The Online Books Page

Browsing Library of Congress Call Numbers : "QA76.9.A23 T68 1990" to "QA76.9.A73 L48 1984" (Overview; Include extended shelves)

<previous -- A B C D E F G H J K L M N P Q R S T U V Z -- next>

Or start at this prefix:
Call number Item
Q Science (Go to start of category)
QA Mathematics and Computer Science (Go to start of category)
QA76.9.A23 T68 1990 [Info] Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System, by National Computer Security Center (U.S.) (HTML at
QA76.9.A25 [Info] Freedom on the Net, by Freedom House (U.S.) (partial serial archives)
QA76.9 .A25 A52 [Info] A Guide to Understanding Identification and Authentication in Trusted Systems, by National Computer Security Center (U.S.) (HTML at
QA76.9.A25 A53 1996 [Info] An Exploration of Cyberspace Security R&D Investment Strategies for DARPA: "The Day After ... in Cyberspace II" (1996), by Robert H. Anderson and Anthony C. Hearn (HTML at
QA76.9 .A25 A54 2001 [Info] Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK)
QA76.9 .A25 C656 1988 [Info] Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at
QA76.9 .A25 C6663 1990 [Info] Computers at Risk: Safe Computing in the Information Age, by National Research Council Computer Science and Telecommunications Board (page images at NAP)
QA76.9 .A25 C73 1998 [Info] Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (1998), by Electronic Frontier Foundation (HTML at and other sites)
QA76.9 .A25 C87 2014 [Info] UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at
QA76.9.A25 D44 1987 [Info] Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton)
QA76.9 .A25 E5425 2007 [Info] Engaging Privacy and Information Technology in a Digital Age (2007), ed. by James Waldo, Herbert Lin, and Lynette I. Millett (HTML and page images with commentary at NAP)
QA76.9 .A25 G54 [Info] A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at
QA76.9 .A25 G85 1988 [Info] A Guide to Understanding Audit in Trusted Systems (version 2, 1988), by National Computer Security Center (U.S.) (HTML at
QA76.9 .A25 G852 1988 [Info] A Guide to Understanding Trusted Distribution in Trusted Systems (version 1, 1988), by National Computer Security Center (U.S.) (HTML at
QA76.9 .A25 H376 2013 [Info] Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (PDF files with commentary at
QA76.9.A25 H6985 2004 [Info] Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at
QA76.9.A25 H83 2013 [Info] Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press)
QA76.9.A25 I87 1995 [Info] Issue Update on Information Security and Privacy in Network Environments (Washington: GPO, 1995), by United States Congress Office of Technology Assessment
QA76.9 .A25 M463 [Info] Handbook of Applied Cryptography, by Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone (PDF and Postscript files with commentary at Waterloo)
QA76.9.A25 M47 [Info] A Guide to Understanding Configuration Management in Trusted Systems (version 1, 1988), by James N. Menendez (HTML at
QA76.9 .A73 [Info] Computer Architecture and Interfacing to Mechatronic Systems (1994), by Dario J. Toncich (PDF files at
QA76.9.A73 C65 [Info] Computer Structures: Principles and Examples (1982), ed. by Daniel P. Siewiorek, C. Gordon Bell, and Allen Newell (illustrated HTML at Microsoft)
QA76.9.A73 D68 1998 [Info] High Performance Computing (electronic edition, 2009), by Charles R. Severance and Kevin Dowd (PDF and EPUB at
QA76.9 .A73 K66 [Info] An Architecture for Combinator Graph Reduction, by Philip Koopman (PDF files with commentary at CMU)
QA76.9.A73 L48 1984 [Info] Capability-Based Computer Systems (1984), by Henry M. Levy (PDF files at Washington)

<previous -- A B C D E F G H J K L M N P Q R S T U V Z -- next>

Help with reading books -- Report a bad link -- Suggest a new listing

Home -- Search -- New Listings -- Authors -- Titles -- Subjects -- Serials

Books -- News -- Features -- Archives -- The Inside Story

Edited by John Mark Ockerbloom (
OBP copyright and licenses.