Information Security

Fetch Headings.ExtraData
Below are groups and resources (books, articles, websites, etc.) related to this topic. Click on an item’s title to go its resource page with author, publisher, description/abstract and other details, a link to the full text if available, as well as links to related topics in the Subject Index. You can also browse the Title, Author, Subject, Chronological, Dewey, LoC, and Format indexes, or use the Search box.
Particularly recommended items are flagged with a red logo:

Connexions Library

Beginner's guide to improving online security
Williams, Margot
Article
2014
Investigative journalists like the members of ICIJ are facing growing concerns about security. Our members often work with leaks or other materials requiring protection of sources, collaborate across ...
The Other Police State: Private Cops vs. the Public Good
Rosen, David
Article
2013
A revealing study on "Spooky Business: A New Report on Corporate Espionage Against Non-profits" written by Gary Ruskin confirms one’s worst suspicions about the ever-expanding two-headed U.S. security...
The Secret Secret: Of Wikileaks and Literacy
Johnson, Jimmy
Article
2010
Only those with proper clearances can participate in discussions that affect significant aspects of our lives. Certain technological achievements, our collective ethical decisions (torture, secret pri...