Article ID: CBB453922047

Computer Security, Part 2 -- Editor's Introduction (2016)

unapi

This issue is the second of two Annals special issues extending from the National Science Foundation's Computer Security History Workshop, which gathered historians and pioneers at the Charles Babbage Institute in July 2014. It markedly advances scholarship on many different critical aspects of computer security history.

...More
Includes Series Articles

Article Yost, Jeffrey R. (2016) The March of IDES: Early History of Intrusion-Detection Expert Systems. IEEE Annals of the History of Computing (pp. 42-54). unapi

Article DuPont, Quinn; Fidler, Bradley (2016) Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity. IEEE Annals of the History of Computing (pp. 55-73). unapi

Article Aspray, William F.; Cortada, James W. (2016) Before It Was a Giant: The Early History of Symantec, 1982-1999. IEEE Annals of the History of Computing (pp. 26-41). unapi

Article Misa, Thomas J. (2016) Computer Security Discourse at RAND, SDC, and NSA (1958-1970). IEEE Annals of the History of Computing (pp. 12-25). unapi

Citation URI
https://data.isiscb.org/isis/citation/CBB453922047/

Similar Citations

Article Misa, Thomas J.; (2016)
Computer Security Discourse at RAND, SDC, and NSA (1958-1970) (/isis/citation/CBB851516279/)

Article Aspray, William F.; Cortada, James W.; (2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999 (/isis/citation/CBB189385729/)

Article DuPont, Quinn; Fidler, Bradley; (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity (/isis/citation/CBB760734420/)

Article Yost, Jeffrey R.; (2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems (/isis/citation/CBB570334134/)

Article Jones, Anita K.; Wulff, William A; (Spring 2002)
Cybersecurity (/isis/citation/CBB367643580/)

Article Eugene H. Spafford; (Summer 2007)
Voter Assurance (/isis/citation/CBB265646858/)

Article Rebecca Slayton; Brian Clarke; (January 2020)
Trusting Infrastructure: The Emergence of Computer Security Incident Response, 1989–2005 (/isis/citation/CBB421929386/)

Article Fred Turner; (October 2018)
Millenarian Tinkering: The Puritan Roots of the Maker Movement (/isis/citation/CBB522459124/)

Article McJones, Paul; (2017)
Anecdote: In Search of the Original Fortran Compiler (/isis/citation/CBB066297939/)

Book Luc Olivier; E Marshall Wilder; (2020)
The microchip revolution: A brief history (/isis/citation/CBB701316898/)

Article Janet Abbate; (October 2018)
Code Switch: Alternative Visions of Computer Expertise as Empowerment from the 1960s to the 2010s (/isis/citation/CBB903684763/)

Article Colin Garvey; (March 2018)
Broken Promises & Empty Threats: The Evolution of AI in the USA, 1956–1996 (/isis/citation/CBB517134330/)

Article Shunryu Colin Garvey; (January-March 2021)
The “General Problem Solver” Does Not Exist: Mortimer Taube and the Art of AI Criticism (/isis/citation/CBB628101227/)

Article Theodora Vardouli; David Theodore; (April-June 2021)
Walking Instead of Working: Space Allocation, Automatic Architecture, and the Abstraction of Hospital Labor (/isis/citation/CBB134939420/)

Article Guy C. Fedorkow; (January-March 2021)
Recovering Software for the Whirlwind Computer (/isis/citation/CBB869829437/)

Article Janet Toland; (April-June 2021)
Consortium Computing and Time Slicing in the Banking Sector: Databank Systems Ltd New Zealand (/isis/citation/CBB565212269/)

Article Spicer, Dag; (July-September 2016)
Interview: Raymond Tomlinson: Email Pioneer, Part 2 (/isis/citation/CBB113069755/)

Article Day, John; (2016)
The Clamor Outside as INWG Debated: Economic War Comes to Networking (/isis/citation/CBB243873737/)

Authors & Contributors
Wulff, William A
Guy C. Fedorkow
Jones, Anita K.
Tinn, Honghong
Day, John
Garvey, Colin
Journals
IEEE Annals of the History of Computing
Technology and Culture
The Bridge: Journal of the National Academy of Engineering
Technology's Stories
Publishers
Independently published
Concepts
History of Computing
Computers and computing
Computer security; cyber security
Software
Computer Simulation
Computer Programming
People
Gershenfeld, Neil A.
Mortimer Taube
Lang, David
Tomlinson, Raymond W.
Doctorow, Cory
Time Periods
20th century
21st century
Places
United States
New Zealand
Taiwan
Great Britain
Institutions
Peter Norton Computing Corporation
Symantec Corporation
Computer History Museum
International Network Working Group
United States. National Security Agency
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment