Security Systems

Articles and Databases

Search databases to find articles in peer-reviewed journals, magazines, newspapers, reference sources, and other publications. Access from off campus with your FSC username and password.

Search Everything
Use the "Search Everything" tab on the Library’s homepage to search across all library collections, including books, ebooks, journals, magazines, newspapers, and other publications.

Academic Search Complete
Articles from academic journals, newspapers, and magazines useful for many subjects. A great place to get started with research.

Proquest Research Library
Articles from academic journals, trade publications, and magazines across many subjects, including business.

Statista
Statista.com consolidates statistical data on over 80,000 topics from more than 22,500 sources.

Westlaw Next Campus Research
WestlawNext simplifies your starting point for legal research.

Books

Textbooks

Search for textbooks by course number via this list of textbooks on reserve. Also search by title in the Library's catalog. Request textbooks at the Circulation Desk. Use these books for up to two hours in the Library. Call numbers are designated by course number, e.g. BUS 101.

Print Books

Search for books in the Library's catalog. Also find print materials via the "Books and eBooks" tab on the Library website. Search by topic, title, author, etc.

  • Circulating Books: Located on the Lower Level. Check out up to 10 books for 2 weeks at a time with your FSC ID
  • Reference Books: Located on the First Floor. Must be used within the Library. Includes encyclopedias, handbooks, dictionaries, test prep books, etc.

eBooks

Search for ebooks via the "Books and eBooks" tab on the Library website. Search by topic, title, author, etc. View materials as a PDF and access from off campus with your FSC username and password.

Books and eBooks about Security Systems
This pre-set search will allow you to browse the books and ebooks about security systems at Greenley Library.

Books and eBooks about Law Enforcement Technology
This pre-set search will allow you to browse the books and ebooks about law enforcement technology at Greenley Library.

Websites

Computer Crime and Intellectual Property Section (CCIPS)
The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide. CCIPS prevents, investigates, and prosecutes computer crimes by working with other government agencies, the private sector, academic institutions, and foreign counterparts. Section attorneys work to improve the domestic and international infrastructure-legal, technological, and operational-to pursue network criminals most effectively.

Cybersecurity at U.S. Department of Homeland Security
This site provides an overview covering the following topics: Combating Cyber Crime, Securing Federal Networks, Protecting Critical Infrastructure, Cyber Incident Response, Cyber Safety, Cybersecurity Insurance, Cybersecurity Jobs, Cybersecurity Training & Exercises, Information Sharing Stakeholder Engagement and Cyber Infrastructure Resilience, Education, and EO 13800 Deliverables.

Department of Defense Cyber Crime Center
Department of Defense Cyber Crime Center (DC3) is designated as a federal cyber center and Department of Defense center of excellence, and serves as the operational focal point for the Defense Industrial Base Cybersecurity Program. DC3 operates under the executive agency of the Secretary of the Air Force. DC3’s mission is to deliver superior digital and multimedia (D/MM) forensic lab services, cyber technical training, vulnerability sharing, technical solutions development, and cyber analysis within the following DoD mission areas: cybersecurity and critical infrastructure protection, law enforcement and counterintelligence, document and media exploitation, and counterterrorism.

The National Computer Forensics Institute (NCFI)
The National Computer Forensics Institute (NCFI) is a federally funded training center dedicated to instructing state and local officials in digital evidence and cyber crime investigations. The NCFI was opened in 2008 with a mandate to provide state and local law enforcement, legal and judicial professionals a free, comprehensive education on current cyber crime trends, investigative methods, and prosecutorial and judicial challenges..

Transit Safety and Security at U.S. Department of Transportation
The mission of the Transportation Safety Institute is to improve the safety of the worldwide transportation system through the training of transportation safety professionals across federal, state, local and international governments, as well as private industry.

Citing Sources in MLA Style

See below for basic guidelines and examples of MLA citation style. See the “Citation Help” section for more details, examples, and sample MLA papers.

Why Cite?

Why you need to cite sources:

  • Citing sources is the only way to use other people’s work without plagiarizing (i.e. if you are using any resource [journal article, book, website, report, interview, etc.], you NEED to give credit to the original source).
  • The readers of your work need citations to learn more about your ideas and where they came from.
  • Citing sources shows the amount of research you’ve done.
  • Citing sources strengthens your work by lending outside support to your ideas.

In-Text Citations

In-text citations give credit to sources in the body of your paper. Use in-text citations when paraphrasing, directly quoting, or using ideas from sources.

  • MLA citation style uses the author-page method for in-text citations: Author(s)’ last name and the page number(s) from which the quotation or paraphrase is taken must appear in the text.
  • Last names may appear either in the sentence itself or in parentheses following the quotation or paraphrase, but the page number(s) should always appear in the parentheses, not in the text of your sentence.

 

In-Text Citation Examples


Example 1. Writers should ask questions that will result in interesting answers (Zinsser 100). 
Example 2. Zinsser notes that writers should ask questions about interesting experiences in their subjects' lives (100). 
Example 3. Writers should ask their subjects "questions that will elicit answers about what is most interesting or vivid in their lives" (Zinsser 100). 

