It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
ITEC 1001 - Perspectives on the History of Computing: Books
This guide was created to help you find resources for ITEC 1001 - Perspectives on the History of Computing.
Select "University System of Georgia" as a search option to locate books at other USG college libraries. After you find a book, order it by clicking "Request." (Make sure you are logged in to GIL-Find!)
Check in GIL-Find for items (print or electronic) that your professor has put on reserve.
Ask for books and other print materials at the desk in the Library.
Log in to online reserves with the password your professor provides you.
Books at MGA
Apple Confidential: the real story of Apple Computer, Inc. by Owen W. Linzmayer[ebook]: Journalist Linzmayer explores Apple's tumultuous history from its legendary founding, through a series of disastrous executive decisions, to its recent return to profitability. Backed by exhaustive research, the book debunks many of the myths and half-truths surrounding Apple, the Macintosh, and its creators. Linzmayer looks into secret archives, interviews key players, and tells the real stories behind the hype.--From publisher description.
Building IBM: shaping an industry and its technology by Emerson W. Pugh[ebook]: No company of the twentieth century achieved greater success and engendered more admiration, respect, envy, fear, and hatred than IBM. Building IBM tells the story of that company, how it was formed, how it grew, and how it shaped and dominated the information processing industry.
Call Number: HD9696.C64 I4867 1995eb
Publication Date: 1995-03-16
Cyber Blockades by Alison Lawlor Russell[ebook] Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare. The author defines and explains the emerging concept of "cyber blockades" and presents a unique comparison of blockade operations in five different domains--on land, at sea, in the air, in space, and in cyberspace--identifying common elements as well as important distinctions. Alison Lawlor Russell's framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War. Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare.
Call Number: HV6773.15.C97 R87 2014eb
Publication Date: 2014-11-05
Digitized by Peter J. Bentley[print] There's a hidden science that affects every part of your life. You are fluent in its terminology of email, WiFi, social networking, and encryption. You use its results when you make a telephone call, access the Internet, use any factory-produced product, or travel in any modern car.The discipline is so new that some prefer to call it a branch of engineering or mathematics. But it is so powerful and world-changing that you would be hard-pressed to find a single human being on the planet unaffected by its achievements. The science of computers enables the supply and creation of power, food, water, medicine, transport, money, communication, entertainment, and most goods in shops. It has transformed societies with the Internet, the digitization of information, mobile phone networks and GPS technologies. Here, Peter J. Bentley explores how this young discipline grew from its theoretical conception by pioneers such as Turing, through its growth spurts in the Internet, its difficult adolescent stage where the promises of AI were never achieved and dot-com bubble burst, to its current stage as a(semi)mature field, now capable of remarkable achievements. Charting the successes and failures of computer science through the years, Bentley discusses what innovations may change our world in the future.