Journal articles on "database design, software development, web commerce, LANs, WANs, intranets and the internet". This database is a premium resource for those who need access to comprehensive coverage of computer topics. The database includes numerous titles, most of them in full text, allowing users to search records dating back to the early 1990's".
Provides access to some of the world's most important publications in electrical engineering, computer science and electronics published by IEEE (Institute of Electrical and Electronics Engineers) and its partners. Once you have results from your search, click on "Subscribed Content" to limit your search to content included in DeVry University's subscription
"ProQuest Telecommunications™ is an essential resource for anyone researching the industry or its technology."
eBook Collections
Credo ReferenceThis link opens in a new windowAn eBook collection of 600+ high-quality, constantly updated reference books, dictionaries, encyclopedias and atlases.
Ebook CentralThis link opens in a new windowFull-text e-books covering business, science and technology, social sciences, health and medicine, history, language and literature, and the arts.
eBooks by EBSCOhostThis link opens in a new windowProvides access to over 20,000 eBooks on a wide variety of topics
Cyber Security by David SuttonCyber security has never been more essential than it is today, it's not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure. Cyber Securityexplains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen. Written in an accessible manner, Cyber Securityprovides practical guidance and actionable steps to better prepare your workplace and your home alike. This second edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation. * A valuable guide to both current professionals at all levels and those wishing to embark on a cyber security profession * Offers practical guidance and actionable steps for individuals and businesses to protect themselves * Highly accessible and terminology is clearly explained and supported with current, real-world examples
ISBN: 9781780175973
Publication Date: 2022-12-12
Cybersecurity and Decision Makers by Marie De éminvilleCyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.
ISBN: 9781786305190
Publication Date: 2020-06-03
Digital Forensics for Handheld Devices by Eamon P. DohertyApproximately 80 percent of the world's population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital Forensics for Handheld Devices examines both the theoretical and practical aspects of investigating handheld digital devices. This book touches on all areas of mobile device forensics, including topics from the legal, technical, academic, and social aspects of the discipline. It provides guidance on how to seize data, examine it, and prepare it as evidence for court. This includes the use of chain of custody forms for seized evidence and Faraday Bags for digital devices to prevent further connectivity and tampering of evidence. Emphasizing the policies required in the work environment, the author provides readers with a clear understanding of the differences between a corporate investigation and a criminal investigation. The book also: Offers best practices for establishing an incident response policy and seizing data from company or privately owned digital devices Provides guidance in establishing dedicated examinations free of viruses, spyware, and connections to other devices that could taint evidence Supplies guidance on determining protocols for complicated crime scenes with external media and devices that may have connected with the handheld device Considering important privacy issues and the Fourth Amendment, this book facilitates an understanding of how to use digital forensic tools to investigate the complete range of available digital devices, including flash drives, cell phones, PDAs, digital cameras, and netbooks. It includes examples of commercially available digital forensic tools and ends with a discussion of the education and certifications required for various careers in mobile device forensics.
ISBN: 9781439898772
Publication Date: 2012-08-17
Making Sense of Cyber Security by Thomas KranzA jargon-free, practical guide to the key concepts, terminology, and technologies of cybersecurity perfect for anyone planning or implementing a security strategy. Go behind the headlines of famous attacks and learn lessons from real-world breaches that author Tom Kranz has personally helped to clean up. Making Sense of Cyber Security is full of clear-headed advice and examples that will help you identify risks in your organization and choose the right path to apply the important security concepts effectively. Making Sense of Cyber Security is a no-nonsense overview of common cyber threats. Written for readers at all skill levels, this easy-to-read guide breaks down the core ideas and terminology of cybersecurity so that you can effectively contribute to the planning and implementation of a security strategy. You''ll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization''s readiness about the technology Every high-profile data breach underlines the need for cybersecurity. A proper understanding of threats, vulnerabilities, and most-likely attacks empowers you to make better decisions and mitigate risks. about the book Making Sense of Cyber Security is a no-nonsense overview of common cyber threats. Written for readers at all skill levels, this easy-to-read guide breaks down the core ideas and terminology of cybersecurity so that you can effectively contribute to the planning and implementation of a security strategy. You''ll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization''s readiness. Renowned security expert Tom Kranz teaches you to think like a hacker, ensuring you can spot your own weak points and evaluate risks in new technologies or processes. You''ll cement this mindset by planning your own penetration test--taking on the role of the attacker in a simulated hack against an asset management firm. Finally, you''ll work through a real-world security breach, learning how to respond to live threats and apply the lessons learned to your own organization.
ISBN: 9781617298004
Publication Date: 2022-11-29
Privacy Rights in the Digital Age by Jane Kirtley (Editor)This new edition discusses the practical, political, psychological, and philosphical challenges we face as technological advances have changed the landscape of traditional notions of privacy.
ISBN: 9781642650778
Publication Date: 2019-05-30
Smart and Sustainable Intelligent Systems by Namita Gupta (Editor); Prasenjit Chatterjee (Editor); Tanupriya Choudhury (Editor)The world is experiencing an unprecedented period of change and growth through all the electronic and technilogical developments and everyone on the planet has been impacted. What was once 'science fiction', today it is a reality. This book explores the world of many of once unthinkable advancements by explaining current technologies in great detail. Each chapter focuses on a different aspect - Machine Vision, Pattern Analysis and Image Processing - Advanced Trends in Computational Intelligence and Data Analytics - Futuristic Communication Technologies - Disruptive Technologies for Future Sustainability. The chapters include the list of topics that spans all the areas of smart intelligent systems and computing such as: Data Mining with Soft Computing, Evolutionary Computing, Quantum Computing, Expert Systems, Next Generation Communication, Blockchain and Trust Management, Intelligent Biometrics, Multi-Valued Logical Systems, Cloud Computing and security etc. An extensive list of bibliographic references at the end of each chapter guides the reader to probe further into application area of interest to him/her.
The State of CybersecurityPackt PublishingJuly 2022
The State of Cybersecurity
This video explains the state of cybersecurity.
Other Resources
Credo ReferenceThis link opens in a new windowAn eBook collection of 600+ high-quality, constantly updated reference books, dictionaries, encyclopedias and atlases.
RefWorksThis link opens in a new windowA comprehensive reference management service for preparing bibliographies in APA and other citation styles. Use RefWorks to import and create citations, build lists of references, and integrate citations into your papers using the Write-n-Cite app.
Ask A Librarian
Knowledge Base - Search commonly asked questions by topic, keyword, or course number