CyberSecurity/NSF Resource Guide

 
Fountainhead Library Catalog of Print and Media Resources
Databases and Journals
  •  AMSER Applied Math and Science Education Repository. Information and Security Technologies. 500+ articles on this topical area.

  • ARXIV  (ar-kive) Open access to more than 700,000 e-prints in Physics, Mathematics, Computer Science, Quantitative Biology, Quantitative Finance and Statistics

  • Directory of Open Access Journals  Computer Science Journals  (over 300)

  • Michigan Telecommunications and Technology Law Review

  • Mitre.org Technical Papers Archives (1997-2011; numerous articles, diverse topics; no search software)

  • Tennessee Electronic Library via GALE (TEL). Preferred access. A PASSWORD IS REQUIRED: Ask your instructor or the librarian. TEL Tutor (Help).  Provides more than 60 databases. Each database contains materials from hundreds or thousands of publications. For guidance on which databases will be of the most use to you, please see the Course Resources Page for your program or course. USAGE HINT. On the first page, toggle off the pre-selected databases and choose the one(s) that interest you.

  • TEL Alternative Access. THIS PATH VALIDATES YOUR LOCATION. Adds the following resources: WorldBook Encyclopedia; from ProQuest, HeritageQuest andThe Tennesseean; and several databases containing Tennessee primary sources, archives, and ancestry. It also provides a direct link intoThe Knoxville News Sentinel. USAGE HINT. Skip the search box on the first page. Instead, choose one of the links: Subject, All TEL Databases, or Advanced Search.

Multi-Subject Databases Recommended

  • Academic OneFile
  • Expanded Academic ASAP
  • General OneFile

Subject-Oriented Databases Recommended

  • Criminal Justice Collection
  • Diversity Studies Collection
  • Military & Intelligence Collection
  • Psychology Collection
  • Vocations, Careers, & Technical Education Collection

Reference Databases Recommended 
Most multi-subject databases also include reference materials.

  • Gale Virtual Reference Library
  • General Reference Center Gold


News Databases Recommended
(For a fuller discussion of how to find newspapers etc.,
see News Access.) 

  • Info-Track Newsstand
  • National Newspaper Index
Government Resources

Articles

"Cybercrime statistics wildly inaccurate, says researcher." Cormac Herley of Microsoft Research. Homeland Security Newswire. 29 June 2011.

Data and Reference Information

Cyber Crime Statistics. Bureau of Justice
Electronic Crime Information. National Institute of Justice. Select "Electronic Crime" from the list of topics.
Investigate Cyber Crime. FBI.

Security Training

Information Assurance Support Environment (IASE) IASE Education and Training Courses  Training is available online and via media.

Government Sites

Computer Crime & Intellectual Property Section, Department of Justice (News,Reports, Cases, Policy, Evidence, Legal).
Computer Emergency Readiness Team
Cyber Security, Department of Homeland Security
Defense Information Systems Agency  
Defense Personnel Security Research Center (PERSEREC) 
National Initiative for CyberSecurity Education (NICE)
White House Foreign Policy on Cybersecurity 

Government Strategies on Cybersecurity

DHS Blueprint for a Secure Cyber Future  (Dept. Homeland Security)
DoD Strategy for Operating in Cyberspace  (Dept. of Defense, 2011)
International Strategy for Cyberspace  (White House, 2011) 
National Initiative for Cybersecurity Education (NICE)  (Nat'l. Institute of Standards and Technology)
National Security Strategy  (White House, 2010)
National Strategy for Information Sharing and Safeguarding  (White House, 2012)
National Strategy for Trusted Identities in Cyberspace  (NIST, 2011)
NIST Cybersecurity Framework 
Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity R&D Program  (White House, 2011)

Open CourseWare (OCW)

Open CourseWare Consortium Home Page. OCW Consortium offers a single-site access window into courseware uploaded from very many institutions of higher education, including some very high-quality ones, such as Johns Hopkins Bloomberg School of Public Health, Massachusetts Institute of Technology (MIT), Univeristy of Michigan, University of Notre Dame, and University of California-Irvine and -Berkeley.

OCW COURSES. The site can be searched by any word or phrase; and additional paths of discovery are available. Try these search terms: computer network, national security, network security.
 
Web Resources

Articles Online

Blogs

Microsoft Security Blog

Information Sites

Cyber Crime Statistics (Internet Crime Compliant Center [IC3]

Mandiant   Mandiant in the News   M-unition Blog  A company which presents news and blog articles with archives.

Magazines

The Ethical Hacker Network
The Hacker News (THN) Magazine   Free and monthly since April 2011. Issues must be downloaded, and there is no table of contents.

Security Training

Counter Hacker Challenges  (Excercises, Stories)   

Stimulating Speakers (TED Talks)

Behind the Great Firewall of China: Internet Censorship, 2009-2012 

See also the TED Talks speakers listed on the Computer Technologies and Electronics page.

Professional Organizations

High Tech Crime Investigation Association
International Information Security Systems Consortium (ISC)
ISACA (Formerly: Information Security and Audit Control) 
(ISC)2 Security Transcends Technology, (ISC)2 Code of Ethics  
The Operations Security Professional's Organization 
VTE.CERT.org  


Top of Page

Suggestions for the content of this page are welcome.

Updated: 09/22/2014

 

 

 

Back to Top