Articles published by the ACM (journals, magazines, and conference proceedings) and citations from major publishers in computing and information systems.
Articles from IEEE Computer Society magazines, transactions, and conference publications, from 1995 - present.
Restrictions on Use and Ownership Notice
Restrictions. Except as expressly permitted in this Agreement, UMUC users may not: (1) download, reproduce, retain or redistribute the Licensed Products or any journal or issue of a journal in the Licensed Products in its entirety or in any substantial or systematic manner, including, but not limited to, accessing the Licensed Products using a robot, spider, crawler or similar technological device; (2) electronically distribute, via e-mail or otherwise, any Article or eBook; (3) abridge, modify, translate or create any derivative work based upon the Licensed Products without the prior written consent of IEEE; (4) display or otherwise make available any part of the Licensed Products to anyone other than Authorized Users; (5) sell, resell, rent, lease, license, sublicense, assign or otherwise transfer any rights granted under this Agreement, including, but not limited to, use of the Licensed Products for document delivery, fee-for-service or any other substantially similar commercial purpose; or (6) remove, obscure or modify in any way copyright notices, other notices or disclaimers that appear on Articles or eBooks or in the Licensed Products.
Ownership. UMUC users acknowledges and agrees that all right, title and interest in and to the Licensed Products, including all copyright and other intellectual property rights under United States and international laws and treaties, remain with IEEE and its licensors.
Ebooks on finance, business, IT, and technical topics, including Microsoft Office.
Personalized Features in Books24X7
All users have their own accounts when they sign into Books24X7, as anonymous users. All users are anonymous to protect their privacy. This is your own account and you can save your personalized features, which will be available to you each time you sign in.
The personalized features in Books24X7 are folders, notes, and bookmarks. These features are available to all students, faculty, and staff at UMUC. You will see these features when you view a title (notes or folders options) or chapter (notes, folders, and bookmarks). You can test out and view a title and then set up some of the features described above. If you click on the My Home tab, you will see also any folders set up on the left under the heading, Personal Folders, and the features are shown in each folder or in each of the folders.
Homeland security-related U.S. documents, directives, and national strategy reports, as well as resources from universities, organizations, and local and state agencies.
Criminology and related discipline topics from SAGE e-journals, May/June 2005 to June/July 2009 only - dates of coverage vary by journal title.
Copyright and Terms of Use
The entire contents of SAGE Journals (including individual articles and other material appearing in the journals) are protected by copyright. See also the SAGE Terms of Use.
Articles and books covering the physical sciences, engineering, life sciences, health sciences, social sciences, and humanities, from 1995 - present. NOTE: The blue Sign In button is not in use by UMGC.
This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path.
Written in an accessible manner, this definitive guide to cybersecurity law provides real-world examples and case studies to help readers understand the practical applications of the presented material.
Describing the threats and vulnerabilities of critical infrastructure to cybersecurity attack, this book provides definitions for cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry.
Presenting the fundamental concepts of information and communication technology (ICT) governance and control, this book, shows you how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data.
The International Association of Privacy Professionals (IAPP) is a resource for professionals who want to develop and advance their careers by helping their organizations successfully manage these risks and protect their data.
NIST implements practical cybersecurity and privacy through outreach and effective application of standards and best practices necessary for the U.S. to adopt cybersecurity capabilities.
Women in Cybersecurity's mission is to help build a strong gender-diverse cybersecurity workforce by facilitating recruitment, retention, and advancement for women in the field.
Additional Library Resources
Articles
UMGC Library OneSearch
Simultaneously searches multiple Library research databases. Note: Does not include all databases.
Information Security Journal: A Global Perspective aims to inform security professionals about new technologies, useful tools, and relevant research in policy and technology. We also seek to provide insight into current and existing professional development issues.
The Journal of Cyber Security Technology is a new journal aimed at publishing World-leading research and is dedicated to being the primary platform for research in all technical areas of cyber security.
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications.