Computers -- Government policy -- Kenya. / https://id.loc.gov/authorities/subjects/sh85029552 https://id.loc.gov/authorities/subjects/sh99005269 https://id.loc.gov/authorities/names/n80061011-781
Here are entered works on computer hardware provided by libraries to be used by patrons for access to the libraries' files, for access to databases and indexes, for access to the Internet, or for use of other software such as word processing.
Computers -- Marketing -- Case studies. / https://id.loc.gov/authorities/subjects/sh85029552 https://id.loc.gov/authorities/subjects/sh99005342 https://id.loc.gov/authorities/subjects/sh99001484 : Rodgers, F. G.
Here are entered works on present-day calculators as well as on calculators and mechanical computers of pre-1945 vintage. Works on modern electronic computers first developed after 1945 are entered under Computers.
Computers -- Problems, exercises, etc. / https://id.loc.gov/authorities/subjects/sh85029552 https://id.loc.gov/authorities/subjects/sh99001553 : Shelly, Gary B.
--subdivision Programming under types of computers, microprocessors, etc.; and under names of individual computers, microprocessors, etc., e.g. Microcomputers--Programming; IBM Personal Computer--Programming
Here are entered general works on protecting computer hardware and software from accidental or malicious access, use, modification, disclosure, or destruction. --subdivision Security measures under names of individual and types of computers, networks, and systems, e.g. IBM computers--Security measures
Computers -- Research. / https://id.loc.gov/authorities/subjects/sh85029552 https://id.loc.gov/authorities/subjects/sh2002006576 : National Research Council (U.S.).
1982
1
Computers -- Research -- United States. / https://id.loc.gov/authorities/subjects/sh85029552 https://id.loc.gov/authorities/subjects/sh2002006576 https://id.loc.gov/authorities/names/n78095330-781 : National Research Council (U.S.).
Here are entered general works on protecting computer hardware and software from accidental or malicious access, use, modification, disclosure, or destruction. --subdivision Security measures under names of individual and types of computers, networks, and systems, e.g. IBM computers--Security measures