The Online Books Page

Browsing Library of Congress Call Numbers : "QA76.9 .A25 .A275 2008" to "QA76.9 .A43 E54 2019" (Overview; Include extended shelves)

<previous -- A B C D E F G H J K L M N P Q R S T U V Z -- next>

:
Call number Item
Q Science (Go to start of category)
QA Mathematics and Computer Science (Go to start of category)
QA76.9 .A25 .A275 2008 [Info] Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge, MA and London: MIT Press, c2008), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press)
QA76.9 .A25 A52 [Info] A Guide to Understanding Identification and Authentication in Trusted Systems, by National Computer Security Center (U.S.) (HTML at fas.org)
QA76.9.A25 A53 1996 [Info] An Exploration of Cyberspace Security R&D Investment Strategies for DARPA: "The Day After ... in Cyberspace II" (1996), by Robert H. Anderson and Anthony C. Hearn (HTML at rand.org)
QA76.9 .A25 A54 2001 [Info] Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK)
QA76.9 .A25 C656 1988 [Info] Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org)
QA76.9 .A25 C6663 1990 [Info] Computers at Risk: Safe Computing in the Information Age (1991), by National Research Council Computer Science and Telecommunications Board (page images with commentary at NAP)
QA76.9 .A25 C73 1998 [Info] Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (1998), by Electronic Frontier Foundation (HTML at cryptome.org and other sites)
QA76.9 .A25 C87 2014 [Info] UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at bitsinthewind.com)
QA76.9.A25 D44 1987 [Info] Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton)
QA76.9 .A25 D46 1982 [Info] Cryptography and Data Security (Reading, MA et al.: Addison-Wesley, c1982), by Dorothy Elizabeth Robling Denning (PDF at npos.edu)
QA76.9 .A25 E5425 2007 [Info] Engaging Privacy and Information Technology in a Digital Age (2007), ed. by James Waldo, Herbert Lin, and Lynette I. Millett (HTML and page images with commentary at NAP)
QA76.9 .A25 G54 [Info] A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org)
QA76.9 .A25 G85 1988 [Info] A Guide to Understanding Audit in Trusted Systems (version 2, 1988), by National Computer Security Center (U.S.) (HTML at fas.org)
QA76.9 .A25 G852 1988 [Info] A Guide to Understanding Trusted Distribution in Trusted Systems (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org)
QA76.9 .A25 H376 2013 [Info] Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (multiple formats with commentary at SpringerLink)
QA76.9.A25 H6985 2004 [Info] Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com)
QA76.9.A25 H83 2013 [Info] Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press)
QA76.9 .A25 I5853 2007 [Info] Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com)
QA76.9.A25 I87 1995 [Info] Issue Update on Information Security and Privacy in Network Environments (Washington: GPO, 1995), by United States Congress Office of Technology Assessment
QA76.9 .A25 L97 2018 [Info] The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Cham et al.: Springer Open, c2018), by Olav Lysne (PDF and Epub with commentary at SpringerLink)
QA76.9 .A25 M463 [Info] Handbook of Applied Cryptography, by Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone (PDF and Postscript files with commentary at Waterloo)
QA76.9.A25 M47 [Info] A Guide to Understanding Configuration Management in Trusted Systems (version 1, 1988), by James N. Menendez (HTML at fas.org)
QA76.9 .A25 S9317 [Info] Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com)
QA76.9 .A25 U55 [Info] China's Censorship of the Internet and Social Media, the Human Toll and Trade Impact: Hearing Before the Congressional-Executive Commission on China, One Hundred Twelfth Congress, First Session, November 17, 2011 (Washington: GPO, 2012), by United States Congressional-Executive Commission on China (page images at HathiTrust)
QA76.9 .A43 E54 2019 [Info] Algorithms (c2019), by Jeff Erickson (PDF files with commentary at Illinois)

<previous -- A B C D E F G H J K L M N P Q R S T U V Z -- next>

Help with reading books -- Report a bad link -- Suggest a new listing

Home -- Search -- New Listings -- Authors -- Titles -- Subjects -- Serials

Books -- News -- Features -- Archives -- The Inside Story

Edited by John Mark Ockerbloom (onlinebooks@pobox.upenn.edu)
OBP copyrights and licenses.