Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Computer Information Systems & Business Analytics

This guide will help students and faculty research topics in Computer Information Systems & Business Analytics (CISBAN)

Frequently used resources for CIS & BAN research

Connecting to JMU Libraries from off-campus

JMU students, faculty, and staff can use electronic resources from off-campus via one of these two methods.

Most of our resources will ask you to log in as a JMU user through the browser (OpenAthens).

But a few resources are restricted to JMU's WifF network and require Pulse Secure. When they do, databases will have a little black square with a green S next to the name.

New titles on CIS & BAN topics

Cybersecurity for Everyone

Cybersecurity for Everyone will help by describing the issues in a way that is accessible to anyone, but especially those from non-technical backgrounds.

Secure, Resilient, and Agile Software Development

A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people.

The Cloud in IoT-Enabled Spaces

The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions proposed for the Cloud. It paves the way for IoT-enabled spaces in the next generation cloud computing paradigm and opens the door for further innovative ideas.

Architecture Patterns with Python

With this hands-on guide, Harry Percival and Bob Gregory from MADE.com introduce proven architectural design patterns to help Python developers manage application complexity--and get the most value out of their test suites.

Cloud Computing Security

This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues.

How Technology Is Changing Human Behavior

Explains some of the ways in which technological advances are altering, for better or worse, large-scale human behavior, thought processes, and critical thinking skills.

Understanding Cisco Networking Technologies, Volume 1

This in-depth guide provides the fundamental knowledge required to implement and administer a broad range of modern networking and IT infrastructure.

Design and Analysis of Security Protocol for Communication

The purpose of designing this book is to discuss and analyze security protocols available for communication.

Building Secure and Reliable Systems

In this book, experts from Google share best practices to help your organization design scalable and reliable systems that are fundamentally secure.