Academic Search Premier (all topics)

Full-text articles in biology, chemistry, education, engineering, humanities, physics, psychology, religion and theology, sociology, etc. Tip: Click the check box to limit to Academic (Peer Reviewed) Journals.
Business Source Complete

Premium full-text content and peer-reviewed business journals covering all disciplines of business, including marketing, management, accounting, banking, finance and more.
IEEE Xplore

Search for journal articles, transactions, conference proceedings, etc. of IEEE, IEE and affiliated societies. Use Interlibrary Loan to get items we do not own (you will get message in upper left corner, "The content you requested is not included in your subscription")
Homeland Security Digital Library
"The Homeland Security Digital Library (HSDL) is the nation's premier research collection of open-source resources related to homeland security policy, strategyand organizational management."
SC Magazine
Online magazine, with a library of whitepapers, with a focus on information and network security management.





Full-text articles in biology, chemistry, education, engineering, humanities, physics, psychology, religion and theology, sociology, etc. Tip: Click the check box to limit to Academic (Peer Reviewed) Journals.
Business Source Complete





Premium full-text content and peer-reviewed business journals covering all disciplines of business, including marketing, management, accounting, banking, finance and more.
IEEE Xplore



Search for journal articles, transactions, conference proceedings, etc. of IEEE, IEE and affiliated societies. Use Interlibrary Loan to get items we do not own (you will get message in upper left corner, "The content you requested is not included in your subscription")
Homeland Security Digital Library

"The Homeland Security Digital Library (HSDL) is the nation's premier research collection of open-source resources related to homeland security policy, strategyand organizational management."
SC Magazine


Online magazine, with a library of whitepapers, with a focus on information and network security management.
CSO Security and Risk
An online magazine related primarily to data protection, identity management, and numerous issues related to physical and virtual security. Includes a decent library of whitepapers.
Dark Reading
A comprehensive news and information portal focusing on IT security; part of TechWeb.
National Vulnerability Database
US government repository of standards based vulnerability management data; includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact measures. Provided through the National Institute of Standards and Technology (NIST).

An online magazine related primarily to data protection, identity management, and numerous issues related to physical and virtual security. Includes a decent library of whitepapers.
Dark Reading

A comprehensive news and information portal focusing on IT security; part of TechWeb.
National Vulnerability Database

US government repository of standards based vulnerability management data; includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact measures. Provided through the National Institute of Standards and Technology (NIST).

Michael Gorman
Associate Professor, Research Librarian
MC 140F
(320) 308-2028
msgorman@stcloudstate.edu
Information Security and Ethics: Social and Organizational Issues

This book is organized in two parts. The first part deals with information and ethics, including ethics in a online networked setting, management of persons working with networks, crime prevention, and so forth. The second part deals with information security: cryptography, security controls, and security policies.
Information Security Glossary
Glossary of information security and computing terms and phrases.
Information Security Policy World
Directory of information security policies and information security policy resources; organized by broad topics: IS policies, policy implementation, security policies & risk, scope & legislation, ISO 17799, security policy resources.
SANS Glossary of Terms Used in Security and Intrusion Detection
Dictionary of terms and phrases common to information assurance.
Security Management Definitions
Definitions for 820 terms common to information assurance and security management.




This book is organized in two parts. The first part deals with information and ethics, including ethics in a online networked setting, management of persons working with networks, crime prevention, and so forth. The second part deals with information security: cryptography, security controls, and security policies.
Information Security Glossary

Glossary of information security and computing terms and phrases.
Information Security Policy World

Directory of information security policies and information security policy resources; organized by broad topics: IS policies, policy implementation, security policies & risk, scope & legislation, ISO 17799, security policy resources.
SANS Glossary of Terms Used in Security and Intrusion Detection

Dictionary of terms and phrases common to information assurance.
Security Management Definitions

Definitions for 820 terms common to information assurance and security management.
Electronic Privacy Information Center
EPIC, a public interest research center, focuses its research and advocacy on privacy as it relates to network and computer environments. Provides access to numerous reports and news sources.
Information Systems Audit and Control Association
Association Web site providing access to information systems audit standards,research, and publications. Much information is free, but some requires either payment or membership.
Institute of Internal Auditors
Association web site providing access to standards and guidance, research reports and periodicals, including Internal Auditor, for international internal audit professionals.
International Information Systems Security Certification Consortium
(ISC)2 is a leader in educating and certifying information security professionals. Their annual Resource Guide for Today's Information Security Professional is a compendium of useful information on educational programs, events, publications, online resources, and associations.
Information Security Systems Association
From the website: "ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk, and protecting critical information and infrastructure." The ISSA website provides access to several webcasts, white papers, and publications on information assurance and computer security.

EPIC, a public interest research center, focuses its research and advocacy on privacy as it relates to network and computer environments. Provides access to numerous reports and news sources.
Information Systems Audit and Control Association

Association Web site providing access to information systems audit standards,research, and publications. Much information is free, but some requires either payment or membership.
Institute of Internal Auditors

Association web site providing access to standards and guidance, research reports and periodicals, including Internal Auditor, for international internal audit professionals.
International Information Systems Security Certification Consortium

(ISC)2 is a leader in educating and certifying information security professionals. Their annual Resource Guide for Today's Information Security Professional is a compendium of useful information on educational programs, events, publications, online resources, and associations.
Information Security Systems Association
From the website: "ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk, and protecting critical information and infrastructure." The ISSA website provides access to several webcasts, white papers, and publications on information assurance and computer security.