell scripts, how to write a Shell application, how to use provisioning options and more. Since the Shell is also a Uefi component, the book will make clear how the two things interoperate and how both Shell developers as well as Uefi developers can dip into the other's field to further expand the power of their solutions. Harnessing the Uefi Shell is authored by the three chairs of the Uefi working sub-teams, Michael Rothman (Intel, chair of the Uefi Configuration and Uefi Shell sub-teams), Vincent Zimmer (Intel, chair of the Uefi networking sub-team and security sub-team), and Tim Lewis (Insyde Software, chair of the Uefi security sub-team). This book is perfect for any Oems that ship Uefi-based solutions (which is all of the Mncs such as Ibm, Dell, Hp, Apple, etc.), software developers who are focused on delivering solutions targeted to manufacturing, diagnostics, hobbyists, or stand-alone kiosk environments.

Similar Products

Deploying IP and MPLS QoS for Multiservice Networks: T…
View
Satellite and Terrestrial Radio Positioning Techniques…
View
Letting Go of the Words: Writing Web Content that Work…
View
DSP for Embedded and Real-Time Systems
View
Hacking with Kali: Practical Penetration Testing Techn…
View
Handbook on Securing Cyber-Physical Critical Infrastru…
View
The Basics of IT Audit: Purposes, Processes, and Pract…
View
Python Forensics: A workbench for inventing and sharin…
View
Machine Learning: A Bayesian and Optimization Perspect…
View