The Online Books Page

Browsing Library of Congress Call Numbers : "QA76.9 .A25 E5425 2007" to "QA76.9 .C65 S385 2012" (Overview; Include extended shelves)

<previous -- A B C D E F G H J K L M N P Q R S T U V Z -- next>

Or start at this prefix:
Call number Item
Q Science (Go to start of category)
QA Mathematics and Computer Science (Go to start of category)
QA76.9 .A25 E5425 2007 [Info] Engaging Privacy and Information Technology in a Digital Age (2007), ed. by James Waldo, Herbert Lin, and Lynette I. Millett (HTML and page images with commentary at NAP)
QA76.9 .A25 G54 [Info] A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at
QA76.9 .A25 G85 1988 [Info] A Guide to Understanding Audit in Trusted Systems (version 2, 1988), by National Computer Security Center (U.S.) (HTML at
QA76.9 .A25 G852 1988 [Info] A Guide to Understanding Trusted Distribution in Trusted Systems (version 1, 1988), by National Computer Security Center (U.S.) (HTML at
QA76.9 .A25 H376 2013 [Info] Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (PDF files with commentary at
QA76.9.A25 H6985 2004 [Info] Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at
QA76.9.A25 H83 2013 [Info] Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press)
QA76.9 .A25 I5853 2007 [Info] Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at
QA76.9.A25 I87 1995 [Info] Issue Update on Information Security and Privacy in Network Environments (Washington: GPO, 1995), by United States Congress Office of Technology Assessment
QA76.9 .A25 M463 [Info] Handbook of Applied Cryptography, by Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone (PDF and Postscript files with commentary at Waterloo)
QA76.9.A25 M47 [Info] A Guide to Understanding Configuration Management in Trusted Systems (version 1, 1988), by James N. Menendez (HTML at
QA76.9 .A25 S9317 [Info] Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at
QA76.9 .A73 [Info] Computer Architecture and Interfacing to Mechatronic Systems (1994), by Dario J. Toncich (PDF files at
QA76.9.A73 C65 [Info] Computer Structures: Principles and Examples (1982), ed. by Daniel P. Siewiorek, C. Gordon Bell, and Allen Newell (illustrated HTML at Microsoft)
QA76.9.A73 D68 1998 [Info] High Performance Computing (electronic edition, 2009), by Charles R. Severance and Kevin Dowd (PDF and EPUB at
QA76.9 .A73 K66 [Info] An Architecture for Combinator Graph Reduction, by Philip Koopman (PDF files with commentary at CMU)
QA76.9.A73 L48 1984 [Info] Capability-Based Computer Systems (1984), by Henry M. Levy (PDF files at Washington)
QA76.9.A96 C45 2016 [Info] Certified Programming with Dependent Types (latest electronic edition), by Adam Chlipala (PDF and HTML with commentary at
QA76.9.A96 G35 1986 [Info] Logic for Computer Science: Foundations of Automatic Theorem Proving (revised edition, 2003, with errata for the original edition and other papers), by Jean H. Gallier (PDF and Postscript files here at Penn)
QA76.9 .A96 I47 [Info] Implementing Mathematics with the Nuprl Proof Development System (1985), ed. by R. L. Constable (illustrated HTML at Cornell)
QA76.9 .A96 N57 2018 [Info] Concrete Semantics with Isabelle/HOL (2018), by Tobias Nipkow and Gerwin Klein (PDF with commentary at
QA76.9 .B45 R53 2018 [Info] The Big Data Agenda: Data Ethics and Critical Data Studies (London: University of Westminster Press, 2018), by Annika Richterich
QA76.9.C55 T478 2004 [Info] Cross-Platform GUI Programming with wxWidgets, by Julian Smart and Kevin Hock, contrib. by Stefan Csomor (PDF at
QA76.9.C55 T478 2004 [Info] Samba-3 by Example: Practical Exercises to Successful Deployment (second edition, 2005), by John H. Terpstra (PDF at
QA76.9 .C65 S385 2012 [Info] The Nature of Code (c2012), by Daniel Shiffman, ed. by Shannon Fry, illust. by Zannah Marsh (illustrated HTML with commentary at

<previous -- A B C D E F G H J K L M N P Q R S T U V Z -- next>

Help with reading books -- Report a bad link -- Suggest a new listing

Home -- Search -- New Listings -- Authors -- Titles -- Subjects -- Serials

Books -- News -- Features -- Archives -- The Inside Story

Edited by John Mark Ockerbloom (
OBP copyright and licenses.