Computer programmersSee also what's at Wikipedia, your library, or elsewhere.
Broader term:Narrower terms:Used for:- Programmers, Computer
- Programmer
|
Filed under: Computer programmers Coding Freedom: The Ethics and Aesthetics of Hacking (Princeton: Princeton University Press, c2013), by E. Gabriella Coleman (PDF with commentary at codingfreedom.com and gabriellacoleman.org) 97 Things Every Programmer Should Know (wiki version, ca. 2010), ed. by Kevlin Henney (HTML at oreilly.com) Profiles--computer sciences : human resources and funding. (Washington, D.C. : National Science Foundation, [1988]), by Melissa J. Lane and National Science Foundation (U.S.) (page images at HathiTrust) Occupational survey report on business data programmers : task data from workers and supervisors indicating job relevance and training criticalness / (Columbus, Ohio : Center for Vocational Education, The Ohio State University, 1974), by Harry L. Ammerman and Frank C. Pratzner (page images at HathiTrust) Computer professionals. ([Washington, D.C.?] : Defense Intelligence Agency, [1987?]), by United States. Defense Intelligence Agency (page images at HathiTrust) Federal scientific and technical workers : numbers and characteristics : final report / ([Washington, D.C.] : The Foundation, [1985-), by National Science Foundation (U.S.). Division of Science Resources Studies (page images at HathiTrust) An investigatory study into human problem solving capabilities as they relate to programmer efficiency / (Minneapolis, Minn. : Management Information Systems Research Center, Graduate School of Business Administration, University of Minnesota, [1972]), by Prescott F. Griffith, Robert M. Henry, and University of Minnesota. Management Information Systems Research Center (page images at HathiTrust; US access only) Computer and mathematics-related occupations. (Washington, D.C. : U.S. Dept. of Labor, Bureau of Labor Statistics : For sale by the Supt. of Docs, U.S. G.P.O., [1992]), by United States Bureau of Labor Statistics (page images at HathiTrust) ITC resources catalogue. (Washington, DC : Veterans Administration, Office of Data Management and Telecommunications, [1984]), by United States. Veterans Administration. Information Technology Center (page images at HathiTrust) Selected characteristics of persons in computer specialities, 1978 / (Washington, D.C. : U.S. Dept. of Commerce, Bureau of the Census : For sale by the Supt. of Docs., U.S. G.P.O., 1984), by Thomas J Palumbo and United States. Bureau of the Census. Population Division (page images at HathiTrust)
Filed under: Computer programmers -- Civil rights -- United StatesFiled under: Computer programmers -- Fiction Geek Mafia (c2006), by Rick Dakan The Heretic, by Jason K. Chapman (HTML at jasonkchapman.com)
Filed under: Hackers -- Fiction Homeland (2013), by Cory Doctorow (multiple formats with commentary at craphound.com) Little Brother (2008), by Cory Doctorow (multiple formats with commentary at craphound.com) Invisible Armies, by Jon Evans (HTML with commentary at rezendi.com and Wattpad) The Quantum Connection (included on a Baen CD image), by Travis S. Taylor This Blue Ball: A Weblog Novel, by Wayne V. Miller (multiple formats with commentary at thisblueball.com) Little Brother, by Cory Doctorow (Gutenberg ebook)
Filed under: Computer programmers -- United States -- Biography Free as in Freedom: Richard Stallman's Crusade for Free Software, by Sam Williams
Filed under: Hackers -- United States -- Biography Free as in Freedom: Richard Stallman's Crusade for Free Software, by Sam Williams Filed under: Hackers Coding Freedom: The Ethics and Aesthetics of Hacking (Princeton: Princeton University Press, c2013), by E. Gabriella Coleman (PDF with commentary at codingfreedom.com and gabriellacoleman.org) The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com) Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press) Medieval Hackers (Brooklyn: Punctum Books, c2015), by Kathleen E. Kennedy (PDF with commentary at Punctum Books) Cyber attack : is the government safe? