Embedded computer systemsSee also what's at Wikipedia, your library, or elsewhere.
Broader term:Narrower terms:Used for:- Embedded systems (Computer systems)
- Embedded system
|
Filed under: Embedded computer systems
Filed under: Embedded computer systems -- Design and constructionFiled under: Embedded computer systems -- Programming
Filed under: Embedded computer systems -- Research -- United StatesFiled under: Cooperating objects (Computer systems)Filed under: Ubiquitous computing
Filed under: Ubiquitous computing -- Social aspects
Items below (if any) are from related and broader terms.
Filed under: Computer systems -- Specifications
Filed under: Computer security Bounty Everything: Hackers and the Making of the Global Bug Marketplace (New York: Data and Society, 2022), by Ryan Ellis and Yuan Stevens (PDF with commentary at datasociety.net) The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Cham et al.: Springer Open, c2018), by Olav Lysne (PDF and Epub with commentary at SpringerLink) UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at bitsinthewind.com) Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press) Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (multiple formats with commentary at SpringerLink) Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK) Computers at Risk: Safe Computing in the Information Age (1991), by National Research Council Computer Science and Telecommunications Board (page images with commentary at NAP) A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org) Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment (Berkeley: APress Open, c2020), by Daniel J. Blum (PDF with commentary at OAPEN) The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com) Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com) A Guide to Understanding Data Remanence in Automated Information Systems (version 2; 1991), by James K. Goldson (HTML at fas.org) The End of Trust (McSweeney's #54; 2018), ed. by McSweeney's (Firm) (PDF at eff.org) Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com) Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com) Securing Java: Getting Down to Business with Mobile Code, by Gary McGraw and Ed Felten (illustrated HTML with commentary at securingjava.com) Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com) For the Record: Protecting Electronic Health Information, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP) Filed under: Computer softwareFiled under: Computers How Computers Work: Processor and Main Memory (c2009), by Roger Young (HTML, PDF, and Word at fastchip.net) Tools For Thought: The People and Ideas of the Next Computer Revolution (1985), by Howard Rheingold (HTML at rheingold.com) Are We Spiritual Machines? Ray Kurzweil vs. the Critics of Strong A.I. (c2002), ed. by Jay W. Richards, contrib. by Ray Kurzweil, John R. Searle, Michael J. Denton, William A. Dembski, Thomas S. Ray, and George F. Gilder (at kurzweilai.net) Principles of Control Systems Engineering (New York et al.: McGraw-Hill Book Co., 1960), by Vincent Del Toro and Sydney R. Parker (page images at HathiTrust) The Best of Creative Computing, ed. by David H. Ahl and Burchanel Green Filed under: Expert systems (Computer science)Filed under: Information storage and retrieval systems Digital Images in Education: Realising the Vision (London: JISC Collections, 2007), ed. by Leona Carpenter and Caren Milloy (PDF files with commentary at JISC Collections) An Assessment of Information Systems Capabilities Required To Support U.S. Materials Policy Decisions (1976), by United States Congress Office of Technology Assessment (PDF files at Princeton) Contexts and Contributions: Building the Distributed Library (Washington: Digital Library Federation, 2006), by Martha L. Brogan (PDF here at Penn) A Survey of Digital Library Aggregation Services (Washington: Digital Library Federation, 2003), by Martha L. Brogan (PDF here at Penn) Engaging Researchers with Data Management: The Cookbook (Cambridge, UK: Open Book Publishers, c2019), by Connie Clare, Maria J. Cruz, Elli Papadopoulou, James Savage, Marta Teperek, Yan Wang, Iza Witkowska, and Joanne Yeomans (multiple formats with commentary at Open Book Publishers) The Changing Nature of the Catalog and its Integration with Other Discovery Tools (final report to Library of Congress, 2006), by Karen Calhoun (PDF at loc.gov) Masked by Trust: Bias in Library Discovery (Sacramento: Litwin Books, 2019), by Matthew Reidsma (PDF with commentary at reidsrow.com) Research Data Management: Principles, Practices, and Prospects (CLIR publication #160; c2013), by Council on Library and Information Resources (PDF with commentary at clir.org) The Fourth Paradigm: Data-Intensive Scientific Discovery (Redmond, WA: Microsoft Research, c2009), ed. by Anthony J. G. Hey, Stewart Tansley, and Kristin Michele Tolle (PDF files with commentary at Microsoft) Notes on Digital Computers and Data Processors, Prepared for Special Summer Conferences at the University of Michigan (supplements not included, some pages out of order; 1956), ed. by John W. Carr and Norman R. Scott (page images at HathiTrust) Information Retrieval (second edition), by C. J. Van Rijsbergen (HTML in the UK) Handbook for Digital Projects: A Management Tool for Preservation and Access (2000), ed. by Maxine K. Sitts (PDF at nedcc.org) Systems of Knowledge Organization for Digital Libraries: Beyond Traditional Authority Files (2000), by Gail M. Hodge (PDF at clir.org) Filed under: Interactive computer systemsFiled under: Little Smalltalk (Computer system)Filed under: Transaction systems (Computer systems)More items available under broader and related terms at left. |