Electronic data processing personnel -- InterviewsSee also what's at your library, or elsewhere.
Broader terms: |
Filed under: Electronic data processing personnel -- Interviews
Items below (if any) are from related and broader terms.
Filed under: Electronic data processing personnel
Filed under: Electronic data processing personnel -- Case studiesFiled under: Electronic data processing personnel -- Job descriptions
Filed under: Electronic data processing personnel -- Recruiting -- Government policy -- United StatesFiled under: Electronic data processing personnel -- Training of
Filed under: Electronic data processing personnel -- Training of -- United States
Filed under: Computer programmers -- Training of -- United States
Filed under: Electronic data processing personnel -- United States -- CongressesFiled under: Computer programmers -- United States
Filed under: Computer programmers -- United States -- Biography Free as in Freedom: Richard Stallman's Crusade for Free Software, by Sam Williams
Filed under: Hackers -- United States -- Biography Free as in Freedom: Richard Stallman's Crusade for Free Software, by Sam Williams Filed under: Computer programmers -- United States -- Statistics
Filed under: Computer programmers -- United States -- Statistics -- PeriodicalsFiled under: Computer programmers -- Employment -- United States -- StatisticsFiled under: Hackers -- United States Cyber attack : is the government safe? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Sixth Congress, second session, March 2, 2000. (U.S. G.P.O. :, 2000), by United States Senate Committee on Governmental Affairs (page images at HathiTrust) Internet denial of service attacks and the federal response : joint hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, and the Subcommittee On Criminal Justice Oversight of the Senate Committee on the Judiciary, One Hundred Sixth Congress, second session, February 29, 2000. (U.S. G.P.O. :, 2000), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime and United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Criminal Justice Oversight (page images at HathiTrust) "Cyber attack : improving prevention and prosecution" : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining how to combat cyber attacks by improving prevention and prosecution, Scottsdale, AZ, April 21, 2000. (U.S. G.P.O. :, 2001), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust) Cyber attacks : removing roadblocks to investigation and information sharing : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining the incidence of cyber attacks on the nation's information systems, focusing on removing roadblocks to investigation and information sharing, March 28, 2000. (U.S. G.P.O., 2001), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust) Cyber attack: Is the nation at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, June 24, 1998 (1998), by United States Senate Committee on Governmental Affairs (page images at HathiTrust) Filed under: Computer programmers -- Civil rights -- United StatesFiled under: Computer programmers -- Vocational guidance -- United States
Filed under: Electronic data processing personnel -- Wisconsin -- ClassificationFiled under: Electronic data processing personnel -- Vocational guidance -- United States
Filed under: Wages -- Electronic data processing personnel -- United States -- Statistics
Filed under: Wages -- Electronic data processing personnel -- United States -- Statistics -- Periodicals
Filed under: Computer programmers Coding Freedom: The Ethics and Aesthetics of Hacking (Princeton: Princeton University Press, c2013), by E. Gabriella Coleman (PDF with commentary at codingfreedom.com and gabriellacoleman.org) 97 Things Every Programmer Should Know (wiki version, ca. 2010), ed. by Kevlin Henney (HTML at oreilly.com) An investigatory study into human problem solving capabilities as they relate to programmer efficiency (Management Information Systems Research Center, Graduate School of Business Administration, University of Minnesota, 1972), by Prescott F. Griffith, Robert M. Henry, and University of Minnesota. Management Information Systems Research Center (page images at HathiTrust; US access only) Occupational survey report on business data programmers : task data from workers and supervisors indicating job relevance and training criticalness (Center for Vocational Education, The Ohio State University, 1981), by Harry L. Ammerman and Frank C. Pratzner (page images at HathiTrust)
Filed under: Computer programmers -- Fiction Geek Mafia (c2006), by Rick Dakan The Heretic, by Jason K. Chapman (HTML at jasonkchapman.com)
Filed under: Hackers -- Fiction Homeland (2013), by Cory Doctorow (multiple formats with commentary at craphound.com) Little Brother (2008), by Cory Doctorow (multiple formats with commentary at craphound.com) Invisible Armies, by Jon Evans (HTML with commentary at rezendi.com and Wattpad) The Quantum Connection (included on a Baen CD image), by Travis S. Taylor This Blue Ball: A Weblog Novel, by Wayne V. Miller (multiple formats with commentary at thisblueball.com) Little Brother, by Cory Doctorow (Gutenberg ebook) Filed under: Hackers Coding Freedom: The Ethics and Aesthetics of Hacking (Princeton: Princeton University Press, c2013), by E. Gabriella Coleman (PDF with commentary at codingfreedom.com and gabriellacoleman.org) The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com) Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press) Medieval Hackers (Brooklyn: Punctum Books, c2015), by Kathleen E. Kennedy (PDF with commentary at Punctum Books) Cyber attack: Is the nation at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, June 24, 1998 (1998), by United States Senate Committee on Governmental Affairs (page images at HathiTrust) Respawn : gamers, hackers, and technogenic life (Durham : Duke University Press, 2018., 2018), by Colin Milburn and Duke University Press (page images at HathiTrust)
Filed under: Hackers -- CongressesFiled under: Wages -- Electronic data processing personnelFiled under: Webmasters
Filed under: Interviews Conversations with William Drummond of Hawthornden, 1619 (John Lane the Bodley Head Ltd. ;, 1923), by Ben Jonson, Bruce Rogers, William Drummond, and Pforzheimer Bruce Rogers Collection (Library of Congress) (page images at HathiTrust; US access only) Itō-kō, Inoue-haku, Yamagata-kō genkundan (Bunbudō :, 1900), by Aritomo Yamagata, Kaoru Inoue, Hirobumi Itō, and Chūō Shinbunsha (page images at HathiTrust; US access only) The Idler magazine. (Chatto & Windus, 1892), by Robert Barr and Jerome K. Jerome (page images at HathiTrust) Assessing soldier individual differences to enable tailored training (U.S. Army Research Institute for the Behavioral and Social Sciences, 2010, 2010), by Peter S. Schaefer and U.S. Army Research Institute for the Behavioral and Social Sciences (page images at HathiTrust) The table-talk of John Selden, esq. (W. Pickering, 1847), by John Selden, Edward FitzGerald, Samuel Weller Singer, and Ri. Milward (page images at HathiTrust) Air Force aerial recovery aircrews of the 6593d Test Squadron (Special), 1958-1972 (Center for the Study of National Reconnaissance ;, 2012), by Robert D. Mulcahy and Center for the Study of National Reconnaissance (U.S.) (page images at HathiTrust) The autocrat of the breakfast-table (Houghton, Mifflin, 1916), by Oliver Wendell Holmes (page images at HathiTrust) Slovanské návštěvy : paměti a vzpomínky (F. Šimáček, 1889), by Edvard Jelínek (page images at HathiTrust) Gespräche mit Goethe in den letzten Jahren seines Lebens (Brockhaus, 1899), by Johann Wolfgang von Goethe and Johann Peter Eckermann (page images at HathiTrust; US access only) Biographie de Jonathas Granville (E. Briěre, 1873), by Jonathas Henri Théodore Granville (page images at HathiTrust) Water resources : hydraulics and hydrology (US Army Corps of Engineers, 1998), by Margaret S. Petersen and United States Army Corps of Engineers (page images at HathiTrust) Water resources : hydraulics and hydrology (US Army Corps of Engineers, 1997), by Franklin F. Snyder and United States Army Corps of Engineers (page images at HathiTrust)
More items available under broader and related terms at left. |