Recommended Resources for Defence Cyber Masters ProgrammeBack to your course page
ABI Inform (ProQuest)
Major management database featuring thousands of journals, dissertations, key business periodicals, country- and industry-focused reports, and downloadable data. Includes ABI-INFORM Trade and Industry: publications on every major industry, including finance, insurance, transportation and construction.
IHS Jane's Defence Equipment and Technology
Data, information and analysis on the air, land, naval and joint defence platforms, weapons and systems in service and under development around the world. Its content underpins market-leading products such as Jane’s All the World’s Aircraft. Access to Data Analytics is also available, including specifications analysis. Register via the site for an individual account in order to save searches and request RFID feeds.
International Journal of Cyber-Security and Digital Forensics
Cyber Security, Privacy, Trust, Digital Forensics, Hacking, and Cyber Warfare.
SAGE Journals Online
Access over 570 SAGE journals which cover a wide range of subjects including Social Science, Humanities, Economics, Management and Organization Studies, Psychology, Peace Studies and Conflict Resolution, Engineering, Computing and Materials Science. Full-text access, where available, starts from 1999 to the current issue.
A large multidisciplinary abstract and indexing database that provides access to over 20,000 peer-reviewed titles, including 2,800 gold open access journals, from more than 5,000 international publishers. Scopus indexes more than 50,000 books, 6.5 million conference papers and 24 million patents from five patent offices.
European Union Agency for Network and Information Security
ENISA is the European Union Agency for Network and Information Security. ENISA is the EU’s response to cyber security issues of the European Union. Its activities focus upon Computer Emergency Response Teams (CERT), Resilience of Networks and Services and Critical Information Infrastructure Protection (including National Cyber Security Strategies), Identity, Privacy and Trust, and Risk Management.
— filed under: Computing and Information Technology