UofT Libraries is getting a new library services platform in January 2021.
Learn more about the change.

Search Articles

X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Newspaper Article (45465) 45465
Journal Article (4220) 4220
Newsletter (4120) 4120
Magazine Article (2849) 2849
Government Document (728) 728
Book / eBook (439) 439
Transcript (418) 418
Web Resource (324) 324
Book Chapter (286) 286
Streaming Video (276) 276
Conference Proceeding (92) 92
Reference (78) 78
Dissertation (61) 61
Trade Publication Article (36) 36
Book Review (21) 21
Video Recording (10) 10
Publication (2) 2
Report (2) 2
Library Holding (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cyberterrorism (59050) 59050
safety and security measures (30855) 30855
internet (29244) 29244
data security (22670) 22670
computer security (6195) 6195
computer hackers (4980) 4980
laws, regulations and rules (4395) 4395
political aspects (3117) 3117
network security (2920) 2920
computer software industry (2827) 2827
internet crime (2628) 2628
security management (2549) 2549
national security (2261) 2261
forecasts and trends (1978) 1978
prevention (1830) 1830
control systems (1771) 1771
conferences, meetings and seminars (1603) 1603
privacy (1603) 1603
infrastructure (1548) 1548
spyware (1506) 1506
surveys (1396) 1396
data encryption (1390) 1390
data integrity (1250) 1250
software (1134) 1134
bills, legislative (1081) 1081
computer crimes (1021) 1021
investigations (1019) 1019
analysis (976) 976
computer viruses (958) 958
control (957) 957
malware (936) 936
legislators (928) 928
computer networks (917) 917
research (901) 901
methods (887) 887
security measures (856) 856
security software (838) 838
security services (835) 835
phishing (831) 831
identity theft (820) 820
social networks (816) 816
cloud computing (784) 784
periodical publishing (784) 784
automation (762) 762
innovations (752) 752
artificial intelligence (742) 742
denial of service attacks (739) 739
communications industry (720) 720
telecommunications services industry (717) 717
statistics (716) 716
web sites (694) 694
threats (692) 692
planning (684) 684
computer industry (681) 681
intellectual property (660) 660
small business (660) 660
united states (655) 655
banks (654) 654
technology application (641) 641
universities and colleges (640) 640
security programs (633) 633
management (632) 632
computers (626) 626
hackers (621) 621
banking industry (615) 615
information technology (613) 613
training (612) 612
computer science (605) 605
defense industry (586) 586
terrorism (584) 584
political activity (580) 580
high technology industry (572) 572
financial services industry (563) 563
government computer systems (562) 562
achievements and awards (558) 558
elections (550) 550
executives (546) 546
machine learning (536) 536
internet of things (529) 529
risk management (522) 522
technology (522) 522
collaboration (516) 516
education (485) 485
officials and employees (485) 485
security systems (485) 485
information management (471) 471
students (470) 470
access control (464) 464
consulting services (463) 463
health care industry (458) 458
military aspects (453) 453
medical equipment (451) 451
science & technology (449) 449
leadership (447) 447
compliance (444) 444
personal information (442) 442
presidents (439) 439
economic aspects (436) 436
electronic mail systems (433) 433
coronaviruses (432) 432
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Online Resources - Online (388) 388
Robarts - Stacks (137) 137
UofT at Mississauga - Stacks (37) 37
Collection Dvlpm't (Acquisitions) - Vendor file (35) 35
UofT at Scarborough - Stacks (21) 21
Engineering & Comp. Sci. - Stacks (20) 20
Law (Bora Laskin) - Stacks (18) 18
Trinity College (John W Graham) - Stacks (15) 15
St. Michael's College (John M. Kelly) - 2nd Floor (10) 10
UTL at Downsview - May be requested (7) 7
Media Commons - Audio Visual (6) 6
UofT Schools - Stacks (6) 6
Victoria University E.J. Pratt - Stacks (6) 6
Collection Dvlpm't (Acquisitions) - Closed Orders (4) 4
Criminology - Stacks (4) 4
Faculty of Information - Stacks (3) 3
Baycrest Hospital - Resident/Client Library (2) 2
East Asian (Cheng Yu Tung) - Stacks (2) 2
St. Michael's College (John M. Kelly) - Audio Visual (2) 2
Aerospace - Stacks (1) 1
Collection Dvlpm't (Acquisitions) - On order (1) 1
East Asian (Cheng Yu Tung) - Audio Visual (1) 1
Faculty of Information - Cataloguing (1) 1
Knox College (Caven) - Stacks (1) 1
Media Commons - Library or classroom use (1) 1
New College (Ivey) - Stacks (1) 1
OISE - Audio Visual (1) 1
OISE - Children's Literature (1) 1
Regis College - Stacks (1) 1
Robarts - Government Pubs (1) 1
Robarts - Processing (1) 1
Robarts - Searching (1) 1
St. Michael's College (John M. Kelly) - 3rd Floor (1) 1
Thomas Fisher Rare Book - May be requested at Fisher (1) 1
University College (Laidlaw) - Stacks (1) 1
Victoria University E.J. Pratt - Reference (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (59337) 59337
French (28) 28
German (17) 17
Spanish (15) 15
Japanese (10) 10
Korean (5) 5
Turkish (5) 5
Czech (4) 4
Polish (4) 4
Portuguese (3) 3
Afrikaans (2) 2
Arabic (2) 2
Swedish (2) 2
Chinese (1) 1
Hungarian (1) 1
Indonesian (1) 1
Persian (1) 1
Romanian (1) 1
Russian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2017, ISBN 9781849045544, x, 304 pages
Attribution — tracing those responsible for a cyber attack — is of primary importance when classifying it as a criminal act, an act of war, or an act of... 
