Articles published by the ACM (journals, magazines, and conference proceedings) and citations from major publishers in computing and information systems.
Articles from IEEE Computer Society magazines, transactions, and conference publications, from 1995 - present.
Restrictions on Use and Ownership Notice
Restrictions. Except as expressly permitted in this Agreement, UMUC users may not: (1) download, reproduce, retain or redistribute the Licensed Products or any journal or issue of a journal in the Licensed Products in its entirety or in any substantial or systematic manner, including, but not limited to, accessing the Licensed Products using a robot, spider, crawler or similar technological device; (2) electronically distribute, via e-mail or otherwise, any Article or eBook; (3) abridge, modify, translate or create any derivative work based upon the Licensed Products without the prior written consent of IEEE; (4) display or otherwise make available any part of the Licensed Products to anyone other than Authorized Users; (5) sell, resell, rent, lease, license, sublicense, assign or otherwise transfer any rights granted under this Agreement, including, but not limited to, use of the Licensed Products for document delivery, fee-for-service or any other substantially similar commercial purpose; or (6) remove, obscure or modify in any way copyright notices, other notices or disclaimers that appear on Articles or eBooks or in the Licensed Products.
Ownership. UMUC users acknowledges and agrees that all right, title and interest in and to the Licensed Products, including all copyright and other intellectual property rights under United States and international laws and treaties, remain with IEEE and its licensors.
Ebooks on finance, business, IT, and technical topics, including Microsoft Office.
Personalized Features in Books24X7
All users have their own accounts when they sign into Books24X7, as anonymous users. All users are anonymous to protect their privacy. This is your own account and you can save your personalized features, which will be available to you each time you sign in.
The personalized features in Books24X7 are folders, notes, and bookmarks. These features are available to all students, faculty, and staff at UMUC. You will see these features when you view a title (notes or folders options) or chapter (notes, folders, and bookmarks). You can test out and view a title and then set up some of the features described above. If you click on the My Home tab, you will see also any folders set up on the left under the heading, Personal Folders, and the features are shown in each folder or in each of the folders.
Articles and books covering the physical sciences, engineering, life sciences, health sciences, social sciences, and humanities, from 1995 - present. NOTE: The blue Sign In button is not in use by UMGC.
This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.
Describing the threats and vulnerabilities of critical infrastructure to cybersecurity attack, this book provides definitions for cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry.
Presenting the fundamental concepts of information and communication technology (ICT) governance and control, this book, shows you how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data.
Created in 2004, the Journal of Homeland Security and Emergency Management (JHSEM) is an online journal that publishes original, innovative, and timely articles describing and assessing research and practice in the fields of homeland security and emergency management. JHSEM publishes not only peer-reviewed articles but also opinion, news/communiqués, and book/media reviews.
NIST implements practical cybersecurity and privacy through outreach and effective application of standards and best practices necessary for the U.S. to adopt cybersecurity capabilities.
The North American Industry Classification System (NAICS) is the standard used by Federal statistical agencies in classifying business establishments for the purpose of collecting, analyzing, and publishing statistical data related to the U.S. business economy.
Information Security Journal: A Global Perspective aims to inform security professionals about new technologies, useful tools, and relevant research in policy and technology. We also seek to provide insight into current and existing professional development issues.
The Journal of Cyber Security Technology is a new journal aimed at publishing World-leading research and is dedicated to being the primary platform for research in all technical areas of cyber security.
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications.