1977 Intel 8080 Bugbook Microprocessor Programming/Interfacing MITS Altair IMSAI For Sale

1977 Intel 8080 Bugbook Microprocessor Programming/Interfacing MITS Altair IMSAI


This item has been shown 13 times.

Buy Now

1977 Intel 8080 Bugbook Microprocessor Programming/Interfacing MITS Altair IMSAI:
$24

1977 Intel 8080(A) Bugbook
Part of the famous "Bugbook" series, this fascinating book contains everything you need to know to program and interface your 8080 micro. Apart from some moderate cover wear, the book is in very good condition. Softcover. This item ships WORLDWIDE.
Please note, there are two covers styles as shown. You may receive either depending on availability, but rest assured, the contents are identical.
Chapter 1 deals with the basic concept of the microcomputer. The second chapter describes a small 8080-based microcomputer, while Chapter 3 is an introduction to microcomputer programming. The fourth chapter covers device select pulse generation, and Chapter 5 shows how to count the number of clock cycles for the execution of microcomputer program segments. The subject of the sixth chapter is the internal operation of the 8080 chip. Chapter 7 is devoted to microcomputer input/output, and the final chapter deals with subroutines, interrupts, external flags, and stacks. References and 8080 and 8080A instruction set summaries are given in the appendixes.



Buy Now

Microsoft Project For Dos - Vintage Software picture
Microsoft Project For Dos - Vintage Software


Crazy Climber Sharp X68000 Computer Video Game Japan Import Vintage Complete picture
Crazy Climber Sharp X68000 Computer Video Game Japan Import Vintage Complete


Ranma 1/2 Popcom X68000 Sharp Floppy Disk Computer Japan Import Vintage picture
Ranma 1/2 Popcom X68000 Sharp Floppy Disk Computer Japan Import Vintage


Bubble Bobble X68000 Computer Video Game Japan Import Vintage picture
Bubble Bobble X68000 Computer Video Game Japan Import Vintage


Documentation

  • AIX Local Security Checks
  • Backdoors
  • CentOS Local Security Checks
  • CGI abuses
  • CISCO
  • Databases
  • Debian Local Security Checks
  • Default Unix Accounts
  • Denial of Service
  • Fedora Local Security Checks
  • Finger abuses
  • Firewalls
  • FreeBSD Local Security Checks