CLASS
HIST = Historical works
IM = Image processing
MATH = mathematics
REF = reference
SEC = security
SIM = simulation
XMISC = assorted (CLASS2 used only for these)
CLASS |
CLASS2 |
Title |
Author |
Year |
CHMyear |
HIST |
|
Programming Systems and Languages. |
Rosen, Saul, ed, |
1967 |
--- |
HIST |
|
History of Computing in the Twentieth Century |
Howlett, J. and Rota, G. C.; N. Metropolis, Ed. |
1980 |
|
HIST |
|
The Soul of a New Machine |
Kidder, T. |
1981 |
|
HIST |
|
Bit by Bit |
Augarten, S. |
1984 |
1984 |
HIST |
|
IBM Personal Computer Seminar Proceedings, May 1985 |
|
1985 |
|
HIST |
|
ACM Turing award lectures: the first twenty years: 1966-1985 |
Ashenhurst, R. L. and Graham, S. Eds. |
1987 |
|
HIST |
|
Perspectives on the Computer Revolution |
Pylyshyn, Z. W., and Bannon, L.J., eds
|
1989 |
|
HIST |
|
Computer pioneers |
Lee, J. A. |
1995 |
|
HIST |
Industry |
PC Roadkill |
Hyman, M. |
1995 |
|
IM |
|
Digital Picture Processing |
Rosenfeld, A. and Kak, A. C. |
1982 |
--- |
IM |
|
Image Analysis and Mathematical Morphology |
Serra, J. |
1983 |
--- |
MATH |
|
Fundamentals of Applied Probability Theory |
Drake, A. W. |
1967 |
--- |
MATH |
|
Probability, Statistics, and Queueing Theory with Computer Science Applications |
Allen, A. O. |
1978 |
--- |
MATH |
|
Elements of Discrete Mathematics |
Liu |
1985 |
|
MATH |
ALG |
Computer Mathematics |
Conrad, C. L., Conrad, N. J., and Higley, H. B. |
1975 |
--- |
REF |
CS |
The way things work book of the computer: an illustrated encyclopedia of information science, cybernetics, and data processing |
unwinn, A.a. |
1974 |
--- |
SEC |
|
Computer Fraud and Countermeasures |
Krauss, L. I. and MacGahar, A. |
1979 |
--- |
SEC |
|
Building a secure computer system |
Gasser, M. |
1988 |
--- |
SEC |
|
Applied Cryptography |
Schneier, B. |
1993 |
|
SEC |
|
Security in computing |
Pfleeger, C. P. |
1997 |
|
SEC |
|
Computer security |
Gollmann, D. |
1999 |
|
SEC |
|
Verification of Safety properties |
ne |
ne |
--- |
SEC |
ARCH |
DEC VAX Security Users Manual |
ne |
ne |
--- |
SEC |
CRYPT |
Cryptography and Data Security |
Denning, D. E. |
1982 |
--- |
SEC |
CRYPT |
Cryptography |
Stinson, D. R. |
1995 |
|
SEC |
HIST |
Capability-Based Computer Systems |
Levy, H. M. |