Logo

The Second Book of Machine Language

Small book cover: The Second Book of Machine Language

The Second Book of Machine Language
by

Publisher: Compute! Publications
ISBN/ASIN: 0942386531
ISBN-13: 9780942386530
Number of pages: 464

Description:
This book offers the reader both a detailed description of a sophisticated machine language program (the LADS assembler) and an efficient tool, a complete language with which to write other machine language programs. Every line in the LADS assembler program is described. All the subroutines are picked apart and explained. Each major routine is examined in depth.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: The Art of Assembly LanguageThe Art of Assembly Language
by - No Starch Press
Presents assembly language from the high-level point of view, so you can start writing meaningful programs within days. This is the most-often recommended book on 80x86 assembly language programming in newsgroups, on web sites, and by word of mouth.
(16445 views)
Book cover: PC Assembly LanguagePC Assembly Language
by
The book discusses how to program the 80386 and later processors in protected mode. The tutorial has extensive coverage of interfacing assembly and C code and so might be of interest to C programmers who want to learn about how C works under the hood.
(16235 views)
Book cover: Programmed Introduction to MIPS Assembly LanguageProgrammed Introduction to MIPS Assembly Language
by - Central Connecticut State University
This is a course in assembly language programming of the MIPS processor. It emphasizes the topics needed for study of computer architecture: bits, bit patterns, operations on bit patterns, and how bit patterns represent instructions and data.
(10390 views)
Book cover: BIOS Disassembly Ninjutsu UncoveredBIOS Disassembly Ninjutsu Uncovered
by - A-List Publishing
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs.
(9425 views)