Computing DatabaseThis link opens in a new windowJournal articles on "database design, software development, web commerce, LANs, WANs, intranets and the internet"
This database is a premium resource for those who need access to comprehensive coverage of computer topics. The database includes numerous titles, most of them in full text, allowing users to search records dating back to the early 1990's".
IEEE ExploreThis link opens in a new windowProvides access to some of the world's most important publications in electrical engineering, computer science and electronics published by IEEE (Institute of Electrical and Electronics Engineers) and its partners. Once you have results from your search, click on "Subscribed Content" to limit your search to content included in DeVry University's subscription
O'Reilly MediaThis link opens in a new windowBooks, videos, learning paths, and more on a range of subjects from technology and engineering to business and career development.
SkillSoft BooksThis link opens in a new windowProvides access to over 25,000 eBooks in the areas of engineering, business, finance, IT, government, and wellness
Telecommunications DatabaseThis link opens in a new window"ProQuest Telecommunications™ is an essential resource for anyone researching the industry or its technology."
eBook Collections
Credo ReferenceThis link opens in a new windowAn eBook collection of 600+ high-quality, constantly updated reference books, dictionaries, encyclopedias and atlases.
Ebook CentralThis link opens in a new windowFull-text e-books covering business, science and technology, social sciences, health and medicine, history, language and literature, and the arts.
eBooks by EBSCOhostThis link opens in a new windowProvides access to over 20,000 eBooks on a wide variety of topics
SkillSoft BooksThis link opens in a new windowProvides access to over 25,000 eBooks in the areas of engineering, business, finance, IT, government, and wellness
Digital Forensics for Handheld Devices by Eamon P. DohertyApproximately 80 percent of the world's population now owns a cell phone, which can hold evidence or contain logs about communications concerning a crime. Cameras, PDAs, and GPS devices can also contain information related to corporate policy infractions and crimes. Aimed to prepare investigators in the public and private sectors, Digital Forensics for Handheld Devices examines both the theoretical and practical aspects of investigating handheld digital devices. This book touches on all areas of mobile device forensics, including topics from the legal, technical, academic, and social aspects of the discipline. It provides guidance on how to seize data, examine it, and prepare it as evidence for court. This includes the use of chain of custody forms for seized evidence and Faraday Bags for digital devices to prevent further connectivity and tampering of evidence. Emphasizing the policies required in the work environment, the author provides readers with a clear understanding of the differences between a corporate investigation and a criminal investigation. The book also: Offers best practices for establishing an incident response policy and seizing data from company or privately owned digital devices Provides guidance in establishing dedicated examinations free of viruses, spyware, and connections to other devices that could taint evidence Supplies guidance on determining protocols for complicated crime scenes with external media and devices that may have connected with the handheld device Considering important privacy issues and the Fourth Amendment, this book facilitates an understanding of how to use digital forensic tools to investigate the complete range of available digital devices, including flash drives, cell phones, PDAs, digital cameras, and netbooks. It includes examples of commercially available digital forensic tools and ends with a discussion of the education and certifications required for various careers in mobile device forensics.
ISBN: 9781439898772
Publication Date: 2012-08-17
Making Sense of Cyber Security by Thomas KranzA jargon-free, practical guide to the key concepts, terminology, and technologies of cybersecurity perfect for anyone planning or implementing a security strategy. Go behind the headlines of famous attacks and learn lessons from real-world breaches that author Tom Kranz has personally helped to clean up. Making Sense of Cyber Security is full of clear-headed advice and examples that will help you identify risks in your organization and choose the right path to apply the important security concepts effectively. Making Sense of Cyber Security is a no-nonsense overview of common cyber threats. Written for readers at all skill levels, this easy-to-read guide breaks down the core ideas and terminology of cybersecurity so that you can effectively contribute to the planning and implementation of a security strategy. You''ll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization''s readiness about the technology Every high-profile data breach underlines the need for cybersecurity. A proper understanding of threats, vulnerabilities, and most-likely attacks empowers you to make better decisions and mitigate risks. about the book Making Sense of Cyber Security is a no-nonsense overview of common cyber threats. Written for readers at all skill levels, this easy-to-read guide breaks down the core ideas and terminology of cybersecurity so that you can effectively contribute to the planning and implementation of a security strategy. You''ll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization''s readiness. Renowned security expert Tom Kranz teaches you to think like a hacker, ensuring you can spot your own weak points and evaluate risks in new technologies or processes. You''ll cement this mindset by planning your own penetration test--taking on the role of the attacker in a simulated hack against an asset management firm. Finally, you''ll work through a real-world security breach, learning how to respond to live threats and apply the lessons learned to your own organization.
ISBN: 9781617298004
Publication Date: 2022-11-29
Privacy Rights in the Digital Age by Jane Kirtley (Editor)This new edition discusses the practical, political, psychological, and philosphical challenges we face as technological advances have changed the landscape of traditional notions of privacy.
ISBN: 9781642650778
Publication Date: 2019-05-30
RIoT Control by Tyson MacaulayRIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from "Regular" Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases.
The State of CybersecurityPackt PublishingJuly 2022
The State of Cybersecurity
This video explains the state of cybersecurity.
Other Resources
Credo ReferenceThis link opens in a new windowAn eBook collection of 600+ high-quality, constantly updated reference books, dictionaries, encyclopedias and atlases.
RefWorksThis link opens in a new windowA comprehensive reference management service for preparing bibliographies in APA and other citation styles. Use RefWorks to import and create citations, build lists of references, and integrate citations into your papers using the Write-n-Cite app.
Ask A Librarian
Knowledge Base search a series of commonly asked questions by topic keyword or course number