X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (10259) 10259
Journal Article (5826) 5826
Conference Proceeding (2020) 2020
Book / eBook (1116) 1116
Magazine Article (1015) 1015
Newsletter (1010) 1010
Book Chapter (838) 838
Trade Publication Article (698) 698
Publication (386) 386
Government Document (250) 250
Transcript (224) 224
Web Resource (63) 63
Reference (54) 54
Dissertation (38) 38
Book Review (31) 31
Paper (18) 18
Standard (5) 5
Streaming Video (4) 4
Technical Report (4) 4
Journal / eJournal (3) 3
Data Set (1) 1
Video Recording (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cyberterrorism (13456) 13456
internet (7168) 7168
safety and security measures (6355) 6355
data security (5124) 5124
computer security (2909) 2909
cybersecurity (1813) 1813
cyber security (1345) 1345
cyberspace (1309) 1309
computer hackers (1137) 1137
laws, regulations and rules (1089) 1089
cyber-physical systems (1086) 1086
network security (1055) 1055
computers (1034) 1034
computer science (1033) 1033
security (997) 997
reports (976) 976
security measures (898) 898
national security (883) 883
internet crime (852) 852
computer networks (831) 831
security management (800) 800
control systems (792) 792
information technology (762) 762
computer software industry (761) 761
computer systems (755) 755
data encryption (749) 749
protection (736) 736
cyber-physisches system (720) 720
electronic books (720) 720
computer privacy (683) 683
infrastructure (678) 678
electronic digital computers (673) 673
computer system security (671) 671
protection of computer systems (671) 671
security of computer systems (671) 671
analysis (668) 668
political aspects (568) 568
prevention (563) 563
management (557) 557
software (527) 527
computer science, information systems (506) 506
engineering, electrical & electronic (500) 500
computer crimes (496) 496
privacy (496) 496
information systems (483) 483
telecommunications (481) 481
data protection (480) 480
automation (477) 477
forecasts and trends (464) 464
cloud computing (457) 457
methods (447) 447
internet of things (446) 446
computer viruses (436) 436
malware (434) 434
spyware (420) 420
artificial intelligence (417) 417
cyberbullying (415) 415
technology (406) 406
social networks (399) 399
computer communication networks (392) 392
algorithms (390) 390
conferences, meetings and seminars (385) 385
cybercrime (384) 384
surveys (383) 383
systems and data security (383) 383
research (369) 369
law (338) 338
military defense (333) 333
threats (333) 333
security services (330) 330
cyber-physical system (323) 323
multi-user (323) 323
information warfare (322) 322
data integrity (321) 321
smart grid (320) 320
investigations (319) 319
terrorism (311) 311
armed forces (308) 308
studies (306) 306
engineering (300) 300
military operations (297) 297
machine learning (294) 294
sensors (294) 294
military aspects (292) 292
risk management (291) 291
control (290) 290
networks (289) 289
access control (287) 287
usage (279) 279
computer software (278) 278
general (277) 277
computer communication systems (274) 274
technology application (273) 273
congresses (271) 271
intellectual property (269) 269
innovations (268) 268
cryptology (264) 264
security software (263) 263
security systems (262) 262
international relations (261) 261
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (118) 118
Online Resources - Online (90) 90
UofT at Mississauga - Stacks (89) 89
Engineering & Comp. Sci. - Stacks (83) 83
Collection Dvlpm't (Acquisitions) - Vendor file (44) 44
UofT at Scarborough - Stacks (25) 25
UTL at Downsview - May be requested (18) 18
St. Michael's College (John M. Kelly) - 2nd Floor (16) 16
Law (Bora Laskin) - Stacks (13) 13
Faculty of Information - Stacks (11) 11
Trinity College (John W Graham) - Stacks (11) 11
Criminology - Stacks (7) 7
Collection Dvlpm't (Acquisitions) - Closed Orders (6) 6
Victoria University E.J. Pratt - Stacks (4) 4
Gerstein Science - Stacks (3) 3
Baycrest Hospital - Resident/Client Library (1) 1
Collection Dvlpm't (Acquisitions) - On order (1) 1
East Asian (Cheng Yu Tung) - Stacks (1) 1
Engineering & Comp. Sci. - May be requested in 6-10 wks (1) 1
Engineering & Comp. Sci. - Processing (1) 1
Faculty of Information - May be requested in 6-10 wks (1) 1
Faculty of Information - New Books (1) 1
Innis College - Circulation Desk (1) 1
Innis College - Stacks (1) 1
Knox College (Caven) - Audio Visual (1) 1
Knox College (Caven) - Stacks (1) 1
Law (Bora Laskin) - Closed Orders (1) 1
Mathematical Sciences - Stacks (1) 1
New College (Ivey) - Stacks (1) 1
OISE - Children's Literature (1) 1
Robarts - Course Reserves (1) 1
Robarts - Processing (1) 1
Robarts - Searching (1) 1
Robarts - Storage (1) 1
Royal Ontario Museum - Stacks (1) 1
St. Michael's College (John M. Kelly) - 3rd Floor (1) 1
Trinity College (John W Graham) - Reference (1) 1
University College (Laidlaw) - Stacks (1) 1
UofT Schools - Special Collections (1) 1
UofT Schools - Stacks (1) 1
UofT at Scarborough - Library use only (1) 1
Victoria University E.J. Pratt - Reference (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (22119) 22119
German (47) 47
Korean (39) 39
Japanese (22) 22
Spanish (17) 17
French (13) 13
Chinese (7) 7
Czech (6) 6
Swedish (3) 3
Afrikaans (2) 2
Arabic (2) 2
Portuguese (2) 2
Russian (2) 2
Croatian (1) 1
Danish (1) 1
Hungarian (1) 1
Lithuanian (1) 1
Persian (1) 1
Polish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2017, New security challenges, ISBN 331943960X, xv, 198 pages
This text offers different perspectives on the utilisation and development of special operations forces (SOF) in small states. Across the chapters, the authors... 
