Articles from IEEE Computer Society magazines, transactions, and conference publications, from 1995 - present.
Restrictions on Use and Ownership Notice
Restrictions. Except as expressly permitted in this Agreement, UMUC users may not: (1) download, reproduce, retain or redistribute the Licensed Products or any journal or issue of a journal in the Licensed Products in its entirety or in any substantial or systematic manner, including, but not limited to, accessing the Licensed Products using a robot, spider, crawler or similar technological device; (2) electronically distribute, via e-mail or otherwise, any Article or eBook; (3) abridge, modify, translate or create any derivative work based upon the Licensed Products without the prior written consent of IEEE; (4) display or otherwise make available any part of the Licensed Products to anyone other than Authorized Users; (5) sell, resell, rent, lease, license, sublicense, assign or otherwise transfer any rights granted under this Agreement, including, but not limited to, use of the Licensed Products for document delivery, fee-for-service or any other substantially similar commercial purpose; or (6) remove, obscure or modify in any way copyright notices, other notices or disclaimers that appear on Articles or eBooks or in the Licensed Products.
Ownership. UMUC users acknowledges and agrees that all right, title and interest in and to the Licensed Products, including all copyright and other intellectual property rights under United States and international laws and treaties, remain with IEEE and its licensors.
Ebooks on finance, business, IT, and technical topics, including Microsoft Office.
Personalized Features in Books24X7
All users have their own accounts when they sign into Books24X7, as anonymous users. All users are anonymous to protect their privacy. This is your own account and you can save your personalized features, which will be available to you each time you sign in.
The personalized features in Books24X7 are folders, notes, and bookmarks. These features are available to all students, faculty, and staff at UMUC. You will see these features when you view a title (notes or folders options) or chapter (notes, folders, and bookmarks). You can test out and view a title and then set up some of the features described above. If you click on the My Home tab, you will see also any folders set up on the left under the heading, Personal Folders, and the features are shown in each folder or in each of the folders.
Articles and books covering the physical sciences, engineering, life sciences, health sciences, social sciences, and humanities, from 1995 - present. NOTE: The blue Sign In button is not in use by UMGC.
Written in an accessible manner, this definitive guide to cybersecurity law provides real-world examples and case studies to help readers understand the practical applications of the presented material.
Describing the threats and vulnerabilities of critical infrastructure to cybersecurity attack, this book provides definitions for cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry.
Presenting the fundamental concepts of information and communication technology (ICT) governance and control, this book, shows you how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data.
The International Association of Privacy Professionals (IAPP) is a resource for professionals who want to develop and advance their careers by helping their organizations successfully manage these risks and protect their data.
Information Security Journal: A Global Perspective aims to inform security professionals about new technologies, useful tools, and relevant research in policy and technology. We also seek to provide insight into current and existing professional development issues.
The Journal of Cyber Security Technology is a new journal aimed at publishing World-leading research and is dedicated to being the primary platform for research in all technical areas of cyber security.