Security Systems
Articles and Databases
Search databases to find articles in peer-reviewed journals, magazines, newspapers, reference sources, and other publications. Access from off campus with your FSC username and password.
Search EverythingUse the "Search Everything" tab on the Library’s homepage to search across all library collections, including books, ebooks, journals, magazines, newspapers, and other publications.
Academic Search Complete
Articles from academic journals, newspapers, and magazines useful for many subjects.
A great place to get started with research.
Britannica Academic External link
Topic overviews, including biographies, articles, and media. Covers a wide range of
subjects.
Proquest Research Library
Articles from academic journals, trade publications, and magazines across many subjects,
including business.
Statista
Statista.com consolidates statistical data on over 80,000 topics from more than 22,500
sources.
Westlaw Next Campus ResearchWestlawNext simplifies your starting point for legal research.
Books
Textbooks
Search for textbooks by course number via this list of textbooks on reserve. Also search by title in the Library's catalog. Request textbooks at the Circulation Desk. Use these books for up to two hours in the Library. Call numbers are designated by course number, e.g. CRJ 310.
Print Books
Search for books in the Library's catalog. Also find print materials via the "Books and eBooks" tab on the Library website. Search by topic, title, author, etc.
- Circulating Books: Located on the Lower Level. Students may check out up to ten books at a time for 16 weeks with an FSC ID.
- Reference Books: Located on the First Floor. Must be used within the Library. Includes encyclopedias, handbooks, dictionaries, test prep books, etc.
eBooks
Search for ebooks via the "Books and eBooks" tab on the Library website. Search by topic, title, author, etc. View materials as a PDF and access from off campus with your FSC username and password.
Books and eBooks about Security Systems
This pre-set search will allow you to browse the books and ebooks about security systems
at Greenley Library.
Books and eBooks about Law Enforcement Technology
This pre-set search will allow you to browse the books and ebooks about law enforcement
technology at Greenley Library.
Websites
Computer Crime and Intellectual Property Section (CCIPS)
The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing
the Department's national strategies in combating computer and intellectual property
crimes worldwide. CCIPS prevents, investigates, and prosecutes computer crimes by
working with other government agencies, the private sector, academic institutions,
and foreign counterparts. Section attorneys work to improve the domestic and international
infrastructure-legal, technological, and operational-to pursue network criminals most
effectively.
Cybersecurity at U.S. Department of Homeland Security
This site provides an overview covering the following topics: Combating Cyber Crime,
Securing Federal Networks, Protecting Critical Infrastructure, Cyber Incident Response,
Cyber Safety, Cybersecurity Insurance, Cybersecurity Jobs, Cybersecurity Training
& Exercises, Information Sharing Stakeholder Engagement and Cyber Infrastructure Resilience,
Education, and EO 13800 Deliverables.
Department of Defense Cyber Crime Center
Department of Defense Cyber Crime Center (DC3) is designated as a federal cyber center
and Department of Defense center of excellence, and serves as the operational focal
point for the Defense Industrial Base Cybersecurity Program. DC3 operates under the
executive agency of the Secretary of the Air Force. DC3’s mission is to deliver superior
digital and multimedia (D/MM) forensic lab services, cyber technical training, vulnerability
sharing, technical solutions development, and cyber analysis within the following
DoD mission areas: cybersecurity and critical infrastructure protection, law enforcement
and counterintelligence, document and media exploitation, and counterterrorism.
The National Computer Forensics Institute (NCFI)
The National Computer Forensics Institute (NCFI) is a federally funded training center
dedicated to instructing state and local officials in digital evidence and cyber crime
investigations. The NCFI was opened in 2008 with a mandate to provide state and local
law enforcement, legal and judicial professionals a free, comprehensive education
on current cyber crime trends, investigative methods, and prosecutorial and judicial
challenges..
Transit Safety and Security at U.S. Department of Transportation
The mission of the Transportation Safety Institute is to improve the safety of the
worldwide transportation system through the training of transportation safety professionals
across federal, state, local and international governments, as well as private industry.
Citing Sources
See below for basic guidelines and examples of APA citation style.
APA Style Quiz
Why Cite?
Why you need to cite sources:
- Citing sources is the only way to use other people’s work without plagiarizing (i.e. if you are using any resource [journal article, book, website, report, interview, etc.], you NEED to give credit to the original source).
- The readers of your work need citations to learn more about your ideas and where they came from.
- Citing sources shows the amount of research you’ve done.
- Citing sources strengthens your work by lending outside support to your ideas.
