Miscellaneous books
Legend
CLASS
HIST = Historical works
IM = Image processing
MATH = mathematics
REF = reference
SEC = security
SIM = simulation
XMISC = assorted (CLASS2 used only for these)
CLASS |
CLASS2 |
Title |
Author |
Year |
CHMyear |
HIST |
|
Programming Systems and Languages. |
Rosen, Saul, ed, |
1967 |
--- |
HIST |
|
History of Computing in the Twentieth Century |
Howlett, J. and Rota, G. C.; N. Metropolis, Ed. |
1980 |
|
HIST |
|
The Soul of a New Machine |
Kidder, T. |
1981 |
|
HIST |
|
Bit by Bit |
Augarten, S. |
1984 |
1984 |
HIST |
|
IBM Personal Computer Seminar Proceedings, May 1985 |
|
1985 |
|
HIST |
|
ACM Turing award lectures: the first twenty years: 1966-1985 |
Ashenhurst, R. L. and Graham, S. Eds. |
1987 |
|
HIST |
|
Perspectives on the Computer Revolution |
Pylyshyn, Z. W., and Bannon, L.J., eds
|
1989 |
|
HIST |
|
Computer pioneers |
Lee, J. A. |
1995 |
|
HIST |
Industry |
PC Roadkill |
Hyman, M. |
1995 |
|
IM |
|
Digital Picture Processing |
Rosenfeld, A. and Kak, A. C. |
1982 |
--- |
IM |
|
Image Analysis and Mathematical Morphology |
Serra, J. |
1983 |
--- |
MATH |
|
Fundamentals of Applied Probability Theory |
Drake, A. W. |
1967 |
--- |
MATH |
|
Probability, Statistics, and Queueing Theory with Computer Science Applications |
Allen, A. O. |
1978 |
--- |
MATH |
|
Elements of Discrete Mathematics |
Liu |
1985 |
|
MATH |
ALG |
Computer Mathematics |
Conrad, C. L., Conrad, N. J., and Higley, H. B. |
1975 |
--- |
REF |
CS |
The way things work book of the computer: an illustrated encyclopedia of information science, cybernetics, and data processing |
unwinn, A.a. |
1974 |
--- |
SEC |
|
Computer Fraud and Countermeasures |
Krauss, L. I. and MacGahar, A. |
1979 |
--- |
SEC |
|
Building a secure computer system |
Gasser, M. |
1988 |
--- |
SEC |
|
Applied Cryptography |
Schneier, B. |
1993 |
|
SEC |
|
Security in computing |
Pfleeger, C. P. |
1997 |
|
SEC |
|
Computer security |
Gollmann, D. |
1999 |
|
SEC |
|
Verification of Safety properties |
ne |
ne |
--- |
SEC |
ARCH |
DEC VAX Security Users Manual |
ne |
ne |
--- |
SEC |
CRYPT |
Cryptography and Data Security |
Denning, D. E. |
1982 |
--- |
SEC |
CRYPT |
Cryptography |
Stinson, D. R. |
1995 |
|
SEC |
HIST |
Capability-Based Computer Systems |
Levy, H. M. |
1984 |
1984 |
SIM |
|
The Art of Simulation |
Tocher, K.D. |
1963 |
|
SIM |
SIMULA |
The process view of simulation (Operating and programming systems series) |
Franta, W. R. |
1977 |
|
XMISC |
|
What Computing is all About |
Van de Snepscheut, J. L. |
1993 |
--- |
XMISC |
CS |
University Education in Computing Science |
Finerman, A., Ed. |
1967 |
1968 |
XMISC |
CSINTRO |
From Baker Street to Binary (An Introduction to Computers and Computer Programming with Sherlock Holmes) |
Ledgard, H. F., McQuaid, P. E., and Singer, A. |
1983 |
1983 |
XMISC |
CSINTRO |
The most complex machine: A Survey of Computers and Computing |
Eck, D. J. |
1995 |
|
XMISC |
ECON |
An Inquiry into the Nature and Causes of The Wealth of Nations |
Smith, A. |
1776 |
|
XMISC |
ENV ECON |
The ecology of computation |
Huberman, B.A., Ed. |
1988 |
--- |
XMISC |
HIST1, SOC |
Faster Than Thought: A Symposium on Digital Computing Machines |
Bowden, B.V. Ed. |
1953 |
--- |
XMISC |
HUMOR ,HIST1 |
The devil's DP dictionary |
Kelly-Bootle, S. |
1981 |
--- |
XMISC |
ITMGMT |
A Management System for Information Systems |
IBM |
1982 |
--- |
XMISC |
MATH |
How to Lie With Statistics |
Huff, Darrell. and Geis, I. |
1954 |
|
XMISC |
PHIL |
Tractatus Logico Philosophicus (Routledge Classics) |
Wittgenstein, L., Pears, D. F., McGuinness, B., and Russell, B. |
2001 |
|
XMISC |
REF |
First Glossary of Computer Terminology |
ne |
ne |
--- |
XMISC |
SCIFI |
Shockwave Rider |
Brunner, J. |
1975 |
--- |
XMISC |
SOC |
Computer careers; planning, prerequisites, potential |
Maniotes, J. John S. and Quasney, James S. |
1974 |
--- |
XMISC |
SOC |
The wired society |
Martin, J. |
1978 |
1978 |
XMISC |
STDD (OSI) |
Understanding X.500: The Directory |
Chadwick, D. |
1994 |
--- |