Logo

The Second Book of Machine Language

Small book cover: The Second Book of Machine Language

The Second Book of Machine Language
by

Publisher: Compute! Publications
ISBN/ASIN: 0942386531
ISBN-13: 9780942386530
Number of pages: 464

Description:
This book offers the reader both a detailed description of a sophisticated machine language program (the LADS assembler) and an efficient tool, a complete language with which to write other machine language programs. Every line in the LADS assembler program is described. All the subroutines are picked apart and explained. Each major routine is examined in depth.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Programmed Introduction to MIPS Assembly LanguageProgrammed Introduction to MIPS Assembly Language
by - Central Connecticut State University
This is a course in assembly language programming of the MIPS processor. It emphasizes the topics needed for study of computer architecture: bits, bit patterns, operations on bit patterns, and how bit patterns represent instructions and data.
(9299 views)
Book cover: The Power PC Compiler Writer's GuideThe Power PC Compiler Writer's Guide
by - Warthman Associates
This book describes the code patterns that perform well on PowerPC processors. The book will be particularly helpful to compiler developers and application-code specialists who are already familiar with optimizing compiler technology.
(11707 views)
Book cover: Zen of Assembly Language: Volume I, KnowledgeZen of Assembly Language: Volume I, Knowledge
by - jagregory.com
This book unlocks the secrets of writing superb assembly-language code. It assumes that you're already familiar with assembly language, acquainted with the registers and instructions of the 8088, and with the use of one of the popular PC assemblers.
(1021 views)
Book cover: BIOS Disassembly Ninjutsu UncoveredBIOS Disassembly Ninjutsu Uncovered
by - A-List Publishing
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs.
(5595 views)