Special forces (Military science) | Politics and war | States, Small | Samhällsvetenskap | Statsvetenskap | Social Sciences | Krigsvetenskap | security challanges | Special operations | small state | Political Science
Book
2017, The changing face of war, ISBN 9781440835643, x, 290 pages
"As a society that has revered learning and education for millennia, China has a long history of valuing information. As early as the 1980s, the People's... 
Information warfare | Cyberspace operations (Military science)
Book
2017, Second edition., ISBN 1107177227, xli, 598 pages
Tallinn Manual 2.0 expands on the highly influential first edition by extending its coverage of the international law governing cyber operations to peacetime... 
Information warfare (International law) | Cyberspace operations (Military science) | Cyberterrorism | Samhällsvetenskap | Social Sciences | Law | Law (excluding Law and Society) | Juridik (exklusive juridik och samhälle) | Juridik med inriktning mot folkrätt | Juridik
Book
2015, Palgrave Macmillan's studies in cybercrime and cybersecurity, ISBN 9781137455543, xiii, 254
"Cyber operations is an emerging professional and academic field of interest, encompassing multiple disciplines associated with both technical and... 
POLITICAL SCIENCE / Political Freedom & Security / International Security | COMPUTERS / Security / General | Cyberterrorism | National security | SOCIAL SCIENCE / Criminology
Book
2015, 1, ISBN 9780128008997, xvii, 262
Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will... 
Prevention | Cyberterrorism | Computer security | Computer Communications & Networking | Security | Computer crimes | Information technology | Industries | Computer networks | Management | Corporations | Security measures | Security systems
Book
IEEE Transactions on Smart Grid, ISSN 1949-3053, 12/2011, Volume 2, Issue 4, pp. 659 - 666
We study the economic impact of a potential class of integrity cyber attacks, named false data injection attacks, on electric power market operations. In... 
Real time systems | locational marginal price | electricity markets | Power systems planning | Sensor systems | State estimation | Computer security | Cyber security | economic dispatch | false data injection attack | state estimation | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
2019, Second edition., ISBN 9781484242933, 1151
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.You will learn to configure your network from the ground... 
Computer security | Computer networks-Security measures | Security | Computer Science
eBook
2015, 1, ISBN 9781484204580, 772
Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive... 
Data encryption (Computer scienc | Security | Systems and Data Security | Data Encryption | Computer Science | Computer security
eBook
12/2017, 1, ISBN 9781484230992, 183
Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you... 
Security | Operations | Analytics | Systems and Data Security | Computer Science
eBook
IEEE Transactions on Power Systems, ISSN 0885-8950, 05/2013, Volume 28, Issue 2, pp. 1052 - 1062
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 11170, pp. 227 - 243
Journal Article
2003, 1st ed., ISBN 1555583067, 1287
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect... 
Computer security | Security measures | Computer networks | Computer Communications & Networking | Security
eBook
2016, ISBN 9780190221072, xviii, 296
Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a... 
Moral and ethical aspects | Cyberspace operations (Military science) | philosophy | moral philosophy | Cyberspace operations (Military science) - Moral and ethical aspects
Book
2016, Philosophical Studies Series, ISBN 9783319452999, Volume 124, 264
This book presents 12 essays that focus on the analysis of the problems prompted by cyber operations (COs). It clarifies and discusses the ethical and... 
Genetic epistemology | Philosophy of Technology | Epistemology | Theories of Law, Philosophy of Law, Legal History | Philosophy | Cyberspace operations (Military science)
eBook
2016, ISBN 9780190665012, vii, 290 pages
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this... 
Networking | COMPUTERS | General | Computer networks | Internet |