The Online Books Page

Browsing Library of Congress Call Numbers : "QA76.8 .P138" to "QA76.9 .A25 E5425 2007" (Overview; Include extended shelves)

<previous -- A B C D E F G H J K L M N P Q R S T U V Z -- next>

:
Call number Item
Q Science (Go to start of category)
QA Mathematics and Computer Science (Go to start of category)
QA76.8 .P138 [Info] Palm OS Programming Development Tools Guide (c2003), by Brian Maas (HTML at Wayback Machine)
QA76.8 .S625 V5 1981 [Info] ZX81 Basic Programming (second edition; 1981), by Steven Vickers (frame-dependent HTML at worldofspectrum.org)
QA76.8 .S635 G638 1984 [Info] Smalltalk-80: The Interactive Programming Environment (c1984), by Adele Goldberg (PDF at free.fr)
QA76.8 .S635 G639 1983 [Info] Smalltalk-80: The Language and its Implementation (c1983), by Adele Goldberg and David Robson (PDF at free.fr)
QA76.8.T133 S53 1983 [Info] Getting Started with the Texas Instruments TI99/4A (1983), by Stephen Shaw (HTML with commentary in the UK)
QA76.8 .U65 B44 1979 [Info] Unix Time-Sharing System: Unix Programmer's Manual (seventh edition, 1979), by Bell Telephone Laboratories (troff, PDF, and gzipped Postscript at Bell Labs)
QA76.83 .P98 [Info] Dive Into Python (2004), by Mark Pilgrim (multiple formats at archive.org)
QA76.83 .P98 [Info] Dive Into Python 3, by Mark Pilgrim (HTML with commentary at problemsolving.io)
QA76.88 .E55 2016 [Info] Introduction to High Performance Scientific Computing (second edition, revised 2016), by Victor Eijkhout, contrib. by Edmond Chow and Robert A. Van de Geijn (PDF with commentary at bitbucket.org)
QA76.88 .F76 1994 [Info] Frontiers of Supercomputing II: A National Reassessment (Berkeley: University of California Press, 1994), ed. by Karyn R. Ames and Alan Brenner (HTML at UC Press)
QA76.88 .N37 1996 [Info] Computing and Communications in the Extreme: Research for Crisis Management and Other Applications, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP)
QA76.9 [Info] Logical Methods in Computer Science (2005-) (full serial archives)
QA76.9.A23 T68 1990 [Info] Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System, by National Computer Security Center (U.S.) (HTML at usmc.mil)
QA76.9.A25 [Info] Freedom on the Net, by Freedom House (U.S.) (partial serial archives)
QA76.9 .A25 .A275 2008 [Info] Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge, MA and London: MIT Press, c2008), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press)
QA76.9 .A25 A52 [Info] A Guide to Understanding Identification and Authentication in Trusted Systems, by National Computer Security Center (U.S.) (HTML at fas.org)
QA76.9.A25 A53 1996 [Info] An Exploration of Cyberspace Security R&D Investment Strategies for DARPA: "The Day After ... in Cyberspace II" (1996), by Robert H. Anderson and Anthony C. Hearn (HTML at rand.org)
QA76.9 .A25 A54 2001 [Info] Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK)
QA76.9 .A25 C656 1988 [Info] Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org)
QA76.9 .A25 C6663 1990 [Info] Computers at Risk: Safe Computing in the Information Age (1991), by National Research Council Computer Science and Telecommunications Board (page images with commentary at NAP)
QA76.9 .A25 C73 1998 [Info] Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (1998), by Electronic Frontier Foundation (HTML at cryptome.org and other sites)
QA76.9 .A25 C87 2014 [Info] UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at bitsinthewind.com)
QA76.9.A25 D44 1987 [Info] Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton)
QA76.9 .A25 D46 1982 [Info] Cryptography and Data Security (Reading, MA et al.: Addison-Wesley, c1982), by Dorothy Elizabeth Robling Denning (PDF at npos.edu)
QA76.9 .A25 E5425 2007 [Info] Engaging Privacy and Information Technology in a Digital Age (2007), ed. by James Waldo, Herbert Lin, and Lynette I. Millett (HTML and page images with commentary at NAP)

<previous -- A B C D E F G H J K L M N P Q R S T U V Z -- next>

Help with reading books -- Report a bad link -- Suggest a new listing

Home -- Search -- New Listings -- Authors -- Titles -- Subjects -- Serials

Books -- News -- Features -- Archives -- The Inside Story

Edited by John Mark Ockerbloom (onlinebooks@pobox.upenn.edu)
OBP copyrights and licenses.