Logo

Programmed Introduction to MIPS Assembly Language

Small book cover: Programmed Introduction to MIPS Assembly Language

Programmed Introduction to MIPS Assembly Language
by

Publisher: Central Connecticut State University

Description:
This is a course in assembly language programming of the MIPS processor. It emphasizes the topics needed for study of computer architecture: bits, bit patterns, operations on bit patterns, and how bit patterns represent instructions and data. The emphasis of the course is on understanding how computers work. This will provide a basis for further study of computer architecture and computer software.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: x86-64 Assembly Language Programming with Ubuntux86-64 Assembly Language Programming with Ubuntu
by - University of Nevada, Las Vegas
This text provides a reference for University level assembly language and systems programming courses. Specifically, it addresses the x86-64 instruction set for the popular x86-64 class of processors using the Ubuntu 64-bit Operating System (OS).
(4443 views)
Book cover: Reverse Engineering for BeginnersReverse Engineering for Beginners
by - yurichev.com
Here are some of my notes about reverse engineering in English language for those beginners who would like to learn to understand x86 (which accounts for almost all executable software in the world) and ARM code created by C/C++ compilers.
(5312 views)
Book cover: Zen of Assembly Language: Volume I, KnowledgeZen of Assembly Language: Volume I, Knowledge
by - jagregory.com
This book unlocks the secrets of writing superb assembly-language code. It assumes that you're already familiar with assembly language, acquainted with the registers and instructions of the 8088, and with the use of one of the popular PC assemblers.
(3933 views)
Book cover: BIOS Disassembly Ninjutsu UncoveredBIOS Disassembly Ninjutsu Uncovered
by - A-List Publishing
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs.
(10924 views)