Computer input-output equipmentSee also what's at your library, or elsewhere.
Broader terms:Narrower terms:Used for:- Computer I/O equipment
- Computer hardware
- Computers -- Input-output equipment
- Electronic analog computers -- Input-output equipment
- Electronic digital computers -- Input-output equipment
- Hardware, Computer
- I/O equipment (Computers)
- Input equipment (Computers)
- Input-output equipment (Computers)
- Output equipment (Computers)
|
Filed under: Computer input-output equipment -- Amateurs' manuals
Filed under: Epson printers
Filed under: Punched card systems
Filed under: Punched card systems -- AstronomyFiled under: Punched card systems -- HistoryFiled under: Virtual storage (Computer science)
Filed under: Information display systems -- Case studiesFiled under: Information display systems -- United States- Flat Panel Displays in Perspective (1995), by United States Congress Office of Technology Assessment
Filed under: Electroluminescent display systems -- United States- Flat Panel Displays in Perspective (1995), by United States Congress Office of Technology Assessment
Filed under: Flat panel displays -- United States- Flat Panel Displays in Perspective (1995), by United States Congress Office of Technology Assessment
Filed under: Cathode ray tubes
Filed under: Oscillators, Sweep
Filed under: HolographyFiled under: Optical character recognition devices
Items below (if any) are from related and broader terms.
Filed under: Computer systems -- Specifications
Filed under: Computer security- Bounty Everything: Hackers and the Making of the Global Bug Marketplace (New York: Data and Society, 2022), by Ryan Ellis and Yuan Stevens (PDF with commentary at datasociety.net)
- The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Cham et al.: Springer Open, c2018), by Olav Lysne (PDF and Epub with commentary at SpringerLink)
- UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at bitsinthewind.com)
- Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press)
- Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (multiple formats with commentary at SpringerLink)
- Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK)
- Computers at Risk: Safe Computing in the Information Age (1991), by National Research Council Computer Science and Telecommunications Board (page images with commentary at NAP)
- A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org)
- The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com)
- Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com)
- A Guide to Understanding Data Remanence in Automated Information Systems (version 2; 1991), by James K. Goldson (HTML at fas.org)
- The End of Trust (McSweeney's #54; 2018), ed. by McSweeney's (Firm) (PDF at eff.org)
- Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com)
- Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com)
- Securing Java: Getting Down to Business with Mobile Code, by Gary McGraw and Ed Felten (illustrated HTML with commentary at securingjava.com)
- Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com)
- For the Record: Protecting Electronic Health Information, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP)
Filed under: Computers- How Computers Work: Processor and Main Memory (c2009), by Roger Young (HTML, PDF, and Word at fastchip.net)
- Tools For Thought: The People and Ideas of the Next Computer Revolution (1985), by Howard Rheingold (HTML at rheingold.com)
- Are We Spiritual Machines? Ray Kurzweil vs. the Critics of Strong A.I. (c2002), ed. by Jay W. Richards, contrib. by Ray Kurzweil, John R. Searle, Michael J. Denton, William A. Dembski, Thomas S. Ray, and George F. Gilder (at kurzweilai.net)
- Principles of Control Systems Engineering (New York et al.: McGraw-Hill Book Co., 1960), by Vincent Del Toro and Sydney R. Parker (page images at HathiTrust)
- The Best of Creative Computing, ed. by David H. Ahl and Burchanel Green
Filed under: Embedded computer systemsFiled under: Expert systems (Computer science)Filed under: Information storage and retrieval systems- Digital Images in Education: Realising the Vision (London: JISC Collections, 2007), ed. by Leona Carpenter and Caren Milloy (PDF files with commentary at JISC Collections)
- An Assessment of Information Systems Capabilities Required To Support U.S. Materials Policy Decisions (1976), by United States Congress Office of Technology Assessment (PDF files at Princeton)
- Contexts and Contributions: Building the Distributed Library (2006), by Martha L. Brogan (PDF and HTML at diglib.org)
- A Survey of Digital Library Aggregation Services (2003), by Martha L. Brogan (PDF and HTML at diglib.org)
- Engaging Researchers with Data Management: The Cookbook (Cambridge, UK: Open Book Publishers, c2019), by Connie Clare, Maria J. Cruz, Elli Papadopoulou, James Savage, Marta Teperek, Yan Wang, Iza Witkowska, and Joanne Yeomans (multiple formats with commentary at Open Book Publishers)
- The Changing Nature of the Catalog and its Integration with Other Discovery Tools (final report to Library of Congress, 2006), by Karen Calhoun (PDF at loc.gov)
- Masked by Trust: Bias in Library Discovery (Sacramento: Litwin Books, 2019), by Matthew Reidsma (PDF with commentary at reidsrow.com)
- Research Data Management: Principles, Practices, and Prospects (CLIR publication #160; c2013), by Council on Library and Information Resources (PDF with commentary at clir.org)
- The Fourth Paradigm: Data-Intensive Scientific Discovery (Redmond, WA: Microsoft Research, c2009), ed. by Anthony J. G. Hey, Stewart Tansley, and Kristin Michele Tolle (PDF files with commentary at Microsoft)
- Notes on Digital Computers and Data Processors, Prepared for Special Summer Conferences at the University of Michigan (supplements not included, some pages out of order; 1956), ed. by John W. Carr and Norman R. Scott (page images at HathiTrust)
- Information Retrieval (second edition), by C. J. Van Rijsbergen (HTML in the UK)
- Handbook for Digital Projects: A Management Tool for Preservation and Access (2000), ed. by Maxine K. Sitts (PDF at nedcc.org)
- Systems of Knowledge Organization for Digital Libraries: Beyond Traditional Authority Files (2000), by Gail M. Hodge (PDF at clir.org)
More items available under broader and related terms at left. |