
Search articles, books, eBooks and more on EBSCO Discovery Service |
Books
- Application Security – eBooks only
- Artificial Intelligence – eBooks
- Artificial Intelligence – Print Books
- Cloud Security – eBooks only
- Computer Crime – eBook
- Computer Crime – print Books
- Computer Hacking – eBooks
- Computer Hacking – Print Books
- Computer Network Vulnerability – eBooks only
- Cryptography – eBooks
- Cryptography – Print Books
- Cybercrime and Threats – eBooks
- Cybercrime and Threats – Print Books
- Cybersecurity – eBooks
- Cybersecurity – Print Books
- Cyber Security – eBooks
- Cyber Security – Print Books
- Cyberterrorism – eBooks
- Cyberterrorism – Print Books
- Data Security – eBooks
- Data Security – Print Books
- Digital Forensics and Incident Response – eBooks only
- IoT Security – eBooks only
- Network Security – eBooks only
- Open Source Intelligence – eBooks
- Open Source Intelligence – Print Book
- Penetration Tester – eBooks only
- Security Architect – eBooks
- Security Architect – Print Books
- Terrorism and homeland security – eBooks only
- VPN (Virtual Private Network) – eBooks
- VPN (Virtual Private Network) – Print Books
Online Resources
Communications of the ACM
- Akamai Blog
- Ask the Tech Guy Hosted by Leo Laporte
- Bleeping Computer
- Broadcom
- Comparitech – Map of US ransomware attacks (updated daily)
- CISA – Publications Library
- Computer Weekly
- Congress.gov (formerly THOMAS)
- Cyber Security and Advanced Techniques to Safeguard your Data
- Errata Security
- Google’s Digital Attack Map
- Graham Cluley
- HTCIA – High Technology Crime Investigation Association
- Internet of Things Consortium (IoTC)
- Kim Komando
- Krebs on Security
- Naked Security
- National Cyber Security Centre
- National Institute of Justice Publications
- Network Forensics and Challenges for Cybersecurity.
- Norton
- OSINT Framework
- Sans.org – Great reading room for cybersecurity articles. (need to join: free)
- SecureMac
- Security Weekly
- Shodan
- Supreme Court Database
- The Security Ledger
- Threatpost
- Twit TV
- US-CERT
Publication Finder Resources
News
- News Feeds
- Security Week
- The Hacker News
- Threatpost
- Wired
- What is an OSINT Tool – Best OSINT Tools 2023
Organizations
- AEHIS – The Association for Executives in Healthcare Information Security
- AISA – African Information Security Association
- AISA – Australian Information Security Association
- AISP – Association of Information Security Professionals
- Anita Borg Institute (ABI)
- Association for Women in Computing (AWC)
- Association for Women in Science (AWIS)
- CSA – Cloud Security Alliance
- Committee on Women in Science, Engineering and Medicine
- EWF – Executive Women’s Forum on Information Security, Risk Management & Privacy
- Federal Bureau of Investigation
- FIRST – Forum of Incident Response and Security Teams
- IAPP – International Association of Privacy Professionals
- IASAP – International Association of Security Awareness Professionals
- IEEE Women in Engineering (WIE)
- IIA – The Institute of Internal Auditors
- International Association for Cryptologic Research
- Internet Security Alliance
- ISFS – Information Security & Forensics Society
- ISSA – Information Systems Security Association
- MentorNet
- National Center for Women & Information Technology (NCWIT)
- National Cyber Security Alliance
- OWASP – The Open Web Application Security Project
- The SANS Institute
- WiCyS – Women In Cybersecurity
- WISE
- Women IEEE Fellows
- Women in Computing