Software Preservation Group of the Computer History Museum

Miscellaneous Books

Legend

CLASS

HIST = Historical works 

IM = Image processing

MATH = mathematics

REF = reference

SEC = security

SIM = simulation

XMISC = assorted (CLASS2 used only for these)

CLASS

CLASS2

Title

Author

Year

CHMyear

HIST

 

Programming Systems and Languages.

Rosen, Saul, ed, 

1967

---

HIST

 

History of Computing in the Twentieth Century

Howlett, J. and Rota, G. C.; N. Metropolis, Ed.

1980

 

HIST

 

The Soul of a New Machine

Kidder, T.

1981

 

HIST

 

Bit by Bit

Augarten, S.

1984

1984

HIST

 

IBM Personal Computer Seminar Proceedings, May 1985 

 

1985

 

HIST

 

ACM Turing award lectures: the first twenty years: 1966-1985

Ashenhurst, R. L. and Graham, S. Eds.

1987

 

HIST

 

Perspectives on the Computer Revolution 

Pylyshyn, Z. W., and Bannon, L.J., eds

 

1989

 

HIST

 

Computer pioneers

Lee, J. A.

1995

 

HIST

Industry

PC Roadkill

Hyman, M. 

1995

 

IM

 

Digital Picture Processing

Rosenfeld, A. and Kak, A. C.

1982

--- 

IM

 

Image Analysis and Mathematical Morphology

Serra, J.

1983

--- 

MATH

 

Fundamentals of Applied Probability Theory

Drake, A. W.

1967

--- 

MATH

 

Probability, Statistics, and Queueing Theory with Computer Science Applications

Allen, A. O.

1978

--- 

MATH

 

Elements of Discrete Mathematics

Liu

1985

 

MATH

ALG

Computer Mathematics

Conrad, C. L., Conrad, N. J., and Higley, H. B.

1975

--- 

REF

CS

The way things work book of the computer: an illustrated encyclopedia of information science, cybernetics, and data processing

unwinn, A.a.

1974

--- 

SEC

 

Computer Fraud and Countermeasures

Krauss, L. I. and MacGahar, A.

1979

--- 

SEC

 

Building a secure computer system

Gasser, M.

1988

--- 

SEC

 

Applied Cryptography

Schneier, B.

1993

 

SEC

 

Security in computing

Pfleeger, C. P.

1997

 

SEC

 

Computer security

Gollmann, D.

1999

 

SEC

 

Verification of Safety properties

ne

ne

--- 

SEC

ARCH

DEC VAX Security Users Manual

ne

ne

--- 

SEC

CRYPT

Cryptography and Data Security

Denning, D. E.

1982

--- 

SEC

CRYPT

Cryptography

Stinson, D. R.

1995

 

SEC

HIST

Capability-Based Computer Systems

Levy, H. M.