Leeuw, Karl de (Editor)
Bergstra, J. A. (Editor)
Description Contents: Introduction / K. de Leeuw -- Limitations on the publishing of scientific research / J. Meadows -- Industrialists, inventors and the German patent system, 1877-1957: A comparative perspective / K. Gispen -- Reflecting media: A cultural history of copyright and the media / R. Verhoogt, C. Schriks -- The history of copyright protection of computer software: The emancipation of a work of technology toward a authorship / M. de Cock Buning -- A history of software patents / R. Plotkin -- Semiotics of identity management / P. Wisse -- History of document security / K.J. Schell -- From frankpledge to chip and pin: Identification and identity in England, 1475-2005 / E. Higgs -- The scientific development of biometrics over the last 40 years / J.L. Wayman -- The rise of crptology in the European renaissance / G. F. Strasser -- Cryptology in the Dutch republic: A case study / K. de Leeuw -- Intelligence and the emergence of the information society in eighteenth-century Britain / J. Black -- Rotor machines and bombes / F.L. Bauer -- Tunny and colossus: Breaking the Lorenz Schlüsselzuatz traffic / B. J. Copeland -- Boris Hagelin and Crypto AG: pioneers of encryption / S. Frik -- Eavesdroppers of the Kremlin: KGB sigint during the Cold War / M. Aid -- National security agency: The historiography of concealment / J. Fitsankis -- An introduction to modern cryptology / B. Preneel -- A history of computer security standards / J.R. Yost -- Security models / D. Gollmann -- Computer security through correctness and transparency / H. Meijer ... [et. al] -- IT security and IT auditing between 1960 and 2000 / M. van Biene-Hershey -- A history of internet security / L. DeNardis -- History of computer crime / S. W. Brenner -- The export of cryptography in the 20th and the 21st centuries / W. Diffie, S. Landau -- History of privacy / J. Holvast -- Munitions, wiretaps and MP3s: The changing interface between privacy and encryption policy in the information security / A. Chalesworth -- The information revolution and the transformation of warfare / D. Kuehl. (from WorldCat)
Chapter Yost, Jeffrey R. (2007) History of computer security standards. In: The history of information security: A comprehensive handbook (p. 595).
Chapter
Yost, Jeffrey R.;
(2007)
History of computer security standards
(/isis/citation/CBB001180687/)
Article
Masco, Joseph;
(2002)
Lie detectors: On secrets and hypersecurity in Los Alamos
(/isis/citation/CBB001180562/)
Article
Jack, Caroline;
(2016)
Meaning and Persuasion: The Personal Computer and Economic Education
(/isis/citation/CBB148010275/)
Article
Roegel, Denis;
(2016)
Anecdote: Before Torchi and Schwilgué, There Was White
(/isis/citation/CBB576394582/)
Book
Subrata Dasgupta;
(2014)
It Began with Babbage: The Genesis of Computer Science
(/isis/citation/CBB624612522/)
Article
DuPont, Quinn;
Fidler, Bradley;
(2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity
(/isis/citation/CBB760734420/)
Review
Salem Elzway;
(2017)
Review of "The Outsourcer: The story of India's IT revolution"
(/isis/citation/CBB610334077/)
Article
Guy C. Fedorkow;
(January-March 2021)
Recovering Software for the Whirlwind Computer
(/isis/citation/CBB869829437/)
Article
Kneuper, Ralf;
(2017)
Sixty Years of Software Development Life Cycle Models
(/isis/citation/CBB236951329/)
Book
Jones, C.B.;
Lloyd, J.L.;
(2011)
Dependable and Historic Computing: Essays Dedicated to Brian Randell on the Occasion of his 75th Birthday
(/isis/citation/CBB511443626/)
Chapter
Lundin, Per;
(2009)
From computing machines to IT: Collecting, documenting, and preserving source material on Swedish IT-history
(/isis/citation/CBB001181596/)
Book
Tatnall, Arthur;
(2010)
History of Computing: Learning from the Past: IFIP WG 9.7 International Conference, HC 2010, held as part of WCC 2010, Brisbane, Australia, September 20--23, 2010: Proceedings
(/isis/citation/CBB001180682/)
Article
Fidler, Bradley;
Currie, Morgan;
(2016)
Infrastructure, Representation, and Historiography in BBN's Arpanet Maps
(/isis/citation/CBB826738719/)
Chapter
Misa, Thomas J.;
(2009)
Organizing the history of computing: Lessons learned at the Charles Babbage Institute
(/isis/citation/CBB001180670/)
Article
Janet Toland;
(April-June 2021)
Consortium Computing and Time Slicing in the Banking Sector: Databank Systems Ltd New Zealand
(/isis/citation/CBB565212269/)
Article
Park, Dongoh;
(2016)
The Korean Character Code: A National Controversy, 1987-1995
(/isis/citation/CBB705437460/)
Article
Akita, Katsuji;
Hasegawa, Yutaka;
(2016)
History of COMTRAC: Development of the Innovative Traffic-Control System for Shinkansen
(/isis/citation/CBB587529436/)
Article
Andersen, Håkon With;
(1989)
Different problems -- Different ways: Control, calculation and mass data as focal points for the study of a social history of computing
(/isis/citation/CBB001180442/)
Book
Trogemann, Georg;
Nitussov, Alexander Y;
Ernst, Wolfgang;
(2001)
Computing in Russia: The history of computer devices and information technology revealed
(/isis/citation/CBB001180125/)
Article
James W. Cortada;
(April-June 2021)
Preserving the Past by Industry Participants
(/isis/citation/CBB451216991/)
Be the first to comment!