ReferencesTop4 Contact and office hours  Spring 2009 Reading List

Reading List

 
 [1]
Bamford, James
The Puzzle Palace: A Report on America's Most Secret Agency
Reading list: UB251.U5 B35 1982
Libraries: Tucson Pima, UofA and PCC.
 [2]
IBM and the Holocaust : the strategic alliance between Nazi Germany and America's most powerful corporation
Black, Edwin
Reading list: HD9696.2.U64 I253 2001
Libraries: Tucson Pima, UofA and PCC.
 [3]
Bronson, Po
The Nudist on the Late Shift
Reading list: HD9696.2.U63 C353 1999
Libraries: Tucson Pima, UofA and PCC.
 [4]
Brooks, Fredrick (Jr.)
The Mythical Man Month
Reading list: QA76.6 .B75
Libraries: Tucson Pima, UofA and PCC.
 [5]
Carter, Bill
Latitude: How American astronomers solved the mystery of variation
Publisher: Naval Institute Press, ©2002
Reading list: QB103 .C37 2002
Libraries: Tucson Pima, UofA and PCC.
 [6]
Cooper, Alan
The Inmates Are Running the Asylum:Why High Tech Products Drive Us Crazy and How To Restore The Sanity
Publisher: Indianapolis, IN : Sams, ©1999 Reading list: QA76.9.H85 C673 1999
Libraries: Tucson Pima, UofA and PCC.
 [7]
Essinger, James
Jacquard's Web: How a Hand-Loom Led to the Birth of the Information Age Publisher: Oxford University Press, USA; Reprint edition (April 27, 2007)
Reading list: QA76.17 .E88 2004
Libraries: Tucson Pima, UofA and PCC.
 [8]
Freedman, David, 1954-
At large: the strange case of the world's biggest Internet invasion
Publisher: Simon & Schuster, ©1997.
Reading list: V6773.2.F74 1997
Libraries: Tucson Pima, UofA and PCC.
 [9]
Grove, Andrew S.
Only the Paranoid Survive
Publisher: Currency Doubleday
Reading list: HD58.8 .G765 1996
Libraries: Tucson Pima, UofA and PCC.
 [10]
Jackson, Tim, 1965-
Inside Intel: Andy Grove and the rise of the world's most powerful chip company
Publisher: Dutton, c1997
Reading list: HD9696.S44I585 1997
Libraries: Tucson Pima, UofA and PCC.
 [11]
Kidder, Tracy
Soul of a new Machine
Reading list: TK7885.4 .K53
Libraries: Tucson Pima, UofA and PCC.
 [12]
Lessig, Lawrence
Free Culture:How Big Media Uses Technology and the Law to Lock Down Culture
Reading list: KF2979 .L47 2004
Libraries: Tucson Pima, UofA and PCC.
 [13]
Littman, Jonathan
The watchman : the twisted life and crimes of serial hacker Kevin
Reading List: HV6772.P68 L57 1997
Libraries: Tucson Pima, UofA and PCC.
 [14]
Lohr, Steve
Go to: The Story of the Math Majors, Bridge Players, Engineers, Chess Wizards, Scientists and Iconoclasts who were the Hero Programmers of the Software Revolution
Reading List: QA76.2.A2 L64 2001
Libraries: Tucson Pima, UofA and PCC.
 [15]
Mander, Jerry
In the Absence of the Sacred: The Failure of Technology and the Survival of the Indian Nations
Sierra Club Books $14 paper ISBN 0-87156-509-9. (1992)
Reading list: E98.S67 M36 1991
Libraries: Tucson Pima, UofA and PCC.
 [16]
Mitnick, Kevin
The Art of Deception: Controlling the Human Element of Security
Reading list: QA76.9.A25 M58 2002
Libraries: Tucson Pima, UofA and PCC.
 [17]
Peterson, Ivars.
Fatal defect: Chasing killer computer bugs
Publisher: Times Books, c1995.
Reading list: QA76.76 .R44 P48 1995
Libraries: Tucson Pima, UofA and PCC.
 [18]
Raymond, Eric S.
The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary
Reading list: QA76.76.O63 R396 1999
Libraries: Tucson Pima, UofA and PCC.
 [19]
Rochlin, Gene I.
Trapped in the Net: The Unanticipated Consequences of Computerization
Reading list: QA 76.9 .C66 R62 1997
Libraries: Tucson Pima, UofA and PCC.
 [20]
Schneier, Bruce
Beyond Fear: Thinking Sensibly About Security in an Uncertain World
Reading list: HV6432 .S36 2003
Libraries: Tucson Pima, UofA and PCC.
 [21]
Schneier, Bruce
Secrets and Lies: Digital Security in a Networked World
Reading list: QA76.9.A25 S352 2000
Libraries: Tucson Pima, UofA and PCC.
 [22]
Shasha, Dennis & Lazere, Cathy
Out of Their Minds: the lives and discoveries of 15 great computer scientists
New York: Copernicus, c1995
Reading list: QA76.2.A2 S53 1995
Libraries: Tucson Pima, UofA and PCC.
 [23]
Stephenson, Neal
In the Beginning...was the Command Line
Reading list: QA76.76 .O63 S7369 1999
Libraries: Tucson Pima, UofA and PCC.
 [24]
Stoll, Clifford.
The Cuckoo's Egg: Tracking a spy through the maze of computer espionage.
Reading list: UB271.R92 H477 1989
Libraries: Tucson Pima, UofA and PCC. See: Bates in "References".
 [25]
Tenner, Edward.
Why Things Bite Back: Technology and the revenge of unintended consequences
Reading list: T14.5 .T459 1996
Libraries: Tucson Pima, UofA and PCC.
 [26]
Torvalds, Linus, 1969- & Diamond, David
Just for Fun: the Story of an Accidental Revolutionary
Reading list: QA76.2.T67 T67 2001
Libraries: Tucson Pima, UofA and PCC.
 [27]
Wozniak, Steve & Smith, Gina
iWoz: From Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It
Reading list: QA76.2.W69 W69 2006
Libraries: Tucson Pima, UofA and PCC.
 [28]
Young, Jeffrey S. & Simon, William L.
iCon Steve Jobs: The Greatest Second Act in the History of Business
Reading list: QA76.2.J63Y677 2005
Libraries: Tucson Pima, UofA and PCC.

Instructor: Louis Taber, louis.taber.at.pima at gmail dot com (520) 206-6850
My web site in California
The Pima Community College web site

ReferencesTop4 Contact and office hours  Spring 2009 Reading List