• Skip to main navigation
  • Skip to search bar
  • Skip to main content
  • Skip to footer
  • GNTC Homepage
  • Primo
  • Blackboard
  • Student Email
  • MyGNTC
  • Library Account
Georgia Northwestern Technical College
Library Services - Georgia Northwestern Technical College
    • Staff Directory
    • Mission Statement
    • Catoosa County Campus Library
    • Floyd County Campus Library
    • Gordon County Campus Library
    • Polk County Campus Library
    • Walker County Campus Library
    • Whitfield Murray Campus Library
    • Instruction, Orientations, & Consultation
    • Resource Purchase Request
    • Intercampus Loan Request
    • TechShare
    • Databases A to Z
    • Research Guides
    • How to Cite Sources
    • OER @ GNTC
    • Primo
    • GALILEO Homepage

    Everything

    Cybersecurity

    • Websites
    • Ebooks
    • Print Books
    • Databases
    • Streaming
    • GNTC Videos

    General

    Cybersecurity Framework

    Cybersecurity - Homeland Security

    Cybersecurity & Infrastructure Security Agency

    Cybersecurity | U.S. GAO

    Cybersecurity

    Cybersecurity: Safeguarding America's Digital Infrastructure

    Cybersecurity

    Cybersecurity - United States Department of State

    Professional

    National Cybersecurity Alliance

    NSA Cybersecurity Collaboration Center

    Administration for Strategic Preparedness and Response

    Information Systems Security Association

    Cyber Threat Alliance

    Women in Cybersecurity

    Centre for Internet Security

    SANS Institute

    Career

    Bureau of Labor Statistics

    Cybersecurity for Small Businesses

    Cyberplanner | Federal Communications Commission

    Indeed

    General

    Cybersecurity

    Cybersecurity For Dummies

    Cybersecurity ABCs : Delivering Awareness, Behaviours and Culture Change

    Cybersecurity : A Self-Teaching Introduction

    Mastering Cybersecurity: Strategies, Technologies, and Best Practices

    Infrastructure Cybersecurity

    Advances in Cybersecurity: Challenges and Solutions

    Cybersecurity Leadership Demystified

    General cont.

    Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies

    Computer Security and Encryption : An Introduction

    The Art of Cyber Defense

    Ultimate Cyberwarfare for Evasive Cyber Tactics

    Computer Security Approaches to Reduce Cyber Risks in the Nuclear Supply Chain

    Foresight Cybersecurity Threats for 2030

    Cybersecurity and Data Science

    Business

    Cybersecurity for Entrepreneurs

    Rational Cybersecurity for Business

    Cyber Security and Business Analysis

    Privacy, Regulations, and Cybersecurity

    Cybersecurity Training : A Pathway to Readiness

    Cybersecurity Tabletop Exercises

    Specialized

    Aviation Cybersecurity : Foundations, Principles, and Applications

    Healthcare Cybersecurity

    Automotive Cybersecurity

    Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

    Practical Cybersecurity Architecture

    Artificial Intelligence

    Artificial Intelligence for Biometrics and Cybersecurity : Technology and Applications

    Cybersecurity and Privacy in AI

    Crime

    Cybersecurity and Digital Forensics: Challenges and Future Paradigms

    Global Cybercrime and Cybersecurity Laws and Regulations: Issues and Challenges in the 21st Century

    Certification

    CC Certified in Cybersecurity Cert Guide

    CISA Certified Information Systems Auditor Study Guide

    CISSP Exam Certification Companion: 1000+ Practice Questions and Expert Strategies for Passing the CISSP Exam

    General

    Cybersecurity for Dummies

    Understanding Cybersecurity Technologies : A Guide to Selecting the Right Cybersecurity Tools

    Security Awareness : Applying Practical Cybersecurity in Your World

    Human Dimensions of Cybersecurity

    Cybersecurity for Everyone

    Cybersecurity Readiness : A Holistic and High-Performance Approach

    Fixing American Cybersecurity : Creating a Strategic Public-Private

    Career

    The Comprehensive Guide to Cybersecurity Careers : A Professional's Roadmap for the Digital Security Age

    Exploring Careers in Cybersecurity and Digital Forensics

    The Cybersecurity Workforce of Tomorrow

    Building a Career in Cybersecurity : The Strategy and Skills You Need to Succeed

    Careers in Cybersecurity

    Cybersecurity and Information Analysts : A Practical Career Guide

    Cybersecurity for Beginners : How To Get Into Cybersecurity Without Technical Background

    Crime

    Ransomware and Cybercrime

    Cyberpredators and Their Prey

    Tracers in the Dark : The Global Hunt for the Crime Lords of Cryptocurrency

    A Hacker's Mind : How the Powerful Bend Society's Rules, and How to Bend Them Back

    Chasing Shadows : Cyber Espionage, Subversion, and the Global Fight for Democracy

    Crime cont.

    No Safe Harbor : The Inside Truth about Cybercrime -- and How to Protect Your Business

    Hands on Hacking

    This Is How They Tell Me the World Ends : The Cyberweapons Arms Race

    The Ransomware Hunting Team : A Band of Misfits' Improbable Crusade to Save the World from Cybercrime

    Business

    Cyber Security and Business Intelligence : Innovations and Machine Learning for Cyber Risk Management

    Privacy, Regulations, and Cybersecurity : The Essential Business Guide

    Ethics & Law

    The Code of Honor : Embracing Ethics in Cybersecurity

    Principles of Cybersecurity Law

    Certification

    CC Certified in Cybersecurity Cert Guide

    CompTIA PenTest+ Certification

    CCNA 200-301 Official Cert Guide

    Computer Programming

    Computer Programming and Cybersecurity : The Ultimate Guide for Python

    Medical

    Cybersecurity in the COVID-19 Pandemic

    General

    Infobase Issues and Controversies

    Credo Reference

    Points of View Reference Source

    Cybersecurity Specific

    Computer Science Database

    Computer Source

    YouTube

    Cyber Security In 7 Minutes

    Cybersecurity: Crash Course

    Cybersecurity in 2025. Here's What To Expect...

    Cybersecurity in the age of AI

    Cybersecurity Trends for 2025 and Beyond

    YouTube cont.

    Defense Against Cyber Attacks and Other Threats

    Mad Hat

    How to Get Started in Cybersecurity in 2025

    13 Cyber Security Projects to get you HIRED

    Top 4 Upcoming Cybersecurity Gadgets in 2025!

    Library

    Evaluating Sources

    Library Services Website

    Managing Your Account

    Databases A-Z

    Copyright © 2025
    Powered By EBSCO Stacks 4.0.121.8.2 Staff Login