Westlaw Information |
Careers |
News Feeds |
Cybersecurity Resources |
Tallinn Manual |
Computer Hardware Tutorial |

Search articles, books, eBooks and more on EBSCO Discovery Service |
From Logue Catalog
- Cybersecurity – eBooks
- Cybersecurity – Print Books
- Cyber Security – eBooks
- Cyber Security – Print Books
- Cyberterrorism – eBooks
- Cyberterrorism – Print Books
Databases
- EBSCO eBooks – Computer Crime
- IEEE Security & Privacy
- International Journal of Cyber Criminology
- Westlaw
Online Resources
- Akamai Blog
- Amazon Web Services (AWS) – cybersecurity program
- Ask the Tech Guy Hosted by Leo Laporte
- Bleeping Computer
- Breach Level Index (BLI)
- Broadcom
- Comparitech – Map of US ransomware attacks (updated daily)
- CISA – Publications Library
- Computer Weekly
- Congress.gov (formerly THOMAS)
- Cyber Security and Advanced Techniques to Safeguard your Data
- Errata Security
- Google’s Digital Attack Map
- Government Technology
- Graham Cluley
- Guidelines on Cell Phone Forensics
- HTCIA – High Technology Crime Investigation Association
- Information Security Careers Network (ISCN)
- Internet of Things Consortium (IoTC)
- Kim Komando
- Krebs on Security
- LinkedIn – The Cyber Security Jobs
- McAfee Antivirus
- McAfee Institute
- Naked Security
- National Cyber Security Centre
- National Institute of Justice Publications
- Network Forensics and Challenges for Cybersecurity.
- NIST’s Guidelines on Cell Phone Forensics
- Norton
- OSINT Framework
- Oyez – Cases
- Sans.org – Great reading room for cybersecurity articles. (need to join: free)
- SecureMac
- Security Weekly
- Shodan
- Supreme Court Database
- The Security Ledger
- The Tech Guy with Leo Laporte
- Threatpost
- Twit TV
- US-CERT
- Wombat Security

News
Organizations
- AEHIS – The Association for Executives in Healthcare Information Security
- AISA – African Information Security Association
- AISA – Australian Information Security Association
- AISP – Association of Information Security Professionals
- AITP (Association of Information Technology Professionals)
- Anita Borg Institute (ABI)
- APWG – Anti-Phishing Working Group
- Association for Women in Computing (AWC)
- Association for Women in Science (AWIS)
- (CIS) Center for Internet Security
- CSA – Cloud Security Alliance
- Cyber, Space & Intelligence Association
- Cyber Defense Labs
- Committee on Women in Science, Engineering and Medicine
- EWF – Executive Women’s Forum on Information Security, Risk Management & Privacy
- Federal Bureau of Investigation
- FIRST – Forum of Incident Response and Security Teams
- FISSEA – Federal Information Systems Security Educators’ Association
- IAPP – International Association of Privacy Professionals
- IASAP – International Association of Security Awareness Professionals
- Identity Management Institute
- IEEE Women in Engineering (WIE)
- IIA – The Institute of Internal Auditors
- International Association for Cryptologic Research
- International Center for Research on Women
- Internet of Things Consortium
- Internet of Things Society
- Internet Security Alliance
- ISF – Information Security Forum
- ISFS – Information Security & Forensics Society
- ISRA – Information Security Research Association
- ISSA – Information Systems Security Association
- MentorNet
- National Academy of Engineering (NAE) – EngineerGirl
- National Center for Women & Information Technology (NCWIT)
- National Cyber Security Alliance
- Nerdgirls
- O’Reilly Women in Technology
- OWASP – The Open Web Application Security Project
- Singularity University (SU)
- SWE (The Society for Women Engineers)
- The SANS Institute
- The Association for Women in Computing (AWC)
- Tech Bridge: Encouraging Girls in Science, Technology and Engineering Careers
- The Internet Engineering Task Force (IETF)
- WiCyS – Women In Cybersecurity
- WISE
- Women IEEE Fellows
- Women in Computing
- Women in Engineering Proactive Network(WEPAN)
Additional Resources