In-Text Citations vs. Works Cited Page


In text citations are brief, providing only some information about the resource being referenced. These citations must match up to a full citation in the Works Cited page. 
In text citations show readers where to find more information, by directing them to an entry in the Works Cited page. The Works Cited page provides much more information about the resource, so readers will be able to locate it and consult the original source. 

Example 1. The above in-text citations correspond to the following full citation, which would appear in the Works Cited page: 
Zinsser, William. On Writing Well: The Classic Guide to Writing Nonfiction. Harper Collins, 1976. 

Works Cited Page

The Works Cited page lists complete citations which correspond to in-text citations. The word or phrase you use in your in-text citations must be the first thing that appears on the left-hand margin of the corresponding entry in your Works Cited page.

Formatting

  • Separate page labeled “Works Cited,” double-spaced, same margins, etc. as rest of paper.
  • Indent the second and subsequent lines of citations by 0.5 inches to create a hanging indent.

Author Names

  • Alphabetized by the last name of the first author of each work.
  • Authors' names are inverted (last name, first name; middle name/initial).
  • If a work has no known author, use a shortened version of the title.

Capitalization and Punctuation

  • Capitalize each word in the titles of articles, books, etc, but do not capitalize articles (the, an), prepositions, or conjunctions unless one is the first word of the title or subtitle, e.g. Gone with the Wind.
  • Use italics (instead of underlining) for titles of larger works (books, magazines) and quotation marks for titles of shorter works (poems, articles).

Works Cited Page Examples

Book
Last Name, First Name. Title of Book. Publisher, Publication Date.
Example: Zinsser, William. On Writing Well. The Classic Guide to Writing Nonfiction. HarperCollins, 1976.

Scholarly Article
Author Last Name, Author First Name. "Title of Article." Title of Periodical, volume number, issue number, Date Month Year,
pages, Database, DOI or URL.
Note: include the URL if there is no DOI
Example: Matsumura, Lindsay Clare, et al. "Classroom Writing Tasks and Students' Analytic Text-Based Writing" Reading
Research Quarterlr, vol. 50, no. 4, Oct.-Dec. 2015, pp. 417-38. Education Full Text (H.W. Wilson), doi:10. 1002/rrq.110.

A Page on a Website / Web document
List as much of the following information as possible (you sometimes have to hunt around to find the information).
Author Last Name, First Name/Organization. ''Title of Page" Name of Website, Date of Publication, URL, Date Accessed.
Example: Rodburg, Maxi ne, and Tutors of the Writing Center at Harvard University. "Developing a Thesis." Harvard University,
1999, writingcenter.fas harvard edu/pages/developing-thesis. Accessed 20 Mar. 2017.

Newspaper Article
Author (s). "Title of Article." Title of Periodical, Day Month Year, pages
Example:  Fani, Anthony "Tips For College Students Searching For Internships" Philadelphia Tribune, 18 Oct. 2016, p. 14.



NoodleTools

Access NoodleTools

NoodleTools is a citation manager that can help you generate and format citations correctly.

  • Select the type of resource you are citing (article, book, website, etc.) and NoodleTools will prompt you to enter required information. A citation is then generated in your selected format (MLA).
  • NoodleTools requires an account, so every time you log in your citations will be saved for you.
  • When you are finished entering information, a reference list can be generated for you and exported to MS Word or Google Docs.

Citation Help

For more details and examples of MLA citation style, visit the following websites:

 

Associations

ASIS International
Founded in 1955, ASIS International is a global community of security practitioners, each of whom has a role in the protection of assets - people, property, and/or information.

CIS® (Center for Internet Security, Inc.)
CIS® (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. Our CIS ControlsTM and CIS BenchmarksTM are the global standard and recognized best practices for securing IT systems and data against the most pervasive.

Cloud Security Alliance (CSA)
The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs and the assurance industry — and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem.

Executive Women's Forum
The Executive Women's Forum is the largest member organization serving emerging leaders as well as the most prominent and influential female executives in the Information Security, Risk Management and Privacy industries.

Information Systems Audit and Control Association (ISACA)
As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

International Association of Computer Investigative Specialists (IACIS)
International Association of Computer Investigative Specialists (IACIS) is a non-profit, volunteer organization wholly dedicated to training, certifying and providing membership services to computer forensic professionals around the world.

International Association of Privacy Professionals (IAPP)
International Association of Privacy Professionals (IAPP) is a resource for professionals who want to develop and advance their careers by helping their organizations successfully manage these risks and protect their data. In fact, we’re the world’s largest and most comprehensive global information privacy community.


RESEARCH HELP | Have a question? Librarians are available to assist you during all open hours.

Contact Header

Building, Room
631-420-2000
emails@farmingdale.edu
Monday-Friday 8:30am-4:30pm

FALL 2019 & SPRING 2020

Mon-Thurs 7:45am - 11:00pm
Friday 7:45am - 5:00pm
Saturday 9:00am - 5:00pm
Sunday 1:00pm - 9:00pm

Summer session, recess and holiday
hours will be posted in the library.