Game Console Hacking Xbox, Playstation, Nintendo, Atari, & Gamepark 32
文件大小:
23294k
资源说明:Product Description
The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed "retro gaming" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of "Hardware Hacking: Have Fun While Voiding Your Warranty", provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do.
By definition, video console game players like to have fun. Most of them are addicted to the adrenaline rush associated with "winning", and even more so when the "winning" involves beating the system by discovering the multitude of "cheats" built into most video games. Now, they can have the ultimate adrenaline rush---actually messing around with the soul of the machine and configuring it to behave exactly as the command. This book builds on the motto of "Have Fun While Voiding Your Warranty" and will appeal to the community of hardware geeks who associate unscrewing the back of their video console with para-jumping into the perfect storm.
* Providing a reliable, field-tested guide to hacking all of the most popular video gaming consoles.
* Written by some of the most knowledgeable and recognizable names in the hardware hacking community.
* Game Console Hacking is the first book on the market to show game enthusiasts (self described hardware geeks) how to disassemble, reconfigure, customize and re-purpose their Atari, Sega, Nintendo, Playstation and Xbox systems.
About the Author
oe Grand is the President and CEO of Grand Idea Studio, Inc., a product design and development firm that brings unique inventions to market. An electrical engineer, many of Joe's creations, including consumer devices, medical products, video games and toys, are sold worldwide. A recognized name in computer security and former member of the legendary hacker think-tank, The L0pht, Joe's pioneering research on product design and analysis, mobile devices, and digital forensics is published in various industry journals. He is a co-author of Hack Proofing Your Network, Second Edition (Syngress Publishing, ISBN 1-928994-70-9) and Stealing the Network: How to Own the Box (Syngress Publishing 1-931836-87-6). Joe has testified before the United States Senate Governmental Affairs Committee on the state of government and homeland computer security. He has presented his work at the United States Naval Post Graduate School Center for INFOSEC Studies and Research, the United States Air Force Office of Special Investigations, the USENIX Security Symposium, and the IBM Thomas J. Watson Research Center. Joe is a sought after personality who has spoken at numerous universities and industry forums.
Frank Thornton runs his own consulting firm, Blackthorn Systems and as a detective and forensics expert has investigated over 100 homicides and thousands of other crime scenes.
本源码包内暂不包含可直接显示的源代码文件,请下载源码包。