ReferencesTop4 AssignmentsReading List

Reading List

[1]
Bamford, James
The Puzzle Palace: A Report on America's Most Secret Agency
Reading list: UB251.U5 B35 1982


Libraries: Tucson Pima, UofA and PCC.

[2]
IBM and the Holocaust : the strategic alliance between Nazi Germany and America's most powerful corporation
Black, Edwin
Reading list: HD9696.2.U64 I253 2001


Libraries: Tucson Pima, UofA and PCC.

[3]
Bronson, Po
The Nudist on the Late Shift
Reading list: HD9696.2.U63 C353 1999


Libraries: Tucson Pima, UofA and PCC.

[4]
Brooks, Fredrick (Jr.)
The Mythical Man Month
Reading list: QA76.6 .B75


Libraries: Tucson Pima, UofA and PCC.

[5]
Carter, Bill
Latitude: How American astronomers solved the mystery of variation
Publisher: Naval Institute Press, ©2002
Reading list: QB103 .C37 2002


Libraries: Tucson Pima, UofA and PCC.

[6]
Cooper, Alan
The Inmates Are Running the Asylum:Why High Tech Products Drive Us Crazy and How To Restore The Sanity
Publisher: Indianapolis, IN : Sams, ©1999 Reading list: QA76.9.H85 C673 1999


Libraries: Tucson Pima, UofA and PCC.

[7]
Essinger, James
Jacquard's Web: How a Hand-Loom Led to the Birth of the Information Age Publisher: Oxford University Press, USA; Reprint edition (April 27, 2007)
Reading list: QA76.17 .E88 2004


Libraries: Tucson Pima, UofA and PCC.

[8]
Freedman, David, 1954-
At large: the strange case of the world's biggest Internet invasion
Publisher: Simon & Schuster, ©1997.
Reading list: V6773.2.F74 1997


Libraries: Tucson Pima, UofA and PCC.

[9]
Grove, Andrew S.
Only the Paranoid Survive
Publisher: Currency Doubleday
Reading list: HD58.8 .G765 1996


Libraries: Tucson Pima, UofA and PCC.

[10]
Jackson, Tim, 1965-
Inside Intel: Andy Grove and the rise of the world's most powerful chip company
Publisher: Dutton, c1997
Reading list: HD9696.S44I585 1997


Libraries: Tucson Pima, UofA and PCC.

[11]
Kidder, Tracy
Soul of a new Machine
Reading list: TK7885.4 .K53


Libraries: Tucson Pima, UofA and PCC.

[12]
Lessig, Lawrence
Free Culture:How Big Media Uses Technology and the Law to Lock Down Culture
Reading list: KF2979 .L47 2004


Libraries: Tucson Pima, UofA and PCC.

[13]
Littman, Jonathan
The watchman : the twisted life and crimes of serial hacker Kevin
Reading List: HV6772.P68 L57 1997


Libraries: Tucson Pima, UofA and PCC.

[14]
Lohr, Steve
Go to: The Story of the Math Majors, Bridge Players, Engineers, Chess Wizards, Scientists and Iconoclasts who were the Hero Programmers of the Software Revolution
Reading List: QA76.2.A2 L64 2001


Libraries: Tucson Pima, UofA and PCC.

[15]
Mander, Jerry
In the Absence of the Sacred: The Failure of Technology and the Survival of the Indian Nations
Sierra Club Books $14 paper ISBN 0-87156-509-9. (1992)
Reading list: E98.S67 M36 1991


Libraries: Tucson Pima, UofA and PCC.

[16]
Mitnick, Kevin
The Art of Deception: Controlling the Human Element of Security
Reading list: QA76.9.A25 M58 2002


Libraries: Tucson Pima, UofA and PCC.

[17]
Peterson, Ivars.
Fatal defect: Chasing killer computer bugs
Publisher: Times Books, c1995.
Reading list: QA76.76 .R44 P48 1995


Libraries: Tucson Pima, UofA and PCC.

[18]
Raymond, Eric S.
The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary
Reading list: QA76.76.O63 R396 1999


Libraries: Tucson Pima, UofA and PCC.

[19]
Rochlin, Gene I.
Trapped in the Net: The Unanticipated Consequences of Computerization
Reading list: QA 76.9 .C66 R62 1997


Libraries: Tucson Pima, UofA and PCC.

[20]
Schneier, Bruce
Beyond Fear: Thinking Sensibly About Security in an Uncertain World
Reading list: HV6432 .S36 2003


Libraries: Tucson Pima, UofA and PCC.

[21]
Schneier, Bruce
Secrets and Lies: Digital Security in a Networked World
Reading list: QA76.9.A25 S352 2000


Libraries: Tucson Pima, UofA and PCC.

[22]
Shasha, Dennis & Lazere, Cathy
Out of Their Minds: the lives and discoveries of 15 great computer scientists
New York: Copernicus, c1995
Reading list: QA76.2.A2 S53 1995


Libraries: Tucson Pima, UofA and PCC.

[23]
Stephenson, Neal
In the Beginning...was the Command Line
Reading list: QA76.76 .O63 S7369 1999


Libraries: Tucson Pima, UofA and PCC.

[24]
Stoll, Clifford.
The Cuckoo's Egg: Tracking a spy through the maze of computer espionage.
Reading list: UB271.R92 H477 1989


Libraries: Tucson Pima, UofA and PCC.

See: Bates in "References".

[25]
Tenner, Edward.
Why Things Bite Back: Technology and the revenge of unintended consequences
Reading list: T14.5 .T459 1996


Libraries: Tucson Pima, UofA and PCC.

[26]
Torvalds, Linus, 1969- & Diamond, David
Just for Fun: the Story of an Accidental Revolutionary
Reading list: QA76.2.T67 T67 2001


Libraries: Tucson Pima, UofA and PCC.

[27]
Wozniak, Steve & Smith, Gina
iWoz: From Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It
Reading list: QA76.2.W69 W69 2006


Libraries: Tucson Pima, UofA and PCC.

[28]
Young, Jeffrey S. & Simon, William L.
iCon Steve Jobs: The Greatest Second Act in the History of Business
Reading list: QA76.2.J63Y677 2005


Libraries: Tucson Pima, UofA and PCC.


Instructor: Louis Taber, louis.taber.at.pima at gmail dot com (520) 206-6850
My web site in Cleveland, OH
The Pima Community College web site


ReferencesTop4 AssignmentsReading List