1. Events and Sightings: SIGCIS 2016 Workshop Report
  2. Chigusa Kita, Ramesh Subramanian
  3. pp. 3-5
  4. DOI: 10.1353/ahc.2016.0038
  5. restricted access View | Download |
  1. Think Piece: On the Cruelty of Really Writing a History of Machine Learning
  2. Aaron Plasek
  3. pp. 6-8
  4. DOI: 10.1353/ahc.2016.0039
  5. restricted access View | Download |
  1. Computer Security, Part 2
  2. Jeffrey R. Yost
  3. pp. 10-11
  4. DOI: 10.1353/ahc.2016.0040
  5. restricted access View | Download |
  1. Computer Security Discourse at RAND, SDC, and NSA (1958–1970)
  2. Thomas J. Misa
  3. pp. 12-25
  4. DOI: 10.1353/ahc.2016.0041
  5. restricted access View | Download |
  1. Before It Was a Giant: The Early History of Symantec, 1982–1999
  2. William Aspray, James W. Cortada
  3. pp. 26-41
  4. DOI: 10.1353/ahc.2016.0042
  5. restricted access View | Download |
  1. The March of IDES: Early History of Intrusion-Detection Expert Systems
  2. Jeffrey R. Yost
  3. pp. 42-54
  4. DOI: 10.1353/ahc.2016.0043
  5. restricted access View | Download |
  1. Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity
  2. Quinn DuPont, Bradley Fidler
  3. pp. 55-73
  4. DOI: 10.1353/ahc.2016.0044
  5. restricted access View | Download |
  1. The Dawn of Digital Light
  2. Alvy Ray Smith
  3. pp. 74-91
  4. DOI: 10.1353/ahc.2016.0045
  5. restricted access View | Download |
  1. Before Torchi and Schwilgué, There Was White
  2. Denis Roegel, David Walden
  3. pp. 92-93
  4. DOI: 10.1353/ahc.2016.0046
  5. restricted access View | Download |
  1. Privacy by James Graham (review)
  2. Andrew Russell
  3. p. 94
  4. DOI: 10.1353/ahc.2016.0047
  5. restricted access View | Download |
  1. A Truck Full of Money by Tracy Kidder (review)
  2. David Walden
  3. pp. 95-96
  4. DOI: 10.1353/ahc.2016.0048
  5. restricted access View | Download |