Can't see this email? Click here to view this message in a browser window.

New Research E-Resource!

Controversial Issues, Animal Facts, Famous People, Country Facts, and more!

This database provides coverage in areas including history, health, language arts, math, science, social studies, and technology. All newspaper, magazine, and reference book content is 100% full text.

In SIRS Discoverer you will find:

Controversial Issues: 

Over 80 issues including...

  • Alien Life and UFOs
  • Animal Shelters
  • Coral Reefs
  • Fake News
  • Honeybee Population
  • Prisons
  • Student-Athlete Compensation

Animal Facts: Over 325 animal fact pages including Asian Water Buffalo, Brown Recluse Spider, Elk, Funnel Web Spider, Howler Monkey, Piranha, Quetzal, Quokka, Spider Monkey, Yak.

Famous People: Over 200 famous people/biographies pages including Bill Clinton, Christa McAuliffe, Chuck Berry, Frida Kahlo, John Lewis, Kobe Bryant, Langston Hughes, Marion Anderson, Pele, Ruth Bader Ginsburg, Greta Thunberg, Hank Aaron, Joe Biden, Joy Harjo, and Kamala Harris.

 

Country Facts: 200 Country Fact pages with sections including information on population, government type, government official, agriculture, language, and holidays.

Below is a sampling of e-book titles available to you. Be on the lookout for more recommendations by subject coming to you next month!

Recent E-Book Highlights

FORENSICS & SECURITY

Please note that you must log in to an e-resource using your local library card number or eCard number.

Learn Computer Forensics : Your One-stop Guide to Searching, Analyzing, Acquiring, and Securing Digital Evidence by William Oettinger 

Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report. This book will help you to build up the skills you need to work in a highly technical environment. This book's ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process. By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator. Individuals planning to pass the Certified Forensic Computer Examiner (CFCE) certification will also find this book useful.

Find this in EBSCO E-Books

IOS Forensics for Investigators : Take Mobile Forensics to the Next Level by Analyzing, Extracting, and Reporting Sensitive Evidence by Gianluca Tiepolo

Professionals working in the mobile forensics industry will be able to put their knowledge to work with this practical guide to learning how to extract and analyze all available data from an iOS device. This book is a comprehensive, how-to guide that leads investigators through the process of collecting mobile devices and preserving, extracting, and analyzing data, as well as building a report. Complete with step-by-step explanations of essential concepts, practical examples, and self-assessment questions, this book starts by covering the fundamentals of mobile forensics and how to overcome challenges in extracting data from iOS devices. Once you've walked through the basics of iOS, you'll learn how to use commercial tools to extract and process data and manually search for artifacts stored in database files. Next, you'll find out the correct workflows for handling iOS devices and understand how to extract valuable information to track device usage.

Find this in EBSCO E-Books

Cloud Security Handbook : Find Out How to Effectively Secure Cloud Environments Using AWS, Azure, and GCP by Eyal Estrin

Securing resources in the cloud is challenging, given that each provider has different mechanisms and processes. Cloud Security Handbook helps you to understand how to embed security best practices in each of the infrastructure building blocks that exist in public clouds. This book will enable information security and cloud engineers to recognize the risks involved in public cloud and find out how to implement security controls as they design, build, and maintain environments in the cloud. You'll begin by learning about the shared responsibility model, cloud service models, and cloud deployment models, before getting to grips with the fundamentals of compute, storage, networking, identity management, encryption, and more. Next, you'll explore common threats and discover how to stay in compliance in cloud environments. This book is for IT or information security personnel taking their first steps in the public cloud or migrating existing environments to the cloud. 

Find this in EBSCO E-Books

Picture of a library card

A Library Card is Needed to Access the E-Resources in POWER Library

Do you have a library card issued by a Pennsylvania library?

If yes - you are good-to-go! You can use your local library card number to access the e-resources in POWER Library.

 

If you do not have a local library card, you can obtain an eCard. 

Get an eCard!

All Things POWERful!
We hope that you have been able to take advantage of and enjoy the many resources available in the POWER Library, which include:
Visit POWER Library

Connect with us
facebook-noshare social icon
twitter-noshare social icon
instagram-noshare social icon

Thank you for reading the POWER Library News
You have received this message because you opted to receive POWER Library News when you registered for a POWER Library eCard or you subscribed to the POWER Library News on the POWER Library website.

Click here to unsubscribe

POWER Library
This project is made possible in part by Library Services and Technology Act (LSTA) funds from the U.S. Institute of Museum and Library Services and through the Commonwealth of Pennsylvania's Library Access funds administered by the Pennsylvania Department of Education, Office of Commonwealth Libraries. The views, findings, conclusions, or recommendations expressed in this website do not necessarily represent those of the U.S. Institute of Museum and Library Services or the Pennsylvania Department of Education.

POWER Library is hosted by HSLC.
3600 Market St., Suite 550
Philadelphia, PA 19104

POWER Library News October 2023 Supplement