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Sixth Congress, second session, March 2, 2000. (Washington : U.S. G.P.O. : For sale by the U.S. G.P.O., Supt. of Docs., Congressional Sales Office, 2000), by United States Senate Committee on Governmental Affairs (page images at HathiTrust) Cyber attack: Is the nation at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, June 24, 1998, by United States Senate Committee on Governmental Affairs (page images at HathiTrust) Internet denial of service attacks and the federal response : joint hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, and the Subcommittee On Criminal Justice Oversight of the Senate Committee on the Judiciary, One Hundred Sixth Congress, second session, February 29, 2000. (Washington : U.S. G.P.O. : For sale by the U.S. G.P.O., Supt. of Docs., Congressional Sales Office, 2000), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime and United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Criminal Justice Oversight (page images at HathiTrust) "Cyber attack : improving prevention and prosecution" : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining how to combat cyber attacks by improving prevention and prosecution, Scottsdale, AZ, April 21, 2000. (Washington : U.S. G.P.O. : [U.S. G.P.O., Supt. of Docs., Congressional Sales Office, distributor], 2001), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust) Cyber attacks : removing roadblocks to investigation and information sharing : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining the incidence of cyber attacks on the nation's information systems, focusing on removing roadblocks to investigation and information sharing, March 28, 2000. (Washington, DC : U.S. G.P.O., 2001), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust) Respawn : gamers, hackers, and technogenic life /, by Colin Milburn and Duke University Press (page images at HathiTrust) Scientific and Technical Intelligence Committee : proceedings from the Carnegie Mellon Workshop on Network Security. (Washington, D.C. : Document Expedition (DOCEX) Project, Exchange and Gift Division, Library of Congress ; Springfield, Va. : National Technical Information Service, [1997?]), by Carnegie Mellon Workshop on Network Security and United States Central Intelligence Agency (page images at HathiTrust)
Filed under: Hackers -- Australia -- Biography
Items below (if any) are from related and broader terms.
Filed under: Electronic data processing personnel Relationship of automatic data processing training curriculum & methodology in the Federal Government; report of a conference, May 15-20, 1967, Washington, D.C. ([Washington, D.C.] : U.S. Office of Education; [For sale by the Supt. of Docs., U.S. Govt. Print. Off., 1969]), by United States Office of Education and Association for Educational Data Systems (page images at HathiTrust) Personnel management survey : systems & data processing / ([Madison, Wis.?] : Bureau of Personnel, [1968]), by Wisconsin. Bureau of Personnel (page images at HathiTrust; US access only) Training and education programs in automatic data processing (ADP). (Washington : U.S. Civil Service Commission, Bureau of Training, 1977), by United States Civil Service Commission. Bureau of Training (page images at HathiTrust) Human resources for MIS : a report of research / (Minneapolis, Minn. : Management Information Systems Research Center, Graduate School of Business Administration, University of Minnesota, [1974]), by Robert M. Henry, LaSalle James, Gary W. Dickson, and University of Minnesota. Management Information Systems Research Center (page images at HathiTrust; US access only) Computer and mathematics-related occupations. (Washington, D.C. : U.S. Dept. of Labor, Bureau of Labor Statistics : For sale by the Supt. of Docs, U.S. G.P.O., [1992]), by United States Bureau of Labor Statistics (page images at HathiTrust) Transforming the IT and acquisition workforces : hearing before the Subcommittee on Technology and Procurement Policy of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, first session, October 4, 2001. (Washington : U.S. G.P.O. : For sale by the Supt. of Docs., U.S. G.P.O., [Congressional Sales Office], 2002), by United States. Congress. House. Committee on Government Reform. Subcommittee on Technology and Procurement Policy (page images at HathiTrust) Computer science training in the Department of Defense : the silent problem / (Fort Lesley J. McNair, Washington, DC : National Defense University Press ; Washington, D.C. : For sale by the Supt. of Docs., U.S. G.P.O., 1983), by Robert L. Hedges and National Defense University (page images at HathiTrust) Business data processing occupational performance survey : interim report / (Columbus : Center for Vocational and Technical Education, Ohio State University, 1973), by Sidney Dean Borcher and John W. Joyner (page images at HathiTrust; US access only)
Filed under: Electronic data processing personnel -- InterviewsFiled under: WebmastersMore items available under broader and related terms at left. |