2
Revised 9/25/2019 1 Contact Us Website Email Phone www.ntc.edu/library [email protected] 715.803.1115 SUGGESTED KEYWORDS DATABASES STREAMING VIDEOS E-BOOKS Click on tles to read ebooks IT CYBERSECURITY SPECIALIST A List of Selected Resources Library Research Guide Cybersecurity law. 2017 Detecng & migang roboc cyber security risks. 2017 Lessons learned: Crical informaon infrastructure protecon. 2018 Privacy and security policies in big data. 2018 Security breaches and theſt prevenon in the Internet of things. 2017 Anvirus soſtware Command line and shells Computer hacking Computer networks—Security measures Computer security Cyberterrorism Data protecon Data recovery Data security failures Ethical hacking Firewalls Footprinng Incident response Internet security Privacy Risk management in business Security breaches Social engineering Vulnerability analysis Cyber security: CNN. 2017 Ethical hacking. 2019 Ethical hacking: Footprinng and reconnaissance. 2019 Thinking about cybersecurity: The Great Courses. 18 videos Academic Search Premier Business Source Premier Credo Reference E-books E-Book Central Ebsco E-Book Collecon EBSCOhost Films on Demand Gale Virtual Reference Library MasterFILE Premier Kanopy Lynda.com Military and Government Collecon ProQuest Todays Science Wall Street Journal World News Digest

IT YERSEURITY SPEIALIST Library Research Guide...303.4833 Sch26o 2016 ook located on Library’s 2nd floor. The disaster recovery handbook. 2017 Click link to access e-book. Inventors

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IT YERSEURITY SPEIALIST Library Research Guide...303.4833 Sch26o 2016 ook located on Library’s 2nd floor. The disaster recovery handbook. 2017 Click link to access e-book. Inventors

Revised 9/25/2019 1

Contact Us Website Email Phone

www.ntc.edu/library [email protected] 715.803.1115

SUGGESTED KEYWORDS

DATABASES

STREAMING VIDEOS

E-BOOKS Click on titles to read ebooks

IT CYBERSECURITY SPECIALIST

A List of Selected Resources Library Research Guide

Cybersecurity law.

2017

Detecting &

mitigating robotic

cyber security risks.

2017

Lessons learned:

Critical information

infrastructure

protection. 2018

Privacy and security

policies in big data.

2018

Security breaches

and theft prevention

in the Internet of

things. 2017

Antivirus software

Command line and shells

Computer hacking

Computer networks—Security

measures

Computer security

Cyberterrorism

Data protection

Data recovery

Data security failures

Ethical hacking

Firewalls

Footprinting

Incident response

Internet security

Privacy

Risk management in business

Security breaches

Social engineering

Vulnerability analysis

Cyber security: CNN. 2017 Ethical hacking. 2019 Ethical hacking:

Footprinting and

reconnaissance. 2019

Thinking about

cybersecurity: The Great

Courses. 18 videos

Academic Search Premier

Business Source Premier

Credo Reference E-books

E-Book Central

Ebsco E-Book Collection

EBSCOhost

Films on Demand

Gale Virtual Reference Library

MasterFILE Premier

Kanopy

Lynda.com

Military and Government Collection

ProQuest

Today’s Science

Wall Street Journal

World News Digest

Page 2: IT YERSEURITY SPEIALIST Library Research Guide...303.4833 Sch26o 2016 ook located on Library’s 2nd floor. The disaster recovery handbook. 2017 Click link to access e-book. Inventors

Revised 9/25/2019 2

IT CYBERSECURITY SPECIALIST

A List of Selected Resources Library Research Guide

BOOKS & E-BOOKS

ADDITIONAL RELATED WEBSITES Click on links

ONLINE JOURNALS

Online health and

safety: from cyber-

bullying to internet

addiction.

303.4833 Sch26o 2016

Book located on Library’s 2nd floor.

The disaster

recovery

handbook.

2017

Click link to access e-book.

Inventors of

computer

technology.

004.092 M834i 2016

Book located on Library’s 2nd floor.

Principles of

robotics & artificial

intelligence.

2018

Click link to access e-book.

Principles of

programming &

coding.

005.1 P935 2018

Book located on Library’s 2nd floor.

Cyber, Intelligence and Security

Cybersecurity: Springer Open

Journal of Computer Security—Full-Text delay: 9 months

Journal of Cybersecurity: Oxford Academic

Journal of Information Security

Journal of Cybersecurity Education, Research and Practice from Paperity: Open Science Aggregated

National Cybersecurity Institute Journal from: Directory of Open Access Journals Database

Security Journal

Solutions for Enterprise Security Leaders

Information Security Analysts —Career information

Network and Computer Systems Administrators—Career information