Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Polk State College is committed to equal access/equal opportunity in its programs, activities, and employment. For additional information, visit polk.edu/equity.
Welcome to the Polk State College library guide for cybersecurity research topics. Below you will find suggested books/ebooks and recommended databases. If you need help, click the link for Ask a Librarian.
Publication Date: 2013-10-16
Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Covers everything from basic network administration security skills through advanced command line scripting, tool customization, and log analysis skills.
Cybersecurity and Cyberwar by
Publication Date: 2014-01-03
In Cybersecurity and Cyberwar: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. In sum, Cybersecurity and Cyberwar is the definitive account on thesubject for the educated layman who wants to know more about the nature of war, conflict, and security in the twenty first century.
The Defender's Dilemma by
Publication Date: 2015-06-30
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures--and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.
How to Measure Anything in Cybersecurity Risk by
Publication Date: 2016-07-05
How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing--as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
Cyberterrorism and Ransomware Attacks by
Call Number: Polk/Winter Haven & Lakeland Circulation (HV6773.15.C97C938 2019)
Publication Date: 2018-07-15
In this digital age, it is not only conventional weapons that are used to threaten and harm others. A new and terrifying avenue is cyberspace and ransomware. This malware encrypts a user's data and demands payment in exchange for unlocking the data. Such attacks are becoming more widespread: a 2017 cyber incident attacked more than 45,000 users in countries around the world. This anthology presents a collection of global perspectives on the topic that examines the potential of such attacks and how we can secure ourselves in the future.
Practical Cloud Security by
Call Number: Polk/Winter Haven Circulation (QA76.585 .G84 2017)
Publication Date: 2016-08-02
Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today's enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks.
Dark Territory : the secret history of cyber war by
Call Number: Polk/Lakeland Circulation (HV6773.15.C97 K37 2016)
Publication Date: 2016-03-01
As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize–winning journalist Fred Kaplan. Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the "information warfare" squads of the military services, and the national security debates in the White House, to tell this never-before-told story of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning—and (more often than people know) fighting—these wars for decades.
Cyber War : the next threat to national security and what to do about it by
Call Number: Polk/Lakeland Circulation (HV6773.2 .C53 2010)
Publication Date: 2010-04-20
Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.
Understanding the Digital World - What You Need to Know about Computers, the Internet, Privacy, and Security by
Call Number: Polk/Lakeland Circulation (QA76 .K428 2017)
Publication Date: 2017-01-24
The basics of how computer hardware, software, and systems work, and the risks they create for our privacy and security. Computers are everywhere. Some of them are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak vast amounts of personal data about us. Through computers, governments and companies increasingly monitor what we do. Social networks and advertisers know far more about us than we should be comfortable with, using information we freely give them. Understanding the Digital World explains how computer hardware, software, networks, and systems work. Topics include how computers are built and how they compute; what programming is and why it is difficult; how the Internet and the web operate; and how all of these affect our security, privacy, property, and other important social, political, and economic issues.
Academic Search Complete Academic Search Complete, designed specifically for academic institutions, is the world's most valuable and comprehensive scholarly, multi-disciplinary full-text database, with more than 5,300 full-text periodicals, including 4,400 peer-reviewed journals. In addition to full text, this database offers indexing and abstracts for more than 9,300 journals and a total of 10,900 publications including monographs, reports, conference proceedings, etc. The database features PDF content going back as far as 1865, with the majority of full text titles in native (searchable) PDF format.
America's News With unmatched U.S. news content from local, regional, and national sources, this resource is the largest of its kind. Its diverse source types include printed and online newspapers, blogs, journals, newswires, broadcast transcripts and videos. Explore a specific issue or event through the detailed coverage provided by local reporting or compare a wide variety of viewpoints from across the country on topics such as politics, business, health, sports, cultural activities and people.
Business Insights: Essentials Resource that brings together company profiles, brand information, rankings, investment reports, company histories, chronologies, and periodicals. Find detailed company and industry news and information.
Business Source Complete Business Source Complete is the world's definitive scholarly business database, providing the ultimate collection of bibliographic and full text content. As part of the comprehensive coverage offered by this database, indexing and abstracts for the most important scholarly business journals back to 1886 are included. In addition to the searchable cited references, Business Source Complete contains detailed author profiles for the most-cited authors in the database. Journal ranking studies reveal that Business Source Complete is the overwhelmingly superior database for full text journals in all disciplines of business, including marketing, management, MIS, POM, accounting, finance and economics. Additional full text, non-journal content includes financial data, books, monographs, major reference works, book digests, conference proceedings, case studies, investment research reports, industry reports, market research reports, country reports, company profiles, SWOT analyses and more.
Opposing Viewpoints in Context The premier online resource covering today’s hottest social issues, from capital punishment to immigration, to marijuana. This cross-curricular research tool supports science, social studies, current events, and language arts classes. Its informed differing views present each side of an issue, allowing you to draw your own valid conclusions.
Entrepreneurship (Gale Business) This comprehensive database covers all major areas of starting, operating and maintaining a business from financing, management, marketing, human resources, franchising, accounting, taxes and more.
You must log in to use library databases and eBooks. Your borrower ID is your student ID number (no dashes). Your pin/password is the last four digits of your student ID number.