Browsing Library of Congress Call Numbers : "QA76.8 .P138" to "QA76.9 .A25 E5425 2007" (Overview; Include extended shelves)
<previous -- A B C D E F G H J K L M N P Q R S T U V Z -- next>
Call number | Item |
Q | Science (Go to start of category) |
QA | Mathematics and Computer Science (Go to start of category) |
QA76.8 .P138 | Palm OS Programming Development Tools Guide (c2003), by Brian Maas (HTML at Wayback Machine) |
QA76.8 .S625 V5 1981 | ZX81 Basic Programming (second edition; 1981), by Steven Vickers (frame-dependent HTML at worldofspectrum.org) |
QA76.8 .S635 G638 1984 | Smalltalk-80: The Interactive Programming Environment (c1984), by Adele Goldberg (PDF at free.fr) |
QA76.8 .S635 G639 1983 | Smalltalk-80: The Language and its Implementation (c1983), by Adele Goldberg and David Robson (PDF at free.fr) |
QA76.8.T133 S53 1983 | Getting Started with the Texas Instruments TI99/4A (1983), by Stephen Shaw (HTML with commentary in the UK) |
QA76.8 .U65 B44 1979 | Unix Time-Sharing System: Unix Programmer's Manual (seventh edition, 1979), by Bell Telephone Laboratories (troff, PDF, and gzipped Postscript at Bell Labs) |
QA76.83 .P98 | Dive Into Python (2004), by Mark Pilgrim (multiple formats at archive.org) |
QA76.83 .P98 | Dive Into Python 3, by Mark Pilgrim (HTML with commentary at problemsolving.io) |
QA76.88 .E55 2016 | Introduction to High Performance Scientific Computing (second edition, revised 2016), by Victor Eijkhout, contrib. by Edmond Chow and Robert A. Van de Geijn (PDF with commentary at bitbucket.org) |
QA76.88 .F76 1994 | Frontiers of Supercomputing II: A National Reassessment (Berkeley: University of California Press, 1994), ed. by Karyn R. Ames and Alan Brenner (HTML at UC Press) |
QA76.88 .N37 1996 | Computing and Communications in the Extreme: Research for Crisis Management and Other Applications, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP) |
QA76.9 | Logical Methods in Computer Science (2005-) (full serial archives) |
QA76.9.A23 T68 1990 | Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System, by National Computer Security Center (U.S.) (HTML at usmc.mil) |
QA76.9.A25 | Freedom on the Net, by Freedom House (U.S.) (partial serial archives) |
QA76.9 .A25 .A275 2008 | Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge, MA and London: MIT Press, c2008), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press) |
QA76.9 .A25 A52 | A Guide to Understanding Identification and Authentication in Trusted Systems, by National Computer Security Center (U.S.) (HTML at fas.org) |
QA76.9.A25 A53 1996 | An Exploration of Cyberspace Security R&D Investment Strategies for DARPA: "The Day After ... in Cyberspace II" (1996), by Robert H. Anderson and Anthony C. Hearn (HTML at rand.org) |
QA76.9 .A25 A54 2001 | Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK) |
QA76.9 .A25 C656 1988 | Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org) |
QA76.9 .A25 C6663 1990 | Computers at Risk: Safe Computing in the Information Age (1991), by National Research Council Computer Science and Telecommunications Board (page images with commentary at NAP) |
QA76.9 .A25 C73 1998 | Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (1998), by Electronic Frontier Foundation (HTML at cryptome.org and other sites) |
QA76.9 .A25 C87 2014 | UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at bitsinthewind.com) |
QA76.9.A25 D44 1987 | Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton) |
QA76.9 .A25 D46 1982 | Cryptography and Data Security (Reading, MA et al.: Addison-Wesley, c1982), by Dorothy Elizabeth Robling Denning (PDF at npos.edu) |
QA76.9 .A25 E5425 2007 | Engaging Privacy and Information Technology in a Digital Age (2007), ed. by James Waldo, Herbert Lin, and Lynette I. Millett (HTML and page images with commentary at NAP) |
<previous -- A B C D E F G H J K L M N P Q R S T U V Z -- next>
Help with reading books -- Report a bad link -- Suggest a new listing
Home -- Search -- New Listings -- Authors -- Titles -- Subjects -- Serials
Books -- News -- Features -- Archives -- The Inside Story
Edited by John Mark Ockerbloom (onlinebooks@pobox.upenn.edu)
OBP copyrights and licenses.