Prevention | Cyberterrorism | Hackers | Security Studies | Cyber attacks | Private companies | National security | Attribution | Standards of evidence
Book
2012, ISBN 9781409438168, xiii, 201
What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber... 
Cyberterrorism | Hate crimes | Computer crimes | Sociology , Criminology | Criminology and Criminal Justice | Criminal Law & Practice | Socio-Legal Studies | Security Studies - Pol & Intl Relns | Library & Information Science
Book
2017, ISBN 9781506373263
Students discuss why they do or do not believe Iran is the greatest threat of cyberterrorism against the United States. Professor Steve Tibbetts explains that... 
Cyberterrorism
Video Recording
2018, ISBN 9781107566866, xx, 246 pages
Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have... 
Hackers | Technology and international relations | Cyberterrorism | Hacking | Internet and international relations | Cyberspace
Book
2007, ISBN 0521692148, 337
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer... 
Information warfare | Computer networks | Cyberterrorism | National security
Book
2012, 1. Aufl., ISBN 9781848213500, xxiv, 319
Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international... 
Prevention | Cyberterrorism | Cyberspace | Computer networks | National security | Information warfare | Security measures | Internet | Security | Current Affairs
Book
2014, What everyone needs to know, ISBN 9780199918096, viii, 306 pages
"The book is structured around the driving questions of cybersecurity: how it all works, why it all matters, and what can we do. Along the way, they take... 
Prevention | Cyberspace operations (Military science) | Cyberterrorism | Cyberspace | POLITICAL SCIENCE / Political Freedom & Security / International Security | Computer networks | Computer security | Information warfare | Security measures
Book
2017, ISBN 9781626164123, xi, 289 pages
Cyberattacks are one of the greatest fears for both governments and the private sector. The attacks come without warning and can be extremely costly and... 
Prevention | Cyberterrorism
Book
2017, ISBN 9781498785860, xiv, 239 pages
Book
2016, Transforming war, ISBN 1682470326, xvi, 478 pages
"Cyberspace in Peace and War presents a comprehensive understanding of cybersecurity, cyberwar, and cyber terrorism. From basic concepts to advanced... 
Prevention | Cyberspace operations (Military science) | Cyberterrorism | Security measures | Government policy | Cyberspace
Book
2014, ISBN 1621572005, xx, 300
Fearing that Americans are unprepared for devastating attacks on our economy by ruthless and sophisticated enemies, the author explores the "emerging risks and... 
Economic aspects | Investments | Cyberterrorism | Stocks | Finance, Personal
Book
2015, ISBN 9781612347752, xiv, 329
"In January 2014 Pope Francis called the Internet a "gift from God." Months later former Secretary of Defense, Leon Panetta, described cyber warfare as "the... 
Information warfare (International law) | Cyberspace operations (Military science) | Technological innovations | Cyberterrorism | Law and legislation
Book
2016, 1, Routledge research in international law, ISBN 9781138245228, 111 pages
Book
2012, Rand Corporation monograph series, ISBN 9780833076786, xxi, 172
Book
2014, 1, Routledge research in IT and e-Commerce law, ISBN 9780203709207, [6], 175
Book
03/2016, ISBN 0833092499, 121
This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can... 
History | Technology | Cyberterrorism - China - Prevention
eBook
2016, First Simon & Schuster hardcover edition., ISBN 1476763267, ix, 338 pages
"As cyber-attacks dominate front-page news, as hackers displace terrorists on the list of global threats, and as top generals warn of a coming cyber war, few... 
Prevention | Military Science | Cyberterrorism | United States | COMPUTERS | TECHNOLOGY & ENGINEERING | General | Viruses | Security | HISTORY | Military
Book
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.