Security Systems
Articles and Databases
Search databases to find articles in peer-reviewed journals, magazines, newspapers, reference sources, and other publications. Access from off campus with your FSC username and password.
Search Everything
Use the "Search Everything" tab on the Library’s homepage to search across all library
collections, including books, ebooks, journals, magazines, newspapers, and other publications.
Academic Search Complete
Articles from academic journals, newspapers, and magazines useful for many subjects.
A great place to get started with research.
Proquest Research Library
Articles from academic journals, trade publications, and magazines across many subjects,
including business.
Statista
Statista.com consolidates statistical data on over 80,000 topics from more than 22,500
sources.
Westlaw Next Campus Research
WestlawNext simplifies your starting point for legal research.
Books
Textbooks
Search for textbooks by course number via this list of textbooks on reserve. Also search by title in the Library's catalog. Request textbooks at the Circulation Desk. Use these books for up to two hours in the Library. Call numbers are designated by course number, e.g. BUS 101.
Print Books
Search for books in the Library's catalog. Also find print materials via the "Books and eBooks" tab on the Library website. Search by topic, title, author, etc.
- Circulating Books: Located on the Lower Level. Check out up to 10 books for 2 weeks at a time with your FSC ID
- Reference Books: Located on the First Floor. Must be used within the Library. Includes encyclopedias, handbooks, dictionaries, test prep books, etc.
eBooks
Search for ebooks via the "Books and eBooks" tab on the Library website. Search by topic, title, author, etc. View materials as a PDF and access from off campus with your FSC username and password.
Books and eBooks about Security Systems
This pre-set search will allow you to browse the books and ebooks about security systems
at Greenley Library.
Books and eBooks about Law Enforcement Technology
This pre-set search will allow you to browse the books and ebooks about law enforcement
technology at Greenley Library.
Websites
Computer Crime and Intellectual Property Section (CCIPS)
The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing
the Department's national strategies in combating computer and intellectual property
crimes worldwide. CCIPS prevents, investigates, and prosecutes computer crimes by
working with other government agencies, the private sector, academic institutions,
and foreign counterparts. Section attorneys work to improve the domestic and international
infrastructure-legal, technological, and operational-to pursue network criminals most
effectively.
Cybersecurity at U.S. Department of Homeland Security
This site provides an overview covering the following topics: Combating Cyber Crime,
Securing Federal Networks, Protecting Critical Infrastructure, Cyber Incident Response,
Cyber Safety, Cybersecurity Insurance, Cybersecurity Jobs, Cybersecurity Training
& Exercises, Information Sharing Stakeholder Engagement and Cyber Infrastructure Resilience,
Education, and EO 13800 Deliverables.
Department of Defense Cyber Crime Center
Department of Defense Cyber Crime Center (DC3) is designated as a federal cyber center
and Department of Defense center of excellence, and serves as the operational focal
point for the Defense Industrial Base Cybersecurity Program. DC3 operates under the
executive agency of the Secretary of the Air Force. DC3’s mission is to deliver superior
digital and multimedia (D/MM) forensic lab services, cyber technical training, vulnerability
sharing, technical solutions development, and cyber analysis within the following
DoD mission areas: cybersecurity and critical infrastructure protection, law enforcement
and counterintelligence, document and media exploitation, and counterterrorism.
The National Computer Forensics Institute (NCFI)
The National Computer Forensics Institute (NCFI) is a federally funded training center
dedicated to instructing state and local officials in digital evidence and cyber crime
investigations. The NCFI was opened in 2008 with a mandate to provide state and local
law enforcement, legal and judicial professionals a free, comprehensive education
on current cyber crime trends, investigative methods, and prosecutorial and judicial
challenges..
Transit Safety and Security at U.S. Department of Transportation
The mission of the Transportation Safety Institute is to improve the safety of the
worldwide transportation system through the training of transportation safety professionals
across federal, state, local and international governments, as well as private industry.
Citing Sources in MLA Style
See below for basic guidelines and examples of MLA citation style. See the “Citation Help” section for more details, examples, and sample MLA papers.
Why Cite?
Why you need to cite sources:
- Citing sources is the only way to use other people’s work without plagiarizing (i.e. if you are using any resource [journal article, book, website, report, interview, etc.], you NEED to give credit to the original source).
- The readers of your work need citations to learn more about your ideas and where they came from.
- Citing sources shows the amount of research you’ve done.
- Citing sources strengthens your work by lending outside support to your ideas.
In-Text Citations
In-text citations give credit to sources in the body of your paper. Use in-text citations when paraphrasing, directly quoting, or using ideas from sources.
- MLA citation style uses the author-page method for in-text citations: Author(s)’ last name and the page number(s) from which the quotation or paraphrase is taken must appear in the text.
- Last names may appear either in the sentence itself or in parentheses following the quotation or paraphrase, but the page number(s) should always appear in the parentheses, not in the text of your sentence.
In-Text Citation Examples
Example 1. Writers should ask questions that will result in interesting answers (Zinsser
100).
Example 2. Zinsser notes that writers should ask questions about interesting experiences
in their subjects' lives (100).
Example 3. Writers should ask their subjects "questions that will elicit answers about
what is most interesting or vivid in their lives" (Zinsser 100).
In-Text Citations vs. Works Cited Page
In text citations are brief, providing only some information about the resource being
referenced. These citations must match up to a full citation in the Works Cited page.
In text citations show readers where to find more information, by directing them to
an entry in the Works Cited page. The Works Cited page provides much more information
about the resource, so readers will be able to locate it and consult the original
source.
Example 1. The above in-text citations correspond to the following full citation,
which would appear in the Works Cited page:
Zinsser, William. On Writing Well: The Classic Guide to Writing Nonfiction. Harper Collins, 1976.
Works Cited Page
The Works Cited page lists complete citations which correspond to in-text citations. The word or phrase you use in your in-text citations must be the first thing that appears on the left-hand margin of the corresponding entry in your Works Cited page.
Formatting
- Separate page labeled “Works Cited,” double-spaced, same margins, etc. as rest of paper.
- Indent the second and subsequent lines of citations by 0.5 inches to create a hanging indent.
Author Names
- Alphabetized by the last name of the first author of each work.
- Authors' names are inverted (last name, first name; middle name/initial).
- If a work has no known author, use a shortened version of the title.
Capitalization and Punctuation
- Capitalize each word in the titles of articles, books, etc, but do not capitalize articles (the, an), prepositions, or conjunctions unless one is the first word of the title or subtitle, e.g. Gone with the Wind.
- Use italics (instead of underlining) for titles of larger works (books, magazines) and quotation marks for titles of shorter works (poems, articles).
Works Cited Page Examples
Book
Last Name, First Name. Title of Book. Publisher, Publication Date.
Example: Zinsser, William. On Writing Well. The Classic Guide to Writing Nonfiction. HarperCollins, 1976.
Scholarly Article
Author Last Name, Author First Name. "Title of Article." Title of Periodical, volume number, issue number, Date Month Year,
pages, Database, DOI or URL.
Note: include the URL if there is no DOI
Example: Matsumura, Lindsay Clare, et al. "Classroom Writing Tasks and Students' Analytic
Text-Based Writing" Reading
Research Quarterlr, vol. 50, no. 4, Oct.-Dec. 2015, pp. 417-38. Education Full Text
(H.W. Wilson), doi:10. 1002/rrq.110.
A Page on a Website / Web document
List as much of the following information as possible (you sometimes have to hunt
around to find the information).
Author Last Name, First Name/Organization. ''Title of Page" Name of Website, Date
of Publication, URL, Date Accessed.
Example: Rodburg, Maxi ne, and Tutors of the Writing Center at Harvard University.
"Developing a Thesis." Harvard University,
1999, writingcenter.fas harvard edu/pages/developing-thesis. Accessed 20 Mar. 2017.
Newspaper Article
Author (s). "Title of Article." Title of Periodical, Day Month Year, pages
Example: Fani, Anthony "Tips For College Students Searching For Internships" Philadelphia
Tribune, 18 Oct. 2016, p. 14.
NoodleTools
NoodleTools is a citation manager that can help you generate and format citations correctly.
- Select the type of resource you are citing (article, book, website, etc.) and NoodleTools will prompt you to enter required information. A citation is then generated in your selected format (MLA).
- NoodleTools requires an account, so every time you log in your citations will be saved for you.
- When you are finished entering information, a reference list can be generated for you and exported to MS Word or Google Docs.
Citation Help
For more details and examples of MLA citation style, visit the following websites:
- Purdue University Online Writing Lab (OWL)
- The MLA Style Center
- The Writer’s Handbook: MLA Documentation Guide (University of Wisconsin-Madison)
- Plagiarism.org: How Do I Cite Sources?
Associations
ASIS International
Founded in 1955, ASIS International is a global community of security practitioners,
each of whom has a role in the protection of assets - people, property, and/or information.
CIS® (Center for Internet Security, Inc.)
CIS® (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity
that harnesses the power of a global IT community to safeguard private and public
organizations against cyber threats. Our CIS ControlsTM and CIS BenchmarksTM are the
global standard and recognized best practices for securing IT systems and data against
the most pervasive.
Cloud Security Alliance (CSA)
The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to
defining and raising awareness of best practices to help ensure a secure cloud computing
environment. CSA harnesses the subject matter expertise of industry practitioners,
associations, governments, and its corporate and individual members to offer cloud
security-specific research, education, certification, events and products. CSA’s activities,
knowledge and extensive network benefit the entire community impacted by cloud — from
providers and customers, to governments, entrepreneurs and the assurance industry
— and provide a forum through which diverse parties can work together to create and
maintain a trusted cloud ecosystem.
Executive Women's Forum
The Executive Women's Forum is the largest member organization serving emerging leaders
as well as the most prominent and influential female executives in the Information
Security, Risk Management and Privacy industries.
Information Systems Audit and Control Association (ISACA)
As an independent, nonprofit, global association, ISACA engages in the development,
adoption and use of globally accepted, industry-leading knowledge and practices for
information systems. Previously known as the Information Systems Audit and Control
Association, ISACA now goes by its acronym only, to reflect the broad range of IT
governance professionals it serves.
International Association of Computer Investigative Specialists (IACIS)
International Association of Computer Investigative Specialists (IACIS) is a non-profit,
volunteer organization wholly dedicated to training, certifying and providing membership
services to computer forensic professionals around the world.
International Association of Privacy Professionals (IAPP)
International Association of Privacy Professionals (IAPP) is a resource for professionals
who want to develop and advance their careers by helping their organizations successfully
manage these risks and protect their data. In fact, we’re the world’s largest and
most comprehensive global information privacy community.
RESEARCH HELP | Have a question? Librarians are available to assist you during all open hours.
Contact Header
Building, Room
631-420-2000
emails@farmingdale.edu
Monday-Friday 8:30am-4:30pm
FALL 2019 & SPRING 2020
Mon-Thurs | 7:45am - 11:00pm |
Friday | 7:45am - 5:00pm |
Saturday | 9:00am - 5:00pm |
Sunday | 1:00pm - 9:00pm |
hours will be posted in the library.