Byte Magazine March 1979 Vol 4 No. 3 Through The Trap Door No Label


Price:
Sale price$19.95

Description

Byte Magazine – March 1979 | Vol. 4, No. 3 | Through the Trap Door | No Label | Good

This vintage issue of Byte Magazine (Vol. 4, No. 3, March 1979) features the classic Robert Tinney cover art “Through the Trap Door,” highlighting the theme of cryptography, data security, and advanced computing techniques at the dawn of the personal computer age. Inside, readers will find articles on data encryption, password protection, computer-controlled home security, new processors like the Z-8000 and 6809, and robotics inspired by nature. For collectors, computer historians, and enthusiasts of vintage microcomputing, this issue is a rich mix of hands-on projects, emerging technologies, and historical retrospectives.

The magazine is in good condition, showing normal signs of age-related wear. The copy pictured is the exact item you will receive. All items are shipped with a plastic protective covering. Please see photos for condition details.


Highlights from this issue:

Foreground (Projects & Applications)

  • The Standard Data Encryption Algorithm, Part 1: An Overview — Robert V. Meushaw (p.66)
    A detailed description of the groundbreaking “trap door” algorithm.

  • Designing with Double-Sided Printed Circuit Boards — David Lamkins (p.94)
    Save space and improve performance with this do-it-yourself PCB technique.

  • Designing a Robot from Nature, Part 2: Constructing the Eye — Andrew Filo (p.114)
    Continuing exploration into bio-inspired robotics.

  • A Stepping Motor Primer, Part 2 — Paul Giacomo (p.142)
    Interfacing and considerations for stepping motors.

  • Build a Computer Controlled Security System for Your Home, Part 3 — Steve Ciarcia (p.150)
    Advanced methods using ultrasonics, infrared beams, and other sensors.

  • The Power of the HP-67 Programmable Calculator, Part 1 — Robert C. Arp Jr. (p.196)
    Unlocking the potential of one of the most powerful programmable calculators.

Background (Concepts, Reviews & History)

  • Building the Heath H8 Computer — Dr. Paul R. Poduska (p.12)
    A review of the popular Heathkit computer.

  • A Map of the TMS-9900 Instruction Space — Henry Melton (p.14)
    Organizing work with one of Texas Instruments’ important processors.

  • Files on Parade, Part 2: Using Files — Mark Klein (p.32)
    File protection systems and file management.

  • A Microprocessor for the Revolution: The 6809, Part 3 — Terry Ritter & Joel Boney (p.46)
    Concluding discussion of the successor to the Motorola 6800.

  • Cryptography in the Field, Part 1: An Overview — John P. Costas, PhD (p.56)
    A historical look at field cryptography practices.

  • Preview of the Z-8000 — Ira Rampil (p.80)
    Examining Zilog’s powerful new 16-bit processor.

  • Common Mistakes Using Warnier-Orr Diagrams — David Higgins (p.170)
    Avoiding flowcharting pitfalls.

  • Password Protection for Your Computer — R. Jordan Kreindler (p.194)
    Techniques for keeping computer data secure.

  • What is an Interrupt? — R. Travis Atkins (p.230)
    Understanding interrupts to improve peripheral efficiency.

  • History of Computers: The IBM 650 — Keith S. Reid-Green (p.238)
    A retrospective on one of the first mass-produced computers.

Nucleus (Regular Columns & Departments)

  • Editorial: Don’t Overlook LISP (p.6)

  • Letters (p.10)

  • Desk Top Wonder: Race Car for the SR-52 (p.26)

  • Book Review (p.42)

  • Programming Quickie: Inverse Trig Functions (p.82)

  • BYTE News (p.107)

  • Technical Forum (p.182)

  • Nybbles: Computer-Assisted Flight Planning (p.206)

  • Clubs and Newsletters (p.222)

  • BYTE’s Bits (p.224)

  • What’s New? (p.241)

  • Machine Language Puzzler, Event Queue, Unclassified Ads, and BOMB Results


Condition Notes:

  • Good condition with light general wear

  • No mailing label

  • Includes protective plastic covering

Shipping:

Combined shipping available upon request.


This March 1979 BYTE issue is a valuable addition for collectors and researchers of cryptography, microprocessors, robotics, and the evolution of personal computing, showcasing the growing intersection of security, hardware innovation, and programming in the late 1970s.

You may also like

Recently viewed