Concept ID: CBA000127496

History of Computing

Show 114 citations related to History of Computing
Show 114 citations related to History of Computing as a subject or category


Permalink
data.isiscb.org/isis/authority/CBA000127496
Publications timeline | Click to expand
Updated timeline is loading. Please wait. The server may be processing several jobs...
Related places (List view)

Related Citations

Chapter Yost, Jeffrey R. (2007)
History of computer security standards. In: The history of information security: A comprehensive handbook (p. 595). (/isis/citation/CBB001180687/) unapi

Article Misa, Thomas J. (2007)
Understanding “How computing has changed the world”. IEEE Annals of the History of Computing (pp. 52-63). (/isis/citation/CBB001180668/) unapi

Book Leeuw, Karl de; Bergstra, J. A. (2007)
The history of information security: A comprehensive handbook. (/isis/citation/CBB001180686/) unapi

Article Edwards, Paul N. (2007)
Revolutionary secrets: Technology's role in the South African anti-apartheid movement. Social Science Computer Review (pp. 13-26). (/isis/citation/CBB001181668/) unapi

Chapter Edwards, Paul N. (2006)
L'électronique rêvera pour vous: L'informatique rencontre l'information au cours années Pompidou. In: Georges Pompidou et la modernité: Les tensions de l'innovation, 1962--1974 (p. 159). (/isis/citation/CBB001181667/) unapi

Article Cortada, James W. (2006)
The ENIAC's influence on business computing, 1940s--1950s. IEEE Annals of the History of Computing (pp. 26-28). (/isis/citation/CBB001180890/) unapi

Article Cortada, James W. (2006)
Looking at technology through industry eyes. IEEE Annals of the History of Computing (p. 88). (/isis/citation/CBB001180887/) unapi

Book Yost, Jeffrey R. (2005)
The computer industry. (/isis/citation/CBB001180688/) unapi

Book Hally, Mike (2005)
Electronic brains: Stories from the dawn of the computer age. (/isis/citation/CBB001180065/) unapi

Chapter Yost, Jeffrey R. (2005)
Computers and the internet: Braiding irony, paradox, and possibility. In: A companion to American technology (p. 340). (/isis/citation/CBB001180691/) unapi

Chapter Hecht, Gabrielle; Edwards, Paul N. (2005)
Les techniques de la guerre froide dans une perspective mondiale: Le nucléaire et l'informatique comme systèmes technopolitiques. In: Deux siècles d'histoire de l'armement en France: De Gribeauval à la force de frappe (p. 167). (/isis/citation/CBB001181670/) unapi

Article Yost, Jeffrey R. (2005)
Maximization and merginalization: A brief examination of the history and historiography of the U.S. computer services industry. Entreprises et Histoire (p. 87). (/isis/citation/CBB001180689/) unapi

Article Cortada, James W. (2004)
How did computing go global? The need for an answer and a research agenda. IEEE Annals of the History of Computing (pp. 53-58). (/isis/citation/CBB001180895/) unapi

Article Cortada, James W. (2004)
A new age for historians too: A comment. Accounting, Business and Financial History (pp. 235-236). (/isis/citation/CBB001180894/) unapi

Article Downey, Greg (2004)
Jumping contexts of space and time in the history of computers and computing. IEEE Annals of the History of Computing (pp. 2-4). (/isis/citation/CBB001180038/) unapi

Book Segal, Jérôme (2003)
Le zéro et le un: histoire de la notion scientifique d'information au 20e siècle. (/isis/citation/CBB001180084/) unapi

Article Edwards, Paul N. (April 2002)
Pourquoi fabriquer des ordinateurs? (Why make computers? ). La Recherche (pp. 21-26). (/isis/citation/CBB001181676/) unapi

Article Cortada, James W. (2002)
Studying the increased use of software applications: Insights from the case of the American petroleum industry, 1950--2000. Iterations: An Interdisciplinary Journal of Software History (p. 1). (/isis/citation/CBB001180897/) unapi

Book Akera, Atsushi; Nebeker, Frederik (2002)
From 0 to 1: An authoritative history of modern computing. (/isis/citation/CBB001180429/) unapi

Chapter Edwards, Paul N. (2002)
Building the closed world: The computer, the bomb, and American political discourse. In: Ctrl [space]: Rhetorics of surveillance from Bentham to Big Brother. (/isis/citation/CBB001181675/) unapi

Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment