Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Polk State College is committed to equal access/equal opportunity in its programs, activities, and employment. For additional information, visit polk.edu/equity.
Welcome to the Polk State College library guide for cybersecurity research topics. Below you will find suggested books/ebooks and recommended databases. If you need help, click the link for Ask a Librarian.
Cybersecurity: the Beginner's Guide by
Publication Date: 2019-05-27
Understand the nitty-gritty of Cybersecurity with ease Key Features Align your security knowledge with industry leading concepts and tools Acquire required skills and certifications to survive the ever changing market needs Learn from industry experts to analyse, implement, and maintain a robust environment Book Description It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time. This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field. What you will learn Get an overview of what cybersecurity is and learn about the various faces of cybersecurity as well as identify domain that suits you best Plan your transition into cybersecurity in an efficient and effective way Learn how to build upon your existing skills and experience in order to prepare for your career in cybersecurity Who this book is for This book is targeted to any IT professional who is looking to venture in to the world cyber attacks and threats. Anyone with some understanding or IT infrastructure workflow will benefit from this book. Cybersecurity experts interested in enhancing their skill set will also find this book useful.
You'll See This Message When It Is Too Late by
Publication Date: 2018-11-13
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data.Cybersecurity incidents make the news with startling regularity. Each breach-the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump-makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches. Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks-financial gain, espionage, and public humiliation of the victims-that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.
Cybersecurity and Information Security Analysts by
Publication Date: 2020-12-15
Welcome to the cybersecurity (also called information security or InfoSec) field! If you are interested in a career in cybersecurity, you've come to the right book. So what exactly do these people do on the job, day in and day out? What kind of skills and educational background do you need to succeed in this field? How much can you expect to make, and what are the pros and cons of these various professions? Is this even the right career path for you? How do you avoid burnout and deal with stress? This book can help you answer these questions and more. Cybersecurity and Information Security Analysts: A Practical Career Guide, which includes interviews with professionals in the field, covers the following areas of this field that have proven to be stable, lucrative, and growing professions. Security Analysts/EngineersSecurity ArchitectsSecurity AdministratorsSecurity Software DevelopersCryptographers/Cryptologists/Cryptanalysts
Cybersecurity Law, Standards and Regulations by
Publication Date: 2020-03-31
ASIS Book of The Year Runner Up. Selected by ASIS International, the world's largest community of security practitioners. In today's litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider's Cybersecurity Law, Standards and Regulations (2nd Edition), lets you integrate legal issues into your security program. Tari Schreider, a board-certified information security practitioner with a criminal justice administration background, has written a much-needed book that bridges the gap between cybersecurity programs and cybersecurity law. He says, "My nearly 40 years in the fields of cybersecurity, risk management, and disaster recovery have taught me some immutable truths. One of these truths is that failure to consider the law when developing a cybersecurity program results in a protective façade or false sense of security." In a friendly style, offering real-world business examples from his own experience supported by a wealth of court cases, Schreider covers the range of practical information you will need as you explore - and prepare to apply - cybersecurity law. His practical, easy-to-understand explanations help you to: Schreider takes you beyond security standards and regulatory controls to ensure that your current or future cybersecurity program complies with all laws and legal jurisdictions. Hundreds of citations and references allow you to dig deeper as you explore specific topics relevant to your organization or your studies. This book needs to be required reading before your next discussion with your corporate legal department. This new edition responds to the rapid changes in the cybersecurity industry, threat landscape and providers. It addresses the increasing risk of zero-day attacks, growth of state-sponsored adversaries and consolidation of cybersecurity products and services in addition to the substantial updates of standards, source links and cybersecurity products.
The Oxford Handbook of Cyberpsychology by
Call Number: Winter Haven Circulation QA76.9.H85 O95 2019
Publication Date: 2019-07-16
The internet is so central to everyday life, that it is impossible to contemplate life without it. From finding romance, to conducting business, receiving health advice, shopping, banking, and gaming, the internet opens up a world of possibilities to people across the globe. Yet for all itspositive attributes, it is also an environment where we witness the very worst of human behaviour - cybercrime, election interference, fake news, and trolling being just a few examples. What is it about this unique environment that can make people behave in ways they wouldn't contemplate in reallife. Understanding the psychological processes underlying and influencing the thinking, interpretation and behaviour associated with this online interconnectivity is the core premise of Cyberpsychology.The Oxford Handbook of Cyberpsychology explores a wide range of cyberpsychological processes and activities through the research and writings of some of the world's leading cyberpsychology experts. The book is divided into eight sections covering topics as varied as online research methods,self-presentation and impression management, technology across the lifespan, interaction and interactivity, online groups and communities, social media, health and technology, video gaming and cybercrime and cybersecurity.The Oxford Handbook of Cyberpsychology will be important reading for those who have only recently discovered the discipline as well as more seasoned cyberpsychology researchers and teachers.
Cyberterrorism and Ransomware Attacks by
Call Number: Winter Haven & Lakeland Circulation HV6773.15.C97C938 2019
Publication Date: 2018-07-15
In this digital age, it is not only conventional weapons that are used to threaten and harm others. A new and terrifying avenue is cyberspace and ransomware. This malware encrypts a user's data and demands payment in exchange for unlocking the data. Such attacks are becoming more widespread: a 2017 cyber incident attacked more than 45,000 users in countries around the world. This anthology presents a collection of global perspectives on the topic that examines the potential of such attacks and how we can secure ourselves in the future.
Cybersecurity for Citizens and Public Officials by
Call Number: Lakeland Circulation QA76.9.A25 C925 2019
Publication Date: 2019-03-30
This volume, Cybersecurity for Citizens and Public Officials, has the goal of educating citizens and public officials about cybersecurity national best practices, which are contained in this volume-one of the first of its type in America! The author/editor's hope that this information helps educate citizens, employees, and public officials, and facilitates their interest in the development of modern state-of-the-art computer hardware and software systems in public and private organizations. The goal of this effort is to enhance the lever of services that computers, and their software systems provide to everyone-individuals, citizens in general, as well as the public-at-large. The use of such practices will also hold down the cost of providing services, both public and private ones, to all citizens throughout the nation-both taxpayers that pay for government services, as well as citizens that pay for private services.
Cybersecurity for Dummies by
Call Number: Lakeland Circulation QA76.9.A25 S744 2020
Publication Date: 2019-10-15
Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached! The who and why of cybersecurity threats Basic cybersecurity concepts What to do to be cyber-secure Cybersecurity careers What to think about to stay cybersecure in the future Now is the time to identify vulnerabilities that may make you a victim of cyber-crime -- and to defend yourself before it is too late.
Academic Search Complete This link opens in a new windowAcademic Search Complete, designed specifically for academic institutions, is the world's most valuable and comprehensive scholarly, multi-disciplinary full-text database, with more than 5,300 full-text periodicals, including 4,400 peer-reviewed journals. In addition to full text, this database offers indexing and abstracts for more than 9,300 journals and a total of 10,900 publications including monographs, reports, conference proceedings, etc. The database features PDF content going back as far as 1865, with the majority of full text titles in native (searchable) PDF format.
America's News This link opens in a new windowWith unmatched U.S. news content from local, regional, and national sources, this resource is the largest of its kind. Its diverse source types include printed and online newspapers, blogs, journals, newswires, broadcast transcripts and videos. Explore a specific issue or event through the detailed coverage provided by local reporting or compare a wide variety of viewpoints from across the country on topics such as politics, business, health, sports, cultural activities and people.
Business Insights: Essentials This link opens in a new windowResource that brings together company profiles, brand information, rankings, investment reports, company histories, chronologies, and periodicals. Find detailed company and industry news and information.
Business Source Complete This link opens in a new window Business Source Complete is the world's definitive scholarly business database, providing the ultimate collection of bibliographic and full text content. As part of the comprehensive coverage offered by this database, indexing and abstracts for the most important scholarly business journals back to 1886 are included. In addition to the searchable cited references, Business Source Complete contains detailed author profiles for the most-cited authors in the database. Journal ranking studies reveal that Business Source Complete is the overwhelmingly superior database for full text journals in all disciplines of business, including marketing, management, MIS, POM, accounting, finance and economics. Additional full text, non-journal content includes financial data, books, monographs, major reference works, book digests, conference proceedings, case studies, investment research reports, industry reports, market research reports, country reports, company profiles, SWOT analyses and more.
Opposing Viewpoints in Context This link opens in a new windowThe premier online resource covering todays hottest social issues, from capital punishment to immigration, to marijuana. This cross-curricular research tool supports science, social studies, current events, and language arts classes. Its informed differing views present each side of an issue, allowing you to draw your own valid conclusions.
Entrepreneurship (Gale Business) This link opens in a new windowThis comprehensive database covers all major areas of starting, operating and maintaining a business from financing, management, marketing, human resources, franchising, accounting, taxes and more.
You must log in to use library databases and eBooks. When prompted to log in, enter your Passport credentials. If you have trouble, try resetting your Passport pin, sending an email to HelpDeskRequests@polk.edu, or calling the Help Desk at 863.292.3652. You can also get help from Ask a Librarian.