This digital library brings together books, articles, reports, and other publications of the NATO Cooperative Cyber Defence Centre of Excellence as well as the work of our experts. We are currently updating the library and adding more documents.
A massive list of useful cyber security websites, conferences, competitions, blogs, organizations and more.
Discover original cyber security content provided by industry practitioners, thought leaders, influencers and innovative companies.
The Resource Library is a hub of resource links, documents, tools, templates, checklists, and best practices essential for the development of services and capabilities needed to improve effective information sharing and analysis within any community of interest.
More than 75,000 unique visitors read papers in the Reading Room every month and it has become the starting point for exploration of topics ranging from SCADA to wireless security, from firewalls to intrusion detection.
Cyber Threats: key insights from the best reports
The SEI Digital Library provides access to more than 3,500 documents from three decades of research into best practices in software engineering.
These databases and resources provide open access to their contents.
This service provides open bibliographic information on major computer science journals and proceedings.
The Science of Security (SoS) Initiative at the National Security Agency Research Directorate promotes foundational cybersecurity science that is needed to mature the cybersecurity discipline and to underpin advances in cyberdefense.
NIST: National Institute of Standards and Technology: https://www.nist.gov/
NIST Promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.
CISA: Cibersecurity and InfraStructure Security Agency: https://www.cisa.gov/
CISA works with partners to defend against today’s threats and collaborates to build a more secure and resilient infrastructure for the future.
NSA: National Security Agency: https://www.nsa.gov/
The National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses both signals intelligence (SIGINT) insights and cybersecurity products and services and enables computer network operations to gain a decisive advantage for the nation and our allies.
GitHub Topics: https://github.com/topics
ACM Transactions on Privacy and Security (formerly TISSEC) Devoted to the study, analysis, and application of information and system security and privacy. |
IEEE Transactions on Dependable and Secure Computing The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. |
IEEE Transactions on Information Forensics and Security Covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features. |
Journal of Cryptology The official journal of the International Association for Cryptologic Research which provides a forum for publication of original results in all areas of modern information security |
Computers & Security The official journal of Technical Committee 11 (computer security) of the International Federation for Information Processing. |
Designs, Codes, and Cryptography Designs, Codes and Cryptography provides a forum for high quality papers of both a theoretical and a practical nature which bridge design theory, coding theory, and cryptography, encouraging interaction between them. |
International Journal of Information Security The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation. |
IET Information Security IET Information Security publishes original research papers in numerous areas of information security and cryptography. |
Journal of Computer Security The Journal of Computer Security presents research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems |
Journal of Computer Virology and Hacking Techniques The Journal of Computer Virology and Hacking Techniques is an independent academic and technical journal dedicated to viral and antiviral computer technologies and hacking techniques (software and hardware). |
Journal of Cybersecurity Journal of Cybersecurity publishes accessible articles describing original research in the inherently interdisciplinary cyber domain. Journal of Cybersecurity is premised on the belief that computer science-based approaches, while necessary, are not sufficient to tackle cybersecurity challenges. Instead, scholarly contributions from a range of disciplines are needed to understand the varied aspects of cybersecurity. |
Information and Computer Security Information and Computer Security (ICS) contributes to the advance of knowledge directly related to the theory and practice of the management and security of information and information systems. |
Earlham College • 801 National Road West • Richmond, Indiana 47374-4095