Article ID: CBB453922047

Computer Security, Part 2 -- Editor's Introduction (2016)

unapi

This issue is the second of two Annals special issues extending from the National Science Foundation's Computer Security History Workshop, which gathered historians and pioneers at the Charles Babbage Institute in July 2014. It markedly advances scholarship on many different critical aspects of computer security history.

...More
Includes Series Articles

Article Yost, Jeffrey R. (2016) The March of IDES: Early History of Intrusion-Detection Expert Systems. IEEE Annals of the History of Computing (pp. 42-54). unapi

Article DuPont, Quinn; Fidler, Bradley (2016) Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity. IEEE Annals of the History of Computing (pp. 55-73). unapi

Article Aspray, William F.; Cortada, James W. (2016) Before It Was a Giant: The Early History of Symantec, 1982-1999. IEEE Annals of the History of Computing (pp. 26-41). unapi

Article Misa, Thomas J. (2016) Computer Security Discourse at RAND, SDC, and NSA (1958-1970). IEEE Annals of the History of Computing (pp. 12-25). unapi

Citation URI
http://data.isiscb.org/isis/citation/CBB453922047/

Similar Citations

Article DuPont, Quinn; Fidler, Bradley; (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity (/isis/citation/CBB760734420/) unapi

Article Misa, Thomas J.; (2016)
Computer Security Discourse at RAND, SDC, and NSA (1958-1970) (/isis/citation/CBB851516279/) unapi

Article Aspray, William F.; Cortada, James W.; (2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999 (/isis/citation/CBB189385729/) unapi

Article Yost, Jeffrey R.; (2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems (/isis/citation/CBB570334134/) unapi

Article Jones, Anita K.; Wulff, William A; (Spring 2002)
Cybersecurity (/isis/citation/CBB367643580/) unapi

Article Eugene H. Spafford; (Summer 2007)
Voter Assurance (/isis/citation/CBB265646858/) unapi

Article Rebecca Slayton; Brian Clarke; (January 2020)
Trusting Infrastructure: The Emergence of Computer Security Incident Response, 1989–2005 (/isis/citation/CBB421929386/) unapi

Article Fred Turner; (October 2018)
Millenarian Tinkering: The Puritan Roots of the Maker Movement (/isis/citation/CBB522459124/) unapi

Article McJones, Paul; (2017)
Anecdote: In Search of the Original Fortran Compiler (/isis/citation/CBB066297939/) unapi

Book Luc Olivier; E Marshall Wilder; (2020)
The microchip revolution: A brief history (/isis/citation/CBB701316898/) unapi

Article Theodora Vardouli; David Theodore; (April-June 2021)
Walking Instead of Working: Space Allocation, Automatic Architecture, and the Abstraction of Hospital Labor (/isis/citation/CBB134939420/) unapi

Article Janet Toland; (April-June 2021)
Consortium Computing and Time Slicing in the Banking Sector: Databank Systems Ltd New Zealand (/isis/citation/CBB565212269/) unapi

Article Guy C. Fedorkow; (January-March 2021)
Recovering Software for the Whirlwind Computer (/isis/citation/CBB869829437/) unapi

Article Janet Abbate; (October 2018)
Code Switch: Alternative Visions of Computer Expertise as Empowerment from the 1960s to the 2010s (/isis/citation/CBB903684763/) unapi

Article Colin Garvey; (March 2018)
Broken Promises & Empty Threats: The Evolution of AI in the USA, 1956–1996 (/isis/citation/CBB517134330/) unapi

Article Shunryu Colin Garvey; (January-March 2021)
The “General Problem Solver” Does Not Exist: Mortimer Taube and the Art of AI Criticism (/isis/citation/CBB628101227/) unapi

Article Spicer, Dag; (July-September 2016)
Interview: Raymond Tomlinson: Email Pioneer, Part 2 (/isis/citation/CBB113069755/) unapi

Article Nyman, Linus; Laakso, Mikael; (2016)
Anecdote: Notes on the History of Fork and Join (/isis/citation/CBB424414308/) unapi

Authors & Contributors
Tinn, Honghong
McJones, Paul
Spicer, Dag
Vardouli, Theodora
Theodore, David
Aspray, William F.
Journals
IEEE Annals of the History of Computing
Technology and Culture
The Bridge: Journal of the National Academy of Engineering
Technology's Stories
Publishers
Independently published
Concepts
History of Computing
Computers and computing
Computer security; cyber security
Software
Computer Simulation
Internet
People
Tomlinson, Raymond W.
Conway, Melvin
Lang, David
Doctorow, Cory
Gershenfeld, Neil A.
Mortimer Taube
Places
United States
Taiwan
Great Britain
New Zealand
Times
20th century
21st century
Institutions
Computer History Museum
Symantec Corporation
Peter Norton Computing Corporation
United States. National Security Agency
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment