Articles and Databases
Search databases to find articles in peer-reviewed journals, magazines, newspapers, reference sources, and other publications. Access from off campus with your FSC username and password.
Use the "Search Everything" tab on the Library’s homepage to search across all library collections, including books, ebooks, journals, magazines, newspapers, and other publications.
Academic Search Complete
Articles from academic journals, newspapers, and magazines useful for many subjects. A great place to get started with research.
Proquest Research Library
Articles from academic journals, trade publications, and magazines across many subjects, including business.
Statista.com consolidates statistical data on over 80,000 topics from more than 22,500 sources.
Westlaw Next Campus Research
WestlawNext simplifies your starting point for legal research.
Search for textbooks by course number via this list of textbooks on reserve. Also search by title in the Library's catalog. Request textbooks at the Circulation Desk. Use these books for up to two hours in the Library. Call numbers are designated by course number, e.g. CRJ 310.
- Circulating Books: Located on the Lower Level. Students may check out up to ten books at a time for 16 weeks with an FSC ID.
- Reference Books: Located on the First Floor. Must be used within the Library. Includes encyclopedias, handbooks, dictionaries, test prep books, etc.
Search for ebooks via the "Books and eBooks" tab on the Library website. Search by topic, title, author, etc. View materials as a PDF and access from off campus with your FSC username and password.
Books and eBooks about Security Systems
This pre-set search will allow you to browse the books and ebooks about security systems at Greenley Library.
Books and eBooks about Law Enforcement Technology
This pre-set search will allow you to browse the books and ebooks about law enforcement technology at Greenley Library.
Computer Crime and Intellectual Property Section (CCIPS)
The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide. CCIPS prevents, investigates, and prosecutes computer crimes by working with other government agencies, the private sector, academic institutions, and foreign counterparts. Section attorneys work to improve the domestic and international infrastructure-legal, technological, and operational-to pursue network criminals most effectively.
Cybersecurity at U.S. Department of Homeland Security
This site provides an overview covering the following topics: Combating Cyber Crime, Securing Federal Networks, Protecting Critical Infrastructure, Cyber Incident Response, Cyber Safety, Cybersecurity Insurance, Cybersecurity Jobs, Cybersecurity Training & Exercises, Information Sharing Stakeholder Engagement and Cyber Infrastructure Resilience, Education, and EO 13800 Deliverables.
Department of Defense Cyber Crime Center
Department of Defense Cyber Crime Center (DC3) is designated as a federal cyber center and Department of Defense center of excellence, and serves as the operational focal point for the Defense Industrial Base Cybersecurity Program. DC3 operates under the executive agency of the Secretary of the Air Force. DC3’s mission is to deliver superior digital and multimedia (D/MM) forensic lab services, cyber technical training, vulnerability sharing, technical solutions development, and cyber analysis within the following DoD mission areas: cybersecurity and critical infrastructure protection, law enforcement and counterintelligence, document and media exploitation, and counterterrorism.
The National Computer Forensics Institute (NCFI)
The National Computer Forensics Institute (NCFI) is a federally funded training center dedicated to instructing state and local officials in digital evidence and cyber crime investigations. The NCFI was opened in 2008 with a mandate to provide state and local law enforcement, legal and judicial professionals a free, comprehensive education on current cyber crime trends, investigative methods, and prosecutorial and judicial challenges..
Transit Safety and Security at U.S. Department of Transportation
The mission of the Transportation Safety Institute is to improve the safety of the worldwide transportation system through the training of transportation safety professionals across federal, state, local and international governments, as well as private industry.
See below for basic guidelines and examples of APA citation style.
APA Style Quiz
Why you need to cite sources:
- Citing sources is the only way to use other people’s work without plagiarizing (i.e. if you are using any resource [journal article, book, website, report, interview, etc.], you NEED to give credit to the original source).
- The readers of your work need citations to learn more about your ideas and where they came from.
- Citing sources shows the amount of research you’ve done.
- Citing sources strengthens your work by lending outside support to your ideas.
In-text citations give credit to sources in the body of your paper. Use in-text citations when paraphrasing, directly quoting, or using ideas from sources.
- APA citation style uses the author-date method for in-text citations: Author(s)’ last name and the year of publication for the source should appear in the text.
- Names may appear either in the sentence itself or in parentheses following the quotation or paraphrase, but the date should always appear in the parentheses, not in the text of your sentence.
- Include page numbers if you are directly quoting the material.
Citations in the Reference List must correspond to in-text citations; The word or
phrase you use in your in-text citations must be the first thing that appears on the
left-hand margin of the corresponding entry in the Reference List.
See APA Sample Title Page and Reference List
- Separate page labeled “References,” double-spaced, same margins as rest of paper.
- Indent the second and subsequent lines of citations by 0.5 inches to create a hanging indent.
- Alphabetized by the last name of the first author of each work.
- Authors' names are inverted (last name, first initial).
- List all authors of a particular work for up to and including seven authors. If the work has more than seven authors, list the first six authors and then use ellipses (...) after the sixth author's name. After the ellipses, list the last author's name of the work.
Capitalization and Punctuation
- Capitalize only the first word of a title and subtitle and proper nouns (books, chapters, articles, web pages).
- Italicize titles of longer works such as books and journals.
- Do not italicize, underline, or put quotes around the titles of shorter works such as journal articles or essays in edited collections.
NoodleTools is a citation manager that can help you generate and format citations correctly.
- Select the type of resource you are citing (article, book, website, etc.) and NoodleTools will prompt you to enter required information. A citation is then generated in your selected format.
- NoodleTools requires an account, so every time you log in your citations will be saved for you.
- When you are finished entering information, a reference list can be generated for you and exported to MS Word or Google Docs.
For more details and examples of APA citation style, visit the following websites:
Founded in 1955, ASIS International is a global community of security practitioners, each of whom has a role in the protection of assets - people, property, and/or information.
CIS® (Center for Internet Security, Inc.)
CIS® (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. Our CIS ControlsTM and CIS BenchmarksTM are the global standard and recognized best practices for securing IT systems and data against the most pervasive.
Cloud Security Alliance (CSA)
The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs and the assurance industry — and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem.
Executive Women's Forum
The Executive Women's Forum is the largest member organization serving emerging leaders as well as the most prominent and influential female executives in the Information Security, Risk Management and Privacy industries.
Information Systems Audit and Control Association (ISACA)
As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.
International Association of Computer Investigative Specialists (IACIS)
International Association of Computer Investigative Specialists (IACIS) is a non-profit, volunteer organization wholly dedicated to training, certifying and providing membership services to computer forensic professionals around the world.
International Association of Privacy Professionals (IAPP)
International Association of Privacy Professionals (IAPP) is a resource for professionals who want to develop and advance their careers by helping their organizations successfully manage these risks and protect their data. In fact, we’re the world’s largest and most comprehensive global information privacy community.
RESEARCH HELP | Have a question? Librarians are available to assist you during all open hours.