Yost, Jeffrey R. (Author)
This issue is the second of two Annals special issues extending from the National Science Foundation's Computer Security History Workshop, which gathered historians and pioneers at the Charles Babbage Institute in July 2014. It markedly advances scholarship on many different critical aspects of computer security history.
...MoreArticle Yost, Jeffrey R. (2016) The March of IDES: Early History of Intrusion-Detection Expert Systems. IEEE Annals of the History of Computing (pp. 42-54).
Article DuPont, Quinn; Fidler, Bradley (2016) Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity. IEEE Annals of the History of Computing (pp. 55-73).
Article Aspray, William F.; Cortada, James W. (2016) Before It Was a Giant: The Early History of Symantec, 1982-1999. IEEE Annals of the History of Computing (pp. 26-41).
Article Misa, Thomas J. (2016) Computer Security Discourse at RAND, SDC, and NSA (1958-1970). IEEE Annals of the History of Computing (pp. 12-25).
Article
DuPont, Quinn;
Fidler, Bradley;
(2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity
(/isis/citation/CBB760734420/)
Article
Misa, Thomas J.;
(2016)
Computer Security Discourse at RAND, SDC, and NSA (1958-1970)
(/isis/citation/CBB851516279/)
Article
Aspray, William F.;
Cortada, James W.;
(2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999
(/isis/citation/CBB189385729/)
Article
Yost, Jeffrey R.;
(2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems
(/isis/citation/CBB570334134/)
Article
Honghong Tinn;
(October 2018)
Modeling Computers and Computer Models: Manufacturing Economic-Planning Projects in Cold War Taiwan, 1959–1968
(/isis/citation/CBB062296277/)
Article
Jones, Anita K.;
Wulff, William A;
(Spring 2002)
Cybersecurity
(/isis/citation/CBB367643580/)
Article
Eugene H. Spafford;
(Summer 2007)
Voter Assurance
(/isis/citation/CBB265646858/)
Article
Rebecca Slayton;
Brian Clarke;
(January 2020)
Trusting Infrastructure: The Emergence of Computer Security Incident Response, 1989–2005
(/isis/citation/CBB421929386/)
Article
McJones, Paul;
(2017)
Anecdote: In Search of the Original Fortran Compiler
(/isis/citation/CBB066297939/)
Article
Fred Turner;
(October 2018)
Millenarian Tinkering: The Puritan Roots of the Maker Movement
(/isis/citation/CBB522459124/)
Article
Guy C. Fedorkow;
(January-March 2021)
Recovering Software for the Whirlwind Computer
(/isis/citation/CBB869829437/)
Article
Janet Toland;
(April-June 2021)
Consortium Computing and Time Slicing in the Banking Sector: Databank Systems Ltd New Zealand
(/isis/citation/CBB565212269/)
Book
Luc Olivier;
E Marshall Wilder;
(2020)
The microchip revolution: A brief history
(/isis/citation/CBB701316898/)
Article
Theodora Vardouli;
David Theodore;
(April-June 2021)
Walking Instead of Working: Space Allocation, Automatic Architecture, and the Abstraction of Hospital Labor
(/isis/citation/CBB134939420/)
Article
Janet Abbate;
(October 2018)
Code Switch: Alternative Visions of Computer Expertise as Empowerment from the 1960s to the 2010s
(/isis/citation/CBB903684763/)
Article
Colin Garvey;
(March 2018)
Broken Promises & Empty Threats: The Evolution of AI in the USA, 1956–1996
(/isis/citation/CBB517134330/)
Article
Shunryu Colin Garvey;
(January-March 2021)
The “General Problem Solver” Does Not Exist: Mortimer Taube and the Art of AI Criticism
(/isis/citation/CBB628101227/)
Article
Kneuper, Ralf;
(2017)
Sixty Years of Software Development Life Cycle Models
(/isis/citation/CBB236951329/)
Article
Fidler, Bradley;
Currie, Morgan;
(2016)
Infrastructure, Representation, and Historiography in BBN's Arpanet Maps
(/isis/citation/CBB826738719/)
Book
Latil, Pierre de;
(1957)
Thinking by machine: A study of cybernetics
(/isis/citation/CBB001180074/)
Be the first to comment!