The devouring fungus: tales of the computer age
The devouring fungus: tales of the computer age
Software creativity
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Safeware: system safety and computers
Safeware: system safety and computers
Computers, ethics & social values
Computers, ethics & social values
The mythical man-month (anniversary ed.)
The mythical man-month (anniversary ed.)
Computer crime: a crimefighter's handbook
Computer crime: a crimefighter's handbook
The computer user's survival guide
The computer user's survival guide
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Civilizing cyberspace: policy, power, and the information superhighway
Civilizing cyberspace: policy, power, and the information superhighway
Computer related risks
Computerization and controversy (2nd ed.): value conflicts and social choices
Computerization and controversy (2nd ed.): value conflicts and social choices
Escape Velocity: Cyberculture at the End of the Century
Escape Velocity: Cyberculture at the End of the Century
Fatal Defect: Chasing Killer Computer Bugs
Fatal Defect: Chasing Killer Computer Bugs
Digital Woes: Why We Should Not Depend on Software
Digital Woes: Why We Should Not Depend on Software
The Rise of the Computer State
The Rise of the Computer State
Building Internet Firewalls
Hi-index | 48.22 |