CyberSecurity/NSF Resource Guide

 
Fountainhead Library Catalog of Print and Media Resources
Databases and Journals
  •  AMSER Applied Math and Science Education Repository. Information and Security Technologies. 500+ articles on this topical area.

  • ARXIV  (ar-kive) Open access to more than 700,000 e-prints in Physics, Mathematics, Computer Science, Quantitative Biology, Quantitative Finance and Statistics

  • Directory of Open Access Journals  Computer Science Journals  (over 300)

  • Michigan Telecommunications and Technology Law Review

  • Mitre.org Technical Papers Archives (1997-2011; numerous articles, diverse topics; no search software)

  • Tennessee Electronic Library via GALE (TEL). Preferred access. A PASSWORD IS REQUIRED: Ask your instructor or the librarian. TEL Tutor (Help).  Provides more than 60 databases. Each database contains materials from hundreds or thousands of publications. For guidance on which databases will be of the most use to you, please see the Course Resources Page for your program or course. USAGE HINT. On the first page, toggle off the pre-selected databases and choose the one(s) that interest you.

  • TEL Alternative Access. THIS PATH VALIDATES YOUR LOCATION. Adds the following resources: WorldBook Encyclopedia; from ProQuest, HeritageQuest andThe Tennesseean; and several databases containing Tennessee primary sources, archives, and ancestry. It also provides a direct link intoThe Knoxville News Sentinel. USAGE HINT. Skip the search box on the first page. Instead, choose one of the links: Subject, All TEL Databases, or Advanced Search.

Multi-Subject Databases Recommended

  • Academic OneFile
  • Expanded Academic ASAP
  • General OneFile

Subject-Oriented Databases Recommended

  • Criminal Justice Collection
  • Diversity Studies Collection
  • Military & Intelligence Collection
  • Psychology Collection
  • Vocations, Careers, & Technical Education Collection

Reference Databases Recommended 
Most multi-subject databases also include reference materials.

  • Gale Virtual Reference Library
  • General Reference Center Gold


News Databases Recommended
(For a fuller discussion of how to find newspapers etc.,
see News Access.) 

  • Info-Track Newsstand
  • National Newspaper Index
Government Resources

Articles and Reports

"Cybercrime statistics wildly inaccurate, says researcher." Cormac Herley of Microsoft Research. Homeland Security Newswire. 29 June 2011.

Cybersecurity Publications, Department of Homeland Security   

Data and Reference Information

Cyber Crime Statistics. Bureau of Justice
Electronic Crime Information. National Institute of Justice. Select "Electronic Crime" from the list of topics.
Investigate Cyber Crime. FBI.

Security Training

Information Assurance Support Environment (IASE) IASE Education and Training Courses  Training is available online and via media.

Government Sites

Computer Crime & Intellectual Property Section, Department of Justice (News,Reports, Cases, Policy, Evidence, Legal).
Computer Emergency Readiness Team
Cybersecurity, Department of Homeland Security
Defense Information Systems Agency  
Defense Personnel Security Research Center (PERSEREC) 
National Initiative for CyberSecurity Education (NICE)
White House Foreign Policy on Cybersecurity 

Government Strategies on Cybersecurity

DHS Blueprint for a Secure Cyber Future  (Dept. Homeland Security)
DoD Strategy for Operating in Cyberspace  (Dept. of Defense, 2011)
International Strategy for Cyberspace  (White House, 2011) 
National Initiative for Cybersecurity Education (NICE)  (Nat'l. Institute of Standards and Technology)
National Security Strategy  (White House, 2010)
National Strategy for Information Sharing and Safeguarding  (White House, 2012)
National Strategy for Trusted Identities in Cyberspace  (NIST, 2011)
NIST Cybersecurity Framework 
Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity R&D Program  (White House, 2011)

Open CourseWare (OCW)

Open CourseWare Consortium Home Page. OCW Consortium offers a single-site access window into courseware uploaded from very many institutions of higher education, including some very high-quality ones, such as Johns Hopkins Bloomberg School of Public Health, Massachusetts Institute of Technology (MIT), Univeristy of Michigan, University of Notre Dame, and University of California-Irvine and -Berkeley.

OCW COURSES. The site can be searched by any word or phrase; and additional paths of discovery are available. Try these search terms: computer network, national security, network security.
 
Web Resources

Articles Online

Blogs

Microsoft Security Blog

Information Sites

Cyber Crime Statistics (Internet Crime Compliant Center [IC3]

Mandiant   Mandiant in the News   M-unition Blog  A company which presents news and blog articles with archives.