In-Text Citations
In-text citations give credit to sources in the body of your paper. Use in-text citations when paraphrasing, directly quoting, or using ideas from sources.
- APA citation style uses the author-date method for in-text citations: Author(s)’ last name and the year of publication for the source should appear in the text.
- Names may appear either in the sentence itself or in parentheses following the quotation or paraphrase, but the date should always appear in the parentheses, not in the text of your sentence.
- Include page numbers if you are directly quoting the material.
See APA How to Format Citations and Helpful Tips
Reference List
Citations in the Reference List must correspond to in-text citations; The word or
phrase you use in your in-text citations must be the first thing that appears on the
left-hand margin of the corresponding entry in the Reference List.
See APA Sample Title Page and Reference List
Formatting
-
- Separate page labeled “References,” double-spaced, same margins as rest of paper.
- Indent the second and subsequent lines of citations by 0.5 inches to create a hanging indent.
Author Names
-
- Alphabetized by the last name of the first author of each work.
- Authors' names are inverted (last name, first initial).
- List all authors of a particular work for up to and including seven authors. If the work has more than seven authors, list the first six authors and then use ellipses (...) after the sixth author's name. After the ellipses, list the last author's name of the work.
Capitalization and Punctuation
-
- Capitalize only the first word of a title and subtitle and proper nouns (books, chapters, articles, web pages).
- Italicize titles of longer works such as books and journals.
- Do not italicize, underline, or put quotes around the titles of shorter works such as journal articles or essays in edited collections.
NoodleTools
NoodleTools is a citation manager that can help you generate and format citations correctly.
- Select the type of resource you are citing (article, book, website, etc.) and NoodleTools will prompt you to enter required information. A citation is then generated in your selected format.
- NoodleTools requires an account, so every time you log in your citations will be saved for you.
- When you are finished entering information, a reference list can be generated for you and exported to MS Word or Google Docs.
Citation Help
For more details and examples of APA citation style, visit the following websites:
- Purdue University Online Writing Lab (OWL)
- APA: The Basics of APA Style Tutorial
- The Writer’s Handbook: APA Documentation Guide (University of Wisconsin-Madison)
- Plagiarism.org: How Do I Cite Sources?
Associations
ASIS International
Founded in 1955, ASIS International is a global community of security practitioners,
each of whom has a role in the protection of assets - people, property, and/or information.
CIS® (Center for Internet Security, Inc.)
CIS® (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity
that harnesses the power of a global IT community to safeguard private and public
organizations against cyber threats. Our CIS ControlsTM and CIS BenchmarksTM are the
global standard and recognized best practices for securing IT systems and data against
the most pervasive.
Cloud Security Alliance (CSA)
The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to
defining and raising awareness of best practices to help ensure a secure cloud computing
environment. CSA harnesses the subject matter expertise of industry practitioners,
associations, governments, and its corporate and individual members to offer cloud
security-specific research, education, certification, events and products. CSA’s activities,
knowledge and extensive network benefit the entire community impacted by cloud — from
providers and customers, to governments, entrepreneurs and the assurance industry
— and provide a forum through which diverse parties can work together to create and
maintain a trusted cloud ecosystem.
Executive Women's Forum
The Executive Women's Forum is the largest member organization serving emerging leaders
as well as the most prominent and influential female executives in the Information
Security, Risk Management and Privacy industries.
Information Systems Audit and Control Association (ISACA)
As an independent, nonprofit, global association, ISACA engages in the development,
adoption and use of globally accepted, industry-leading knowledge and practices for
information systems. Previously known as the Information Systems Audit and Control
Association, ISACA now goes by its acronym only, to reflect the broad range of IT
governance professionals it serves.
International Association of Computer Investigative Specialists (IACIS)International Association of Computer Investigative Specialists (IACIS) is a non-profit, volunteer organization wholly dedicated to training, certifying and providing membership services to computer forensic professionals around the world.
International Association of Privacy Professionals (IAPP)
International Association of Privacy Professionals (IAPP) is a resource for professionals
who want to develop and advance their careers by helping their organizations successfully
manage these risks and protect their data. In fact, we’re the world’s largest and
most comprehensive global information privacy community.
RESEARCH HELP | Have a question? Librarians are available to assist you during all open hours.
Thomas D. Greenley Library
Greenley Library
Circulation: 934-420-2183
Reference: 934-420-2184
reference@farmingdale.edu
FALL HOURS
Mon-Thurs | 7:45am - 11:00pm |
Friday | 7:45am - 5:00pm |
Saturday | 9:00am - 5:00pm |
Sunday | 1:00pm - 9:00pm |