Skip to Main Content

Cybersecurity

Supports research in cybersecurity and computer science.

Browse the Library stacks

Books and journal articles are the most common way to access scholarly research in your field, but each has advantages and disadvantages. Books take longer to research, write, and publish, so the information is not as current as in journal articles, which are shorter and slightly faster to publish. However, because they are longer and took more time to produce, books offer more thorough coverage of a topic, draw on a wider range of preexisting scholarship, and often excel in placing an argument in broader thematic and disciplinary context.

Consider a scholarly book in your own research, and look for the following:

  • Helpful introduction and overview of the topic;
  • Comprehensive literature review, outlining the major scholars and existing points of view on the topic;
  • Detailed study of the topic, usually broken down into manageable chapters;
  • Extensive bibliography to help you and other scholars find related works on the topic.

You can browse the library catalog and library stacks for titles we have in print with the following cybersecurity call number ranges at the duPont-Ball Library, 2nd floor:

Subject Call number range
Industrial Psychology HF5548
Social influence; social pressure HM1236
Social pathology; social and public welfare; criminology HV66773
Federal law (KFF1-599 is Florida) KF
Electrical engineering; electronics, telecommunications TK5105.xx
Electronic computers, Computer Science, computer software QA76.9

Current eBooks in Cybersecurity

Videos

Have a question? Ask a librarian! Email libref@stetson.edu. Call or text 386-747-9028.