Article ID: CBB453922047

Computer Security, Part 2 -- Editor's Introduction (2016)

unapi

This issue is the second of two Annals special issues extending from the National Science Foundation's Computer Security History Workshop, which gathered historians and pioneers at the Charles Babbage Institute in July 2014. It markedly advances scholarship on many different critical aspects of computer security history.

...More
Includes Series Articles

Article Yost, Jeffrey R. (2016) The March of IDES: Early History of Intrusion-Detection Expert Systems. IEEE Annals of the History of Computing (pp. 42-54). unapi

Article DuPont, Quinn; Fidler, Bradley (2016) Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity. IEEE Annals of the History of Computing (pp. 55-73). unapi

Article Aspray, William F.; Cortada, James W. (2016) Before It Was a Giant: The Early History of Symantec, 1982-1999. IEEE Annals of the History of Computing (pp. 26-41). unapi

Article Misa, Thomas J. (2016) Computer Security Discourse at RAND, SDC, and NSA (1958-1970). IEEE Annals of the History of Computing (pp. 12-25). unapi

Citation URI
https://data.isiscb.org/isis/citation/CBB453922047/

Similar Citations

Article DuPont, Quinn; Fidler, Bradley; (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity (/isis/citation/CBB760734420/)

Article Misa, Thomas J.; (2016)
Computer Security Discourse at RAND, SDC, and NSA (1958-1970) (/isis/citation/CBB851516279/)

Article Aspray, William F.; Cortada, James W.; (2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999 (/isis/citation/CBB189385729/)

Article Yost, Jeffrey R.; (2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems (/isis/citation/CBB570334134/)

Article Jones, Anita K.; Wulff, William A; (Spring 2002)
Cybersecurity (/isis/citation/CBB367643580/)

Article Eugene H. Spafford; (Summer 2007)
Voter Assurance (/isis/citation/CBB265646858/)

Article Rebecca Slayton; Brian Clarke; (January 2020)
Trusting Infrastructure: The Emergence of Computer Security Incident Response, 1989–2005 (/isis/citation/CBB421929386/)

Article McJones, Paul; (2017)
Anecdote: In Search of the Original Fortran Compiler (/isis/citation/CBB066297939/)

Article Fred Turner; (October 2018)
Millenarian Tinkering: The Puritan Roots of the Maker Movement (/isis/citation/CBB522459124/)

Article Guy C. Fedorkow; (January-March 2021)
Recovering Software for the Whirlwind Computer (/isis/citation/CBB869829437/)

Article Janet Toland; (April-June 2021)
Consortium Computing and Time Slicing in the Banking Sector: Databank Systems Ltd New Zealand (/isis/citation/CBB565212269/)

Book Luc Olivier; E Marshall Wilder; (2020)
The microchip revolution: A brief history (/isis/citation/CBB701316898/)

Article Theodora Vardouli; David Theodore; (April-June 2021)
Walking Instead of Working: Space Allocation, Automatic Architecture, and the Abstraction of Hospital Labor (/isis/citation/CBB134939420/)

Article Janet Abbate; (October 2018)
Code Switch: Alternative Visions of Computer Expertise as Empowerment from the 1960s to the 2010s (/isis/citation/CBB903684763/)

Article Colin Garvey; (March 2018)
Broken Promises & Empty Threats: The Evolution of AI in the USA, 1956–1996 (/isis/citation/CBB517134330/)

Article Shunryu Colin Garvey; (January-March 2021)
The “General Problem Solver” Does Not Exist: Mortimer Taube and the Art of AI Criticism (/isis/citation/CBB628101227/)

Article Kneuper, Ralf; (2017)
Sixty Years of Software Development Life Cycle Models (/isis/citation/CBB236951329/)

Article Fidler, Bradley; Currie, Morgan; (2016)
Infrastructure, Representation, and Historiography in BBN's Arpanet Maps (/isis/citation/CBB826738719/)

Book Latil, Pierre de; (1957)
Thinking by machine: A study of cybernetics (/isis/citation/CBB001180074/)

Authors & Contributors
Fidler, Bradley Reuben
Wulff, William A
Guy C. Fedorkow
Jones, Anita K.
Tinn, Honghong
Currie, Morgan
Concepts
History of Computing
Computers and computing
Computer security; cyber security
Software
Software engineering
Computer Simulation
Time Periods
20th century
21st century
Places
United States
New Zealand
Taiwan
Great Britain
Institutions
Peter Norton Computing Corporation
Symantec Corporation
United States. National Security Agency
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment