Computer systems -- VerificationSee also what's at your library, or elsewhere.
Broader term:Narrower term:Used for:- Verification of computer systems
|
Filed under: Computer programs -- Verification
Items below (if any) are from related and broader terms.
Filed under: Computers -- Access control Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge, MA and London: MIT Press, c2008), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press) Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (1998), by Electronic Frontier Foundation (HTML at cryptome.org and other sites) Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org) A Guide to Understanding Discretionary Access Control in Trusted Systems (version 1, 1987), by Carole Jordan (HTML at fas.org) Cryptography and Data Security (Reading, MA et al.: Addison-Wesley, c1982), by Dorothy Elizabeth Robling Denning (PDF at npos.edu) A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org) Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (Cambridge, MA and London: MIT Press, c2010), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press) A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org) Rating Maintenance Phase Program Document, by Tommy Hammer (HTML at usmc.mil) Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com) Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System, by National Computer Security Center (U.S.) (HTML at usmc.mil) Filed under: Computer systems -- SpecificationsFiled under: Computer security Bounty Everything: Hackers and the Making of the Global Bug Marketplace (New York: Data and Society, 2022), by Ryan Ellis and Yuan Stevens (PDF with commentary at datasociety.net) The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Cham et al.: Springer Open, c2018), by Olav Lysne (PDF and Epub with commentary at SpringerLink) UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at bitsinthewind.com) Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press) Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (multiple formats with commentary at SpringerLink) Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK) Computers at Risk: Safe Computing in the Information Age (1991), by National Research Council Computer Science and Telecommunications Board (page images with commentary at NAP) A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org) The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com) Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com) A Guide to Understanding Data Remanence in Automated Information Systems (version 2; 1991), by James K. Goldson (HTML at fas.org) The End of Trust (McSweeney's #54; 2018), ed. by McSweeney's (Firm) (PDF at eff.org) Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com) Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com) Securing Java: Getting Down to Business with Mobile Code, by Gary McGraw and Ed Felten (illustrated HTML with commentary at securingjava.com) Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com) For the Record: Protecting Electronic Health Information, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP) Filed under: Computers How Computers Work: Processor and Main Memory (c2009), by Roger Young (HTML, PDF, and Word at fastchip.net) Tools For Thought: The People and Ideas of the Next Computer Revolution (1985), by Howard Rheingold (HTML at rheingold.com) Are We Spiritual Machines? Ray Kurzweil vs. the Critics of Strong A.I. (c2002), ed. by Jay W. Richards, contrib. by Ray Kurzweil, John R. Searle, Michael J. Denton, William A. Dembski, Thomas S. Ray, and George F. Gilder (at kurzweilai.net) Principles of Control Systems Engineering (New York et al.: McGraw-Hill Book Co., 1960), by Vincent Del Toro and Sydney R. Parker (page images at HathiTrust) The Best of Creative Computing, ed. by David H. Ahl and Burchanel Green Filed under: Embedded computer systemsFiled under: Expert systems (Computer science)Filed under: Information storage and retrieval systems Digital Images in Education: Realising the Vision (London: JISC Collections, 2007), ed. by Leona Carpenter and Caren Milloy (PDF files with commentary at JISC Collections) An Assessment of Information Systems Capabilities Required To Support U.S. Materials Policy Decisions (1976), by United States Congress Office of Technology Assessment (PDF files at Princeton) Contexts and Contributions: Building the Distributed Library (2006), by Martha L. Brogan (PDF and HTML at diglib.org) A Survey of Digital Library Aggregation Services (2003), by Martha L. Brogan (PDF and HTML at diglib.org) Engaging Researchers with Data Management: The Cookbook (Cambridge, UK: Open Book Publishers, c2019), by Connie Clare, Maria J. Cruz, Elli Papadopoulou, James Savage, Marta Teperek, Yan Wang, Iza Witkowska, and Joanne Yeomans (multiple formats with commentary at Open Book Publishers) The Changing Nature of the Catalog and its Integration with Other Discovery Tools (final report to Library of Congress, 2006), by Karen Calhoun (PDF at loc.gov) Masked by Trust: Bias in Library Discovery (Sacramento: Litwin Books, 2019), by Matthew Reidsma (PDF with commentary at reidsrow.com) Research Data Management: Principles, Practices, and Prospects (CLIR publication #160; c2013), by Council on Library and Information Resources (PDF with commentary at clir.org) The Fourth Paradigm: Data-Intensive Scientific Discovery (Redmond, WA: Microsoft Research, c2009), ed. by Anthony J. G. Hey, Stewart Tansley, and Kristin Michele Tolle (PDF files with commentary at Microsoft) Notes on Digital Computers and Data Processors, Prepared for Special Summer Conferences at the University of Michigan (supplements not included, some pages out of order; 1956), ed. by John W. Carr and Norman R. Scott (page images at HathiTrust) Information Retrieval (second edition), by C. J. Van Rijsbergen (HTML in the UK) Handbook for Digital Projects: A Management Tool for Preservation and Access (2000), ed. by Maxine K. Sitts (PDF at nedcc.org) Systems of Knowledge Organization for Digital Libraries: Beyond Traditional Authority Files (2000), by Gail M. Hodge (PDF at clir.org)
More items available under broader and related terms at left. |