Electronic data processing personnelSee also what's at your library, or elsewhere.
Broader term:Narrower terms: |
Filed under: Electronic data processing personnel
Filed under: Electronic data processing personnel -- Case studiesFiled under: Electronic data processing personnel -- InterviewsFiled under: Electronic data processing personnel -- Job descriptions
Filed under: Electronic data processing personnel -- Recruiting -- Government policy -- United StatesFiled under: Electronic data processing personnel -- Training of
Filed under: Electronic data processing personnel -- Training of -- United States
Filed under: Computer programmers -- Training of -- United States
Filed under: Electronic data processing personnel -- United States -- CongressesFiled under: Computer programmers -- United States
Filed under: Computer programmers -- United States -- Biography Free as in Freedom: Richard Stallman's Crusade for Free Software, by Sam Williams
Filed under: Hackers -- United States -- Biography Free as in Freedom: Richard Stallman's Crusade for Free Software, by Sam Williams Filed under: Computer programmers -- United States -- Statistics
Filed under: Computer programmers -- United States -- Statistics -- PeriodicalsFiled under: Computer programmers -- Employment -- United States -- StatisticsFiled under: Hackers -- United States Cyber attack : is the government safe? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Sixth Congress, second session, March 2, 2000. (U.S. G.P.O. :, 2000), by United States Senate Committee on Governmental Affairs (page images at HathiTrust) Internet denial of service attacks and the federal response : joint hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, and the Subcommittee On Criminal Justice Oversight of the Senate Committee on the Judiciary, One Hundred Sixth Congress, second session, February 29, 2000. (U.S. G.P.O. :, 2000), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime and United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Criminal Justice Oversight (page images at HathiTrust) "Cyber attack : improving prevention and prosecution" : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining how to combat cyber attacks by improving prevention and prosecution, Scottsdale, AZ, April 21, 2000. (U.S. G.P.O. :, 2001), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust) Cyber attacks : removing roadblocks to investigation and information sharing : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining the incidence of cyber attacks on the nation's information systems, focusing on removing roadblocks to investigation and information sharing, March 28, 2000. (U.S. G.P.O., 2001), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust) Cyber attack: Is the nation at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, June 24, 1998 (1998), by United States Senate Committee on Governmental Affairs (page images at HathiTrust) Filed under: Computer programmers -- Civil rights -- United StatesFiled under: Computer programmers -- Vocational guidance -- United States
Filed under: Electronic data processing personnel -- Wisconsin -- ClassificationFiled under: Electronic data processing personnel -- Vocational guidance -- United States
Filed under: Wages -- Electronic data processing personnel -- United States -- Statistics
Filed under: Wages -- Electronic data processing personnel -- United States -- Statistics -- Periodicals
Filed under: Computer programmers Coding Freedom: The Ethics and Aesthetics of Hacking (Princeton: Princeton University Press, c2013), by E. Gabriella Coleman (PDF with commentary at codingfreedom.com and gabriellacoleman.org) 97 Things Every Programmer Should Know (wiki version, ca. 2010), ed. by Kevlin Henney (HTML at oreilly.com) An investigatory study into human problem solving capabilities as they relate to programmer efficiency (Management Information Systems Research Center, Graduate School of Business Administration, University of Minnesota, 1972), by Prescott F. Griffith, Robert M. Henry, and University of Minnesota. Management Information Systems Research Center (page images at HathiTrust; US access only) Occupational survey report on business data programmers : task data from workers and supervisors indicating job relevance and training criticalness (Center for Vocational Education, The Ohio State University, 1981), by Harry L. Ammerman and Frank C. Pratzner (page images at HathiTrust)
Filed under: Computer programmers -- Fiction Geek Mafia (c2006), by Rick Dakan The Heretic, by Jason K. Chapman (HTML at jasonkchapman.com)
Filed under: Hackers -- Fiction Homeland (2013), by Cory Doctorow (multiple formats with commentary at craphound.com) Little Brother (2008), by Cory Doctorow (multiple formats with commentary at craphound.com) Invisible Armies, by Jon Evans (HTML with commentary at rezendi.com and Wattpad) The Quantum Connection (included on a Baen CD image), by Travis S. Taylor This Blue Ball: A Weblog Novel, by Wayne V. Miller (multiple formats with commentary at thisblueball.com) Little Brother, by Cory Doctorow (Gutenberg ebook) Filed under: Hackers Coding Freedom: The Ethics and Aesthetics of Hacking (Princeton: Princeton University Press, c2013), by E. Gabriella Coleman (PDF with commentary at codingfreedom.com and gabriellacoleman.org) The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com) Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press) Medieval Hackers (Brooklyn: Punctum Books, c2015), by Kathleen E. Kennedy (PDF with commentary at Punctum Books) Cyber attack: Is the nation at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, June 24, 1998 (1998), by United States Senate Committee on Governmental Affairs (page images at HathiTrust) Respawn : gamers, hackers, and technogenic life (Durham : Duke University Press, 2018., 2018), by Colin Milburn and Duke University Press (page images at HathiTrust)
Filed under: Hackers -- CongressesFiled under: Wages -- Electronic data processing personnelFiled under: Webmasters
More items available under narrower terms. |