Magazines

The Ethical Hacker Network
The Hacker News (THN) Magazine   Free and monthly since April 2011. Issues must be downloaded, and there is no table of contents.

Security Training

Counter Hacker Challenges  (Excercises, Stories)   

Stimulating Speakers (TED Talks)

Behind the Great Firewall of China: Internet Censorship, 2009-2012 

See also the TED Talks speakers listed on the Computer Technologies and Electronics page.

Professional Organizations

High Tech Crime Investigation Association
International Information Security Systems Consortium (ISC)
ISACA (Formerly: Information Security and Audit Control) 
(ISC)2 Security Transcends Technology, (ISC)2 Code of Ethics  
The Operations Security Professional's Organization 
VTE.CERT.org  


Top of Page

Suggestions for the content of this page are welcome.

Updated: 08/24/2015

 

 

 

Back to Top

Profile Information

Application afterLoad: 0.000 seconds, 0.40 MB
Application afterInitialise: 0.026 seconds, 3.34 MB
Application afterRoute: 0.039 seconds, 4.81 MB
Application afterDispatch: 0.084 seconds, 8.04 MB
Application afterRender: 0.244 seconds, 10.47 MB

Memory Usage

11160072

31 queries logged

  1. SELECT *
      FROM jos_session
      WHERE session_id = 'jqq5o2f24cej62bbf6ttq9vcp1'
  2. DELETE
      FROM jos_session
      WHERE ( TIME < '1508737845' )
  3. SELECT *
      FROM jos_session
      WHERE session_id = 'jqq5o2f24cej62bbf6ttq9vcp1'
  4. INSERT INTO `jos_session` ( `session_id`,`time`,`username`,`gid`,`guest`,`client_id` )
      VALUES ( 'jqq5o2f24cej62bbf6ttq9vcp1','1508797785','','0','1','0' )
  5. SELECT *
      FROM jos_components
      WHERE parent = 0
  6. SELECT folder AS TYPE, element AS name, params
      FROM jos_plugins
      WHERE published >= 1
      AND access <= 0
      ORDER BY ordering
  7. CREATE TABLE IF NOT EXISTS `jos_ualog` (
              `id` INT(11) NOT NULL AUTO_INCREMENT,
              `user_id` INT(11) NOT NULL,
              `option` VARCHAR(255) NOT NULL,
              `task` VARCHAR(255) NOT NULL,
              `action_link` text NOT NULL,
              `action_title` text NOT NULL,
              `item_title` VARCHAR(255) NOT NULL,
              `cdate` INT(11) NOT NULL,
              PRIMARY KEY  (`id`))
  8. SELECT *
      FROM jos_redj
      WHERE ( (('/resources/library/course-resources/592-cybercrime-resource-guide' REGEXP BINARY fromurl)>0
      AND case_sensitive<>'0') OR (('/resources/library/course-resources/592-cybercrime-resource-guide' REGEXP fromurl)>0
      AND case_sensitive='0') )
      AND published='1'
      ORDER BY ordering
  9. SELECT m.*, c.`option` AS component
      FROM jos_menu AS m
      LEFT JOIN jos_components AS c
      ON m.componentid = c.id
      WHERE m.published = 1
      ORDER BY m.sublevel, m.parent, m.ordering
  10. SELECT id, parent_id, VALUE, name, lft, rgt
      FROM jos_core_acl_aro_groups
      WHERE id=23
  11. SHOW COLUMNS
      FROM jos_content
  12. SELECT template
      FROM jos_templates_menu
      WHERE client_id = 0
      AND (menuid = 0 OR menuid = 167)
      ORDER BY menuid DESC
      LIMIT 0, 1
  13. SELECT a.*, u.name AS author, u.usertype, cc.title AS category, s.title AS SECTION, CASE WHEN CHAR_LENGTH(a.alias) THEN CONCAT_WS(":", a.id, a.alias) ELSE a.id END AS slug, CASE WHEN CHAR_LENGTH(cc.alias) THEN CONCAT_WS(":", cc.id, cc.alias) ELSE cc.id END AS catslug, g.name AS groups, s.published AS sec_pub, cc.published AS cat_pub, s.access AS sec_access, cc.access AS cat_access  , ROUND( v.rating_sum / v.rating_count ) AS rating, v.rating_count
      FROM jos_content AS a
      LEFT JOIN jos_categories AS cc
      ON cc.id = a.catid
      LEFT JOIN jos_sections AS s
      ON s.id = cc.SECTION
      AND s.scope = "content"
      LEFT JOIN jos_users AS u
      ON u.id = a.created_by
      LEFT JOIN jos_groups AS g
      ON a.access = g.id
      LEFT JOIN jos_content_rating AS v
      ON a.id = v.content_id
      WHERE a.id = 592
      AND (  ( a.created_by = 0 )    OR  ( a.state = 1
      AND ( a.publish_up = '0000-00-00 00:00:00' OR a.publish_up <= '2017-10-23 22:29:45' )
      AND ( a.publish_down = '0000-00-00 00:00:00' OR a.publish_down >= '2017-10-23 22:29:45' )   )    OR  ( a.state = -1 )  )
  14. UPDATE jos_content
      SET hits = ( hits + 1 )
      WHERE id='592'
  15. SELECT g.*
      FROM jos_core_acl_aro_groups AS g
      INNER JOIN jos_core_acl_groups_aro_map AS gm
      ON gm.group_id = g.id
      INNER JOIN jos_core_acl_aro AS ao
      ON ao.id = gm.aro_id
      WHERE ao.VALUE='138'
      ORDER BY g.id
  16. SELECT *
      FROM jos_tagmeta
      WHERE ( (('/resources/library/course-resources/592-cybercrime-resource-guide' REGEXP BINARY uri)>0
      AND case_sensitive<>'0') OR (('/resources/library/course-resources/592-cybercrime-resource-guide' REGEXP uri)>0
      AND case_sensitive='0') )
      AND published='1'
      ORDER BY ordering
  17. SELECT m.*, am.params AS adv_params
      FROM jos_modules AS m
      LEFT JOIN jos_advancedmodules AS am
      ON am.moduleid = m.id
      WHERE m.published = 1
      AND m.access <= 0
      AND m.client_id = 0
      ORDER BY m.ordering, m.id
  18. SELECT parent
      FROM jos_menu
      WHERE id = 167
      LIMIT 1
  19. SELECT parent
      FROM jos_menu
      WHERE id = 51
      LIMIT 1
  20. SELECT parent
      FROM jos_menu
      WHERE id = 5
      LIMIT 1
  21. SELECT parent
      FROM jos_menu
      WHERE id = 167
      LIMIT 1
  22. SELECT parent
      FROM jos_menu
      WHERE id = 51
      LIMIT 1
  23. SELECT parent
      FROM jos_menu
      WHERE id = 5
      LIMIT 1
  24. SELECT parent
      FROM jos_menu
      WHERE id = 167
      LIMIT 1
  25. SELECT parent
      FROM jos_menu
      WHERE id = 51
      LIMIT 1
  26. SELECT parent
      FROM jos_menu
      WHERE id = 5
      LIMIT 1
  27. SELECT parent
      FROM jos_menu
      WHERE id = 167
      LIMIT 1
  28. SELECT parent
      FROM jos_menu
      WHERE id = 51
      LIMIT 1
  29. SELECT parent
      FROM jos_menu
      WHERE id = 5
      LIMIT 1
  30. SELECT a.*,  CASE WHEN CHAR_LENGTH(a.alias) THEN CONCAT_WS(":", a.id, a.alias) ELSE a.id END AS slug, CASE WHEN CHAR_LENGTH(cc.alias) THEN CONCAT_WS(":", cc.id, cc.alias) ELSE cc.id END AS catslug
      FROM jos_content AS a
      LEFT JOIN jos_content_frontpage AS f
      ON f.content_id = a.id
      INNER JOIN jos_categories AS cc
      ON cc.id = a.catid
      INNER JOIN jos_sections AS s
      ON s.id = a.sectionid
      WHERE a.state = 1
      AND ( a.publish_up = '0000-00-00 00:00:00' OR a.publish_up <= '2017-10-23 22:29:45' )
      AND ( a.publish_down = '0000-00-00 00:00:00' OR a.publish_down >= '2017-10-23 22:29:45' )
      AND s.id > 0
      AND a.access <= 0
      AND cc.access <= 0
      AND s.access <= 0
      AND (s.id=16)
      AND f.content_id IS NULL  
      AND s.published = 1
      AND cc.published = 1
      ORDER BY a.created DESC
      LIMIT 0, 5
  31. SELECT config
      FROM jos_pi_aua_config
      WHERE id='aua'
      LIMIT 1

Language Files Loaded

Untranslated Strings Diagnostic

None

Untranslated Strings Designer

None