The Online Books Page

Browsing Library of Congress Call Numbers : "QA76.8 .S635 G639 1983" to "QA76.9.A25 H6985 2004" (Overview; Include extended shelves)

<previous -- A B C D E F G H J K L M N P Q R S T U V Z -- next>

Or start at this prefix:
Call number Item
Q Science (Go to start of category)
QA Mathematics and Computer Science (Go to start of category)
QA76.8 .S635 G639 1983 [Info] Smalltalk-80: The Language and its Implementation (c1983), by Adele Goldberg and David Robson (PDF at
QA76.8.T133 S53 1983 [Info] Getting Started with the Texas Instruments TI99/4A (1983), by Stephen Shaw (HTML with commentary in the UK)
QA76.8 .U65 B44 1979 [Info] Unix Time-Sharing System: Unix Programmer's Manual (seventh edition, 1979), by Bell Telephone Laboratories (troff, PDF, and gzipped Postscript at Bell Labs)
QA76.83 .P98 [Info] Dive Into Python (2004), by Mark Pilgrim (PDF at
QA76.83 .P98 [Info] Dive Into Python 3, by Mark Pilgrim (HTML with commentary at
QA76.88 .E55 2016 [Info] Introduction to High Performance Scientific Computing (second edition, revised 2016), by Victor Eijkhout, contrib. by Edmond Chow and Robert A. Van de Geijn (PDF with commentary at
QA76.88 .F76 1994 [Info] Frontiers of Supercomputing II: A National Reassessment (Berkeley: University of California Press, 1994), ed. by Karyn R. Ames and Alan Brenner (HTML at UC Press)
QA76.88 .N37 1996 [Info] Computing and Communications in the Extreme: Research for Crisis Management and Other Applications, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP)
QA76.9 [Info] Logical Methods in Computer Science (2005-) (full serial archives)
QA76.9.A23 T68 1990 [Info] Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System, by National Computer Security Center (U.S.) (HTML at
QA76.9.A25 [Info] Freedom on the Net, by Freedom House (U.S.) (partial serial archives)
QA76.9 .A25 A52 [Info] A Guide to Understanding Identification and Authentication in Trusted Systems, by National Computer Security Center (U.S.) (HTML at
QA76.9.A25 A53 1996 [Info] An Exploration of Cyberspace Security R&D Investment Strategies for DARPA: "The Day After ... in Cyberspace II" (1996), by Robert H. Anderson and Anthony C. Hearn (HTML at
QA76.9 .A25 A54 2001 [Info] Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK)
QA76.9 .A25 C656 1988 [Info] Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at
QA76.9 .A25 C6663 1990 [Info] Computers at Risk: Safe Computing in the Information Age, by National Research Council Computer Science and Telecommunications Board (page images at NAP)
QA76.9 .A25 C73 1998 [Info] Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (1998), by Electronic Frontier Foundation (HTML at and other sites)
QA76.9 .A25 C87 2014 [Info] UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at
QA76.9.A25 D44 1987 [Info] Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton)
QA76.9 .A25 E5425 2007 [Info] Engaging Privacy and Information Technology in a Digital Age (2007), ed. by James Waldo, Herbert Lin, and Lynette I. Millett (HTML and page images with commentary at NAP)
QA76.9 .A25 G54 [Info] A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at
QA76.9 .A25 G85 1988 [Info] A Guide to Understanding Audit in Trusted Systems (version 2, 1988), by National Computer Security Center (U.S.) (HTML at
QA76.9 .A25 G852 1988 [Info] A Guide to Understanding Trusted Distribution in Trusted Systems (version 1, 1988), by National Computer Security Center (U.S.) (HTML at
QA76.9 .A25 H376 2013 [Info] Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (PDF files with commentary at
QA76.9.A25 H6985 2004 [Info] Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at

<previous -- A B C D E F G H J K L M N P Q R S T U V Z -- next>

Help with reading books -- Report a bad link -- Suggest a new listing

Home -- Search -- New Listings -- Authors -- Titles -- Subjects -- Serials

Books -- News -- Features -- Archives -- The Inside Story

Edited by John Mark Ockerbloom (
OBP copyright